Skip to content

Commit

Permalink
Added more commands
Browse files Browse the repository at this point in the history
  • Loading branch information
JohnWoodman committed Dec 14, 2020
1 parent 3742296 commit 63c7d26
Show file tree
Hide file tree
Showing 4 changed files with 50 additions and 0 deletions.
1 change: 1 addition & 0 deletions _wadcoms/Impacket-GoldenTicket.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@ OS:
- Windows
attack_types:
- Exploitation
- Persistence
references:
- https://github.com/SecureAuthCorp/impacket/blob/master/examples/ticketer.py
- https://www.tarlogic.com/en/blog/how-to-attack-kerberos/
Expand Down
1 change: 1 addition & 0 deletions _wadcoms/Impacket-SilverTicket.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ OS:
- Windows
attack_types:
- Exploitation
- Persistence
references:
- https://github.com/SecureAuthCorp/impacket/blob/master/examples/ticketer.py
- https://www.tarlogic.com/en/blog/how-to-attack-kerberos/
Expand Down
27 changes: 27 additions & 0 deletions _wadcoms/SharpHound-LDAP.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
---
description: |
SharpHound.exe is the official data collector for BloodHound, written in C# and uses Windows API functions and LDAP namespace functions to collect data from domain controllers and domain-joined Windows systems. This data can then be fed into BloodHound to enumerate potential paths of privilege escalation. The following command peforms all collection methods and will use the provided LDAP credentials when performing LDAP collection methods, and stores the output in a zip file that can be directly placed in the BloodHound GUI.
Command Reference:
LDAP Username: john
LDAP Password: password123
Output File: output.zip
command: |
SharpHound.exe --CollectionMethod All --LdapUsername john --LdapPassword password123 --ZipFileName output.zip
items:
- Shell
- Username
- Password
OS:
- Windows
attack_types:
- PrivEsc
- Enumeration
references:
- https://github.com/BloodHoundAD/SharpHound3
- https://bloodhound.readthedocs.io/en/latest/data-collection/sharphound.html
---
21 changes: 21 additions & 0 deletions _wadcoms/SharpHound.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
---
description: |
SharpHound.exe is the official data collector for BloodHound, written in C# and uses Windows API functions and LDAP namespace functions to collect data from domain controllers and domain-joined Windows systems. This data can then be fed into BloodHound to enumerate potential paths of privilege escalation. The following command peforms all collection methods and stores the output in a zip file that can be directly placed in the BloodHound GUI.
Command Reference:
Output File: output.zip
command: |
SharpHound.exe --CollectionMethod All --ZipFileName output.zip
items:
- Shell
OS:
- Windows
attack_types:
- PrivEsc
- Enumeration
references:
- https://github.com/BloodHoundAD/SharpHound3
- https://bloodhound.readthedocs.io/en/latest/data-collection/sharphound.html
---

0 comments on commit 63c7d26

Please sign in to comment.