diff --git a/arsenal/data/cheats/Active_directory/Impacket/impacket-mssqlclient.md b/arsenal/data/cheats/Active_directory/Impacket/impacket-mssqlclient.md new file mode 100644 index 0000000..4721c05 --- /dev/null +++ b/arsenal/data/cheats/Active_directory/Impacket/impacket-mssqlclient.md @@ -0,0 +1,48 @@ +# impacket + +% impacket, windows, exec, inital_access + +Mssqlclient.py is an MSSQL client, supporting both SQL and Windows Authentications (including hashes) allowing the enumeration for Microsoft SQL servers including spawning an 'xp_cmdshell'. It also supports TLS. + + +## Attempts to connect to the SQL Server instance with valid credentials +#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT + +``` +mssqlclient.py /:@ +``` + +## Attempts to use windows authentication. DEFAULT: FALSE +#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT + +``` +mssqlclient.py /:@ -windows-auth +``` + +## Allow for the SQL Server instance without password +#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT + +``` +mssqlclient.py /:@ -no-pass +``` + +## Attempts to use pass-the-hash method for authentication +#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT + +``` +mssqlclient.py /@ -hashes +``` + +## Attempts to use kerberos authentication +#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT + +``` +mssqlclient.py /:@ -k +``` + +## Attempts to use the IP address of the domain controller to be used for authentication +#plateform/linux #target/remote #port/1433 #protocol/mssql #cat/ATTACK/EXPLOIT + +``` +mssqlclient.py /:@ -dc-ip +``` \ No newline at end of file diff --git a/arsenal/data/cheats/Hash Identifier/hashid.md b/arsenal/data/cheats/Hash Identifier/hashid.md new file mode 100644 index 0000000..b8a4064 --- /dev/null +++ b/arsenal/data/cheats/Hash Identifier/hashid.md @@ -0,0 +1,28 @@ +# hash-identifier + +% Hashes, hash identification, hash function analysis + +#plateform/linux #target/local #cat/HASHES/HASH_TYPE_IDENTIFIER +Example : hashid '5f4dcc3b5aa765d61d8327deb882cf99' + +https://github.com/blackploit/hash-identifier + +## All possible hash algorithms +``` +hashid '' -e +``` + +## Print hashes in Hashcat mode +``` +hashid '' -m +``` + +## Print hashes in joh mode +``` +hashid '' -j +``` + +## write output to file +``` +hashid '' -o +``` \ No newline at end of file diff --git a/arsenal/data/cheats/Hash Identifier/nth.md b/arsenal/data/cheats/Hash Identifier/nth.md new file mode 100644 index 0000000..925d8f6 --- /dev/null +++ b/arsenal/data/cheats/Hash Identifier/nth.md @@ -0,0 +1,37 @@ +# Name-That-Hash + +% Hashes, hash identification, hash function analysis + +#plateform/linux #target/local #cat/HASHES/HASH_TYPE_IDENTIFIER + +https://github.com/HashPals/Name-That-Hash + +## Standard Input Hash +``` +nth --text '' +``` + +## Hash in a file +``` +nth --file hash.txt +``` + +## Print hash in json format +``` +nth --text '' --greppable +``` + +## Decode hashes in base64 +``` +nth --text '' -b64 +``` + +## Print little information about hash +``` +nth --text '' -a +``` + +## Enable verbosity/debug logs +``` +nth --text '' -v +``` \ No newline at end of file