Collection of BloodHound Cypher Query Examples
- I- Raw
- II- Built-In
- III- Custom
- IV- DB Manipulation
- V- REST API (PowerShell)
| CACHE_INFO: 127.0.0.1 | |
| CF_CONNECTING_IP: 127.0.0.1 | |
| CF-Connecting-IP: 127.0.0.1 | |
| CLIENT_IP: 127.0.0.1 | |
| Client-IP: 127.0.0.1 | |
| COMING_FROM: 127.0.0.1 | |
| CONNECT_VIA_IP: 127.0.0.1 | |
| FORWARD_FOR: 127.0.0.1 | |
| FORWARD-FOR: 127.0.0.1 | |
| FORWARDED_FOR_IP: 127.0.0.1 |
| Description: JsonPickle 1.4.2 allows remote code execution during deserialization of a malicious payload through the decode() function. | |
| VulnerabilityType: CWE-502: Deserialization of Untrusted Data | |
| Vendor of Product: https://github.com/jsonpickle/jsonpickle | |
| Affected Product Code Base: JsonPickle Python Module | |
| Attack Type: Remote | |
| Impact Code execution : True |
| #general | |
| privilege::debug | |
| log | |
| log customlogfilename.log | |
| #sekurlsa | |
| sekurlsa::logonpasswords | |
| sekurlsa::logonPasswords full |
| # Copy and paste the following snippet, including brackets, into the Terminal | |
| ( | |
| set -e; | |
| cd "$(mktemp -d)" | |
| curl -LO 'http://www.newosxbook.com/tools/jtool2.tgz' | |
| tar -x -f jtool2.tgz | |
| lipo jtool2 -thin x86_64 -output jtool2.x86_64 | |
| lipo disarm -thin x86_64 -output disarm.x86_64 | |
| sudo mkdir -p /usr/local/bin |
| { | |
| "30523382": { | |
| "className": "Proxy", | |
| "data": { | |
| "bypassFPForPAC": true, | |
| "color": "#f57575", | |
| "configUrl": "", | |
| "credentials": "U2FsdGVkX1+tf3lvD5TBClW2UUSZAT4AWsCo/i0kU2M=", | |
| "cycle": false, | |
| "enabled": true, |
| Password | Occurrence | |
| _____________|____________ | |
| 123456 |5377325 | |
| 123456789 |1962160 | |
| password |1190534 | |
| qwerty |869629 | |
| 12345678 |703220 | |
| 12345 |679886 | |
| 123123 |460430 | |
| 1234 |448199 |
| #!/usr/bin/python3 | |
| import sys | |
| import os | |
| import zipfile | |
| import tempfile | |
| from xml.etree import ElementTree | |
| from shutil import copyfile | |
| def stuffer(py_file, doc_file): |
| using System; | |
| using System.Net.Sockets; | |
| using System.Net; | |
| namespace DnsTunnel | |
| { | |
| class Program | |
| { | |
| static void OpenTunnel(int listenerPort, string targetHost, int targetPort) | |
| { |
| import json | |
| import re | |
| import sys | |
| scopes = [] | |
| f = sys.stdin | |
| if len(sys.argv) == 2: | |
| f = open(sys.argv[1]) | |
| scopes_defs = [x.strip().lower() for x in f.readlines() if len(x.strip())] |
Collection of BloodHound Cypher Query Examples