Impacket

Table of Content

  • General

  • Remote Execution

  • Kerberos

  • Windows Secrets

  • Server Tools / MiTM Attacks

  • WMI

  • Known vulnerabilities

  • SMB/MSRPC

  • MSSQL/TDS

  • File Formats

  • Others

General

# Almost every Impacket scripts follows the same option syntax

authentication:
  -hashes LMHASH:NTHASH
                        NTLM hashes, format is LMHASH:NTHASH
  -no-pass              don't ask for password (useful for -k)
  -k                    Use Kerberos authentication. Grabs credentials from
                        ccache file (KRB5CCNAME) based on target parameters.
                        If valid credentials cannot be found, it will use the
                        ones specified in the command line
  -aesKey hex key       AES key to use for Kerberos Authentication (128 or 256
                        bits)

connection:
  -dc-ip ip address     IP Address of the domain controller. If ommited it use
                        the domain part (FQDN) specified in the target
                        parameter
  -target-ip ip address
                        IP Address of the target machine. If omitted it will
                        use whatever was specified as target. This is useful
                        when target is the NetBIOS name and you cannot resolve
                        it

Remote Execution

Kerberos

Windows Secrets

Server Tools / MiTM Attacks

WMI

Known vulnerabilities

SMB/MSRPC

MSSQL/TDS

File Formats

Others

Last updated