LinuxCommandLibrary

impacket

TLDR

Get TGT with password

$ impacket-getTGT [domain/user:password]
copy
Remote command execution
$ impacket-psexec [domain/user:password@target]
copy
WMI execution
$ impacket-wmiexec [domain/user:password@target]
copy
SMB execution
$ impacket-smbexec [domain/user:password@target]
copy
Dump secrets
$ impacket-secretsdump [domain/user:password@target]
copy
AS-REP roasting
$ impacket-GetNPUsers [domain/] -usersfile [users.txt] -no-pass
copy

SYNOPSIS

impacket-tool [options] [target]

DESCRIPTION

Impacket is a collection of Python classes for working with network protocols. It includes numerous tools for penetration testing, particularly useful for Windows network attacks and assessments.
The toolkit provides implementations of SMB, MSRPC, Kerberos, LDAP, and other protocols commonly used in Windows environments.

COMMON TOOLS

$ psexec         Remote command execution via SMB
wmiexec        Remote execution via WMI
smbexec        Remote execution via SMB
secretsdump    Dump SAM/NTDS secrets
getTGT         Get Kerberos TGT
GetNPUsers     AS-REP roasting
GetUserSPNs   Kerberoasting
ntlmrelayx     NTLM relay attacks
copy

AUTHENTICATION FORMATS

$ domain/user:password
domain/user:LMhash:NThash
domain/user@target -k (Kerberos)
copy

CAVEATS

For authorized testing only. May trigger security alerts. Requires Python. Some tools need local admin on target. Windows Defender may detect tools.

HISTORY

Impacket was created by SecureAuth (now part of Delinea). It's widely used in penetration testing and red team operations for Windows network exploitation.

SEE ALSO

Copied to clipboard