impacket-reg
Remote Windows registry manipulation tool
TLDR
SYNOPSIS
impacket-reg [-debug] [-ts] [-hashes LMHASH:NTHASH] [-k] [-no-pass] [-aesKey KEY] [-dc-ip IP] [-target-ip IP] [-port PORT] target {query|add|delete|save|backup}
DESCRIPTION
impacket-reg provides remote Windows registry manipulation through the MS-RRP MSRPC interface, functioning as a remote equivalent to Windows reg.exe. It can query, add, delete, and save registry keys and values on remote Windows machines.The tool automatically starts the Remote Registry service on the target if it is not running (even if disabled), and restores the original state when finished. This makes it effective even against hardened hosts where the service has been manually disabled.
PARAMETERS
-debug
Turn DEBUG output on.-ts
Add timestamp to every logging output.-hashes LMHASH:NTHASH
Use NTLM hashes for authentication.-no-pass
Do not prompt for password.-k
Use Kerberos authentication from ccache file (KRB5CCNAME).-aesKey KEY
AES key for Kerberos authentication (128 or 256 bit).-dc-ip IP
IP address of the domain controller.-target-ip IP
IP address of the target machine.-port PORT
Destination port (139 or 445, default 445).
QUERY OPTIONS
-keyName KEYNAME
Full registry path with root key (HKLM, HKU, HKCU, HKCR).-v VALUENAME
Query a specific registry value name.-ve
Query the default (empty) value name.-s
Recursively query all subkeys and values.
ADD OPTIONS
-keyName KEYNAME
Full registry path for the new key or value.-v VALUENAME
Value name to set.-vt VALUETYPE
Registry type (REGSZ, REGDWORD, REGBINARY, REGEXPANDSZ, REGMULTISZ, REGQWORD, etc.).-vd VALUEDATA
Data to set. Use multiple times for REGMULTISZ.
DELETE OPTIONS
-keyName KEYNAME
Full registry path to delete from.-v VALUENAME
Specific value to delete.-va
Delete all values under the key.-ve
Delete the default value.
CAVEATS
Requires administrative credentials on the target. Valid root keys are HKLM, HKU, HKCU, and HKCR. Modifying critical registry keys (e.g. under SYSTEM or Security) can render the target unbootable. The backup command writes to a UNC path, so the attacker must have a writable SMB share accessible from the target.
HISTORY
Part of the Impacket library by SecureAuth (now Fortra). The tool implements the MS-RRP (Windows Remote Registry Protocol) specification over MSRPC, enabling remote registry operations commonly used in penetration testing for persistence, lateral movement, and credential extraction.
