“for impacket use : export krb5ccnmae = < ccache _ file _ name > execute remote commands with any of the following using the tgt. the following command can be used with psexec. py, smbexec. py, or wmiexec. py : python psexec. py < domain _ name > / < user _ name > @ < remote _ hos…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1558.003Kerberoasting
85%
“_ user _ password > - request - format < hashcat | john > - outputfile < output _ file _ name > check asrep - roast for a list of users : python getnpusers. py < domain _ name > / - usersfiles < user _ file > - format < hashcat | john > - outputfile < output _ file _ name > kerbe…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003.006DCSync
59%
“to responder. python ntlmrelayx. py - wh < domain _ name > - tf < relay _ list _ filename > - socks - smb2support start responder. after successful authentication, type “ socks ” to get socks connections retrieved by ntlmrelayx. secretsdump. py performs a dcsync attack on the dom…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1558.004AS-REP Roasting
57%
“_ user _ password > - request - format < hashcat | john > - outputfile < output _ file _ name > check asrep - roast for a list of users : python getnpusers. py < domain _ name > / - usersfiles < user _ file > - format < hashcat | john > - outputfile < output _ file _ name > kerbe…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1558.001Golden Ticket
55%
“domain _ name > / < user _ name > : < password > set the tgt for impacket use : export krb5ccname = < tgt _ ccache _ filename > execute remote commands with any of the following using the tgt. the following command can be used with psexec. py, smbexec. py, or wmiexec. py. python …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1550.002Pass the Hash
50%
“to responder. python ntlmrelayx. py - wh < domain _ name > - tf < relay _ list _ filename > - socks - smb2support start responder. after successful authentication, type “ socks ” to get socks connections retrieved by ntlmrelayx. secretsdump. py performs a dcsync attack on the dom…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1550.003Pass the Ticket
47%
“domain _ name > / < user _ name > : < password > set the tgt for impacket use : export krb5ccname = < tgt _ ccache _ filename > execute remote commands with any of the following using the tgt. the following command can be used with psexec. py, smbexec. py, or wmiexec. py. python …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.002Tool
33%
“issues of the infosec survival guide, as well as content like our self - published infosec zine, prompt #, and exclusive darknet diaries comics — all available at no cost. you can check out all current and upcoming issues here : https : / / www. blackhillsinfosec. com / prompt - …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Impacket is an extremely useful tool for post exploitation. It is a collection of Python scripts that provides low-level programmatic access to the packets and for some protocols, such as DCOM, Kerberos, SMB1, and MSRPC, the protocol implementation itself.