impacket-scripts

Impacket and Impacket-scripts are open-source Python tools used for network protocol interaction, security testing, and penetration testing.

Impacket and Impacket-scripts are two widely used security tools in the realm of cybersecurity. These tools are open-source and provide a variety of functions that can be used for penetration testing, network reconnaissance, and other security assessments.

Impacket is a collection of Python classes that can be used to interact with network protocols. This tool is used by security professionals to develop and test exploits, create network tools, and interact with various network services. Impacket is capable of supporting a wide range of protocols, including SMB, LDAP, MSRPC, and Kerberos.

Impacket-scripts, on the other hand, is a collection of scripts built on top of Impacket. These scripts provide a higher level of functionality that can be used for various tasks such as password cracking, network sniffing, and reconnaissance. The toolset provided by Impacket-scripts is extensive and includes scripts for SMB attacks, LDAP enumeration, and Kerberos attacks, among others.

One of the key benefits of Impacket and Impacket-scripts is their simplicity and ease of use. Both tools are written in Python, which makes them highly flexible and customizable. The tools are also designed to be modular, meaning that they can be easily extended to support new protocols or functionality.

Another major advantage of Impacket and Impacket-scripts is that they are actively maintained and updated by a community of developers. This means that any bugs or vulnerabilities are quickly identified and fixed, making the tools more reliable and secure.

However, it's important to note that Impacket and Impacket-scripts are powerful tools that can be used for both legitimate security assessments and malicious purposes. As such, their usage should be limited to ethical hacking, security testing, and other lawful activities. Additionally, users should always obtain proper authorization before using these tools on any network or system.

In conclusion, Impacket and Impacket-scripts are highly versatile and powerful tools that are widely used in the cybersecurity industry. They provide a variety of functions that can be used for penetration testing, network reconnaissance, and other security assessments. While their power and flexibility are undeniable, they should always be used ethically and with proper authorization.

Packages and Binaries:

impacket-scripts

This package contains links to useful impacket scripts. It’s a separate package to keep impacket package from Debian and have the useful scripts in the path for Kali.

Installed size: 60 KB How to install: sudo apt install impacket-scripts

Dependencies:
  • python3-dsinternals

  • python3-impacket

  • python3-ldap3

  • python3-ldapdomaindump

  • python3-pcapy

impacket-Get-GPPPassword

:~# impacket-Get-GPPPassword -h
Impacket v0.10.0 - Copyright 2022 SecureAuth Corporation

usage: Get-GPPPassword.py [-h] [-xmlfile XMLFILE] [-share SHARE]
                          [-base-dir BASE_DIR] [-ts] [-debug]
                          [-hashes LMHASH:NTHASH] [-no-pass] [-k]
                          [-aesKey hex key] [-dc-ip ip address]
                          [-target-ip ip address] [-port [destination port]]
                          target

Group Policy Preferences passwords finder and decryptor

positional arguments:
  target                [[domain/]username[:password]@]<targetName or address>
                        or LOCAL (if you want to parse local files)

options:
  -h, --help            show this help message and exit
  -xmlfile XMLFILE      Group Policy Preferences XML files to parse
  -share SHARE          SMB Share
  -base-dir BASE_DIR    Directory to search in (Default: /)
  -ts                   Adds timestamp to every logging output
  -debug                Turn DEBUG output ON

authentication:
  -hashes LMHASH:NTHASH
                        NTLM hashes, format is LMHASH:NTHASH
  -no-pass              don't ask for password (useful for -k)
  -k                    Use Kerberos authentication. Grabs credentials from
                        ccache file (KRB5CCNAME) based on target parameters.
                        If valid credentials cannot be found, it will use the
                        ones specified in the command line
  -aesKey hex key       AES key to use for Kerberos Authentication (128 or 256
                        bits)

connection:
  -dc-ip ip address     IP Address of the domain controller. If omitted it
                        will use the domain part (FQDN) specified in the
                        target parameter
  -target-ip ip address
                        IP Address of the target machine. If omitted it will
                        use whatever was specified as target. This is useful
                        when target is the NetBIOS name and you cannot resolve
                        it
  -port [destination port]
                        Destination port to connect to SMB Server

impacket-GetADUsers


impacket-GetNPUsers


impacket-GetUserSPNs


impacket-addcomputer


impacket-atexec


impacket-dcomexec


impacket-dpapi


impacket-esentutl


impacket-exchanger


impacket-findDelegation


impacket-getArch


impacket-getPac


impacket-getST


impacket-getTGT


impacket-goldenPac


impacket-karmaSMB


impacket-keylistattack


impacket-kintercept


impacket-lookupsid


impacket-machine_role


impacket-mimikatz


impacket-mqtt_check


impacket-mssqlclient


impacket-mssqlinstance


impacket-nmapAnswerMachine


impacket-ntfs-read


impacket-ntlmrelayx


impacket-ping


impacket-ping6


impacket-psexec


impacket-raiseChild


impacket-rbcd


impacket-rdp_check


impacket-reg


impacket-registry-read


impacket-rpcmap


impacket-sambaPipe


impacket-services


impacket-smbclient


impacket-smbexec


impacket-smbpasswd


impacket-smbrelayx


impacket-smbserver


impacket-sniff


impacket-sniffer


impacket-split


impacket-ticketConverter


impacket-ticketer


impacket-wmipersist


impacket-wmiquery


Updated on: 2023-Mar-08


Last updated

Was this helpful?