TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Impacket Cheatsheet

BHIS · 2025-08-06 · Read original ↗

ATT&CK techniques detected

8 predictions
T1557.001Name Resolution Poisoning and SMB Relay
96%
"for impacket use : export krb5ccnmae = < ccache _ file _ name > execute remote commands with any of the following using the tgt. the following command can be used with psexec. py, smbexec. py, or wmiexec. py : python psexec. py < domain _ name > / < user _ name > @ < remote _ hos…"
T1558.003Kerberoasting
85%
"_ user _ password > - request - format < hashcat | john > - outputfile < output _ file _ name > check asrep - roast for a list of users : python getnpusers. py < domain _ name > / - usersfiles < user _ file > - format < hashcat | john > - outputfile < output _ file _ name > kerbe…"
T1003.006DCSync
59%
"to responder. python ntlmrelayx. py - wh < domain _ name > - tf < relay _ list _ filename > - socks - smb2support start responder. after successful authentication, type “ socks ” to get socks connections retrieved by ntlmrelayx. secretsdump. py performs a dcsync attack on the dom…"
T1558.004AS-REP Roasting
57%
"_ user _ password > - request - format < hashcat | john > - outputfile < output _ file _ name > check asrep - roast for a list of users : python getnpusers. py < domain _ name > / - usersfiles < user _ file > - format < hashcat | john > - outputfile < output _ file _ name > kerbe…"
T1558.001Golden Ticket
55%
"domain _ name > / < user _ name > : < password > set the tgt for impacket use : export krb5ccname = < tgt _ ccache _ filename > execute remote commands with any of the following using the tgt. the following command can be used with psexec. py, smbexec. py, or wmiexec. py. python …"
T1550.002Pass the Hash
50%
"to responder. python ntlmrelayx. py - wh < domain _ name > - tf < relay _ list _ filename > - socks - smb2support start responder. after successful authentication, type “ socks ” to get socks connections retrieved by ntlmrelayx. secretsdump. py performs a dcsync attack on the dom…"
T1550.003Pass the Ticket
47%
"domain _ name > / < user _ name > : < password > set the tgt for impacket use : export krb5ccname = < tgt _ ccache _ filename > execute remote commands with any of the following using the tgt. the following command can be used with psexec. py, smbexec. py, or wmiexec. py. python …"
T1588.002Tool
33%
"issues of the infosec survival guide, as well as content like our self - published infosec zine, prompt #, and exclusive darknet diaries comics — all available at no cost. you can check out all current and upcoming issues here : https : / / www. blackhillsinfosec. com / prompt - …"

Summary

Impacket is an extremely useful tool for post exploitation. It is a collection of Python scripts that provides low-level programmatic access to the packets and for some protocols, such as DCOM, Kerberos, SMB1, and MSRPC, the protocol implementation itself.

The post Impacket Cheatsheet appeared first on Black Hills Information Security, Inc..