-
RT:
@reversing_ar: New blog post: Using Impacket/Pcapy with Python 2.6 on Windows http://bit.ly/ckOVrT#impacket#pcapy#python -
-
Just wanted to say that
#impacket and whole tooling around is a piece of art -
Lsassy - Extract Credentials From Lsass Remotely http://j.mp/2G7JkCm
#BloodHound#CrackMapExec#Impacket#Lsass#Lsassy#Minidump#SMBpic.twitter.com/UShur3MiHq
-
RFCpwn - An Enumeration And Exploitation Toolkit Using RFC Calls To SAP http://j.mp/2FBcv0b
#Enumeration#Exploitation#Impacket pic.twitter.com/vP0s7nNl4r -
Red XOR Blue: “No Shells Required - a Walkthrough on Using
#Impacket and#Kerberos to Delegate Your Way to DA”#redteam#threathunting#windows#activedirectory http://blog.redxorblue.com/2019/12/no-shells-required-using-impacket-to.html … -
I just released "lsassy" ! Tool to remotely parse lsass dumps using
#impacket and#pypykatz Automate the whole process using my CME module
lsassy : https://github.com/Hackndo/lsassy
CME Module : https://gist.github.com/Hackndo/4326c724ef1e9b71b12f8d104973a799 …
French article about this technique : https://beta.hackndo.com/remote-lsass-dump-passwords/ …
Prikaži ovu nit -
pypykatz 0.3.0 is out. Now parsing dumps that
#mimikatz can't parse :) New features: 1. better template selection. 2. greppable output 3. made place for upcoming NT support 4. supports external readers, like@HackAndDo 's upcoming#impacket interface https://github.com/skelsec/pypykatz …Prikaži ovu nit -
PrivExchange - Exchange Your Privileges For Domain Admin Privs By Abusing Exchange http://j.mp/30cyRAY
#ExchangeServices#Impacket pic.twitter.com/2KyPy7Bz5C
-
NebulousAD - Automated Credential Auditing Tool http://j.mp/2zJKfW5
#ActiveDirectory#Auditing#CSVFile#Hashes#Impacket#JSON#Wipepic.twitter.com/tAzp6NGeml
-
So happy
#impacket is now Python 3! I've updated RidRelay (https://github.com/skorov/ridrelay ) to use latest Impacket, so I will no longer support Python 2.7. Enjoy! -
Hey
@_dirkjan , I just tested your#PrivExchange attack on a 2019 DC with 2019 Exchange (without separated administration at install) It works like a charm, so much class with this attack
I'm so loving it.
Thank you for your work
and @agsolino for#impacket too
pic.twitter.com/mHyhQisSgJPrikaži ovu nit -
Every time I use
#impacket, I discover new, awesome features or ways to use it that I didn't come up before. It's definitely one of the most valuable pentest tools I ever came across, thanks@agsolino and all co-authors for sharing it with the community!https://github.com/CoreSecurity/impacket … -
#Impacket - Collection Of#Python Classes For Working With#Network#Protocols https://goo.gl/Y4Pbdk pic.twitter.com/qRUXEpbg3O
-
You can now get a TGT from ASREP with no kerb preauth using
#impacket https://github.com/CoreSecurity/impacket/commit/11310aba356ded20e9989f0a753bf40d1128f75d …, tested and verified - Thanks@agsolino
-
Still think machine accounts are useless when relaying? Not when you relay an Exchange server account and get instant Domain Admin :D mitm6 + ntlmrelayx = relay exchange server account -> modify domain ACL -> DCSync with
#mimikatz or#impacket pic.twitter.com/yWEtPwp6Do
-
If you like
@gentilkiwi work on#windows auth internals w/#Mimikatz ,you should check@agsolino work on#Windows protocols w/#impacket https://twitter.com/424f424f/status/904008270527987713 … -
Writeup soon: Exploting QNAP/ARM
#SambaCry without#metasploit.#impacket#pythonpic.twitter.com/wiqOpLez4A
-
I'm doing a free talk on some tools written using the
#impacket classes by the fab folks@CoreSecurity@Nullblrhttps://null.co.in/event_sessions/1361-impacket-tools … -
Making SMB3 encryption avoids RPC GUID & OpNum on the wire when made over named pipes with
#impacket and#mimikatz > Your move IPS$vendor
pic.twitter.com/TAzsxLFtzY
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.