Cyber Research Wiki

Impacket

Open-source Python library and example tools that implement and manipulate network protocols (notably SMB, MSRPC, Kerberos, NTLM, LDAP, MSSQL) to enable low-level packet crafting, protocol clients, and security testing workflows across Windows-centric enterprise networks. (github.com)

Overview

Impacket is a Python-based collection of protocol implementations and reference utilities designed for research, education, and security assessment of Windows-centric enterprise networks. It offers object-oriented access to construct, parse, and sequence messages for protocols including SMB (v1–v3), DCE/RPC over multiple transports, NTLM and Kerberos authentication, LDAP, and TDS (MSSQL). Beyond the library layer, a suite of example tools demonstrates end-to-end interactions such as remote service execution, Kerberos ticket operations, credential access, network sniffing, and authentication relay attacks. Originally developed by SecureAuth and now maintained by Fortra’s Core Security, the current stable release line is v0.13.0 (released October 22, 2025).

What It Is

A set of Python classes and reference clients that implement portions or full clients of common enterprise protocols—SMB, MSRPC, NTLM, Kerberos, LDAP, and TDS—together with demonstrative tools that exercise these stacks. Its purpose is to facilitate studied exploration of protocol behavior, authentication flows, and security properties rather than to serve as a hardened production component.

How It Works

Inputs typically include target endpoints (SMB shares, RPC endpoints, LDAP servers), authentication material (passwords, NTLM hashes, Kerberos tickets/keys), and protocol parameters (dialects, transports, interface UUIDs, SPNs). Outputs consist of constructed/parsed protocol sessions, management-channel responses, collected authentication artifacts in credential-access workflows, and telemetry suitable for defensive analysis (e.g., authentication attempts, RPC/service-creation events).

Core Concepts

Typical Workflow

Use Cases

Limitations

Related Tools

Evidence Gaps

Sources

Confidence

high