File & Share Access
smbclient.py
Interactive SMB client for browsing shares and transferring files.- Interactive Shell
- Command File
- Logging
Shell Commands
Navigation & Listing
Navigation & Listing
File Operations
File Operations
File Information
File Information
Local Operations
Local Operations
Example Session
smbserver.py
Create a local SMB server for file transfers and attacks.- Simple Server
- Authentication
- SMB2 Support
- Port Configuration
smbserver.py Use Cases
Registry Operations
reg.py
Remote registry access and manipulation.- Query Registry
- Save Hives
- Modify Registry
registry-read.py
Read registry keys and values remotely.regsecrets.py
Extract secrets from saved registry hives (offline).Service Management
services.py
Manage Windows services remotely.- List Services
- Service Control
- Create Service
- Service Info
Example Service Manipulation
Specialized SMB Tools
smbmap
While not part of Impacket, it’s worth mentioning for enumeration:attrib.py
Manage file attributes via SMB.ntfs-read.py
Direct NTFS filesystem access (requires raw disk access).Attack Scenarios
- Credential Harvesting
- File Exfiltration
- Persistence via Service
Network Utilities
sniffer.py / sniff.py
Capture network traffic (requires raw socket access).ping.py / ping6.py
ICMP ping implementations.getArch.py
Detect target system architecture.machine_role.py
Determine machine role (workstation, server, DC).Common Issues & Solutions
Access Denied
Access Denied
SMB Version Issues
SMB Version Issues
Registry Access Denied
Registry Access Denied
File Transfer Failures
File Transfer Failures
Best Practices
Stealth
- Avoid multiple failed auth attempts
- Use legitimate-looking service names
- Clean up uploaded files after use
- Restore original registry values
Reliability
- Verify file transfers completed
- Test commands before automation
- Handle errors gracefully
- Keep logs for troubleshooting
Security
- Use Kerberos when possible
- Encrypt sensitive file transfers
- Securely delete extracted data
- Don’t leave backdoors accessible
Documentation
- Record all modifications made
- Document created services/files
- Note original configurations
- Maintain cleanup checklist
Next Steps
Remote Execution
Execute commands after accessing shares
Credential Dumping
Extract credentials via registry access
LDAP Operations
Enumerate Active Directory objects