GET /api/network-info
Returns the currently stored network info record.Response
Attacker hostname (populated from OS environment).
Attacker’s local IP address (e.g. VPN tun0 IP).
Active Directory domain name (e.g.
corp.local).Domain controller hostname (e.g.
DC01). Required for Kerberos authentication.Domain controller IP address.
External/public IP of the attacker machine.
Detected authentication method:
NTLM, Kerberos, Kerberos+NTLM, or Unknown.1 if the DC only accepts Kerberos, 0 otherwise.Operating system username of the app process owner.
GET /api/network-interfaces
Returns all active network interfaces with their assigned IPv4 addresses. VPN interfaces (tun*, tap*) are sorted to the top of the list.
Response
"success" on success.Array of interface objects, VPN interfaces listed first.
POST /api/network-info/update
Persists the operator’s network context. Ifdc_ip is provided and auth_method is not specified, the DC is probed automatically to detect whether it supports Kerberos, NTLM, or both.
Request Body
Attacker hostname.
Attacker’s local IP (used as listener address in coercion attacks).
Active Directory domain name.
Domain controller hostname. Must be the actual hostname (not IP) when using Kerberos.
Domain controller IP address.
External IP address of the attacker machine.
Explicitly set auth method (
NTLM, Kerberos, Kerberos+NTLM). If omitted and dc_ip is present, the DC is probed automatically.Response
"success" on success.The auth method that was stored (auto-detected or explicitly provided).
POST /api/network-info/detect-auth
Probes the given DC IP to determine whether it supports Kerberos, NTLM, or both. Updates the storedauth_method and requires_kerberos fields.
Request Body
IP address of the domain controller to probe.
Response
"success" on success.Detected auth method:
"Kerberos", "NTLM", "Kerberos+NTLM", or "Unknown".true if auth_method is exactly "Kerberos" (DC refuses NTLM).POST /api/kerberos/acquire-tgt
Acquires a Kerberos TGT usingimpacket-getTGT. Before requesting the ticket, the system clock is synchronized with the DC using ntpdate (Kerberos requires time skew < 5 minutes). The resulting .ccache file is saved to recon/ccache/<username>.ccache.
Request Body
Active Directory domain name.
Account username to request the TGT for.
Account password.
Domain controller IP used for time sync and TGT acquisition.
Sudo password required to run
ntpdate for clock sync. Optional but strongly recommended.Response
"success" on success.Absolute path to the saved ccache file (e.g.
/home/kali/etherreaper/recon/ccache/administrator.ccache).Human-readable result summary.
GET /api/ccache/list
Lists all.ccache files in the recon/ccache/ directory. Used by authenticated scan modals to populate the ccache file selector.
Response
"success" on success.Array of ccache file objects, sorted by modification time (newest first).
Total number of ccache files found.