Starting the Application
From the project directory, run as your regular user:run.sh checks for the venv and then launches the app:
CLI Flags
All flags are passed through to the underlying uvicorn server:Use
--reload during development to pick up changes to etherreaper.py automatically. Avoid --reload in production as it uses more resources and disables multi-worker mode.First Session Setup
Open EtherReaper in your browser
Navigate to
http://localhost:8000. You will see the EtherReaper interface with a Network Info bar across the top and a sidebar with all tool categories.Fill in the Network Info bar
The Network Info bar is the session-wide configuration used by every scan. Fill in all four fields before running any tools:
| Field | Value | Example |
|---|---|---|
| Your IP | Your tun0 or eth0 IP (listener IP for coerce/relay attacks) | 10.10.14.5 |
| Domain | Target AD domain name | corp.local |
| DC Hostname | Domain controller hostname (required for Kerberos/ccache) | DC01 |
| DC IP | Domain controller IP address | 10.10.10.100 |
Add targets to Scope
Go to DATA → Scope and add your target IP addresses, CIDR ranges, or IP ranges. Scope targets are used as the default target list for discovery scans.Accepted formats:
- Single IP:
10.10.10.100 - CIDR range:
10.10.10.0/24 - IP range:
10.10.10.1-10.10.10.254
Run an Nmap scan to populate the hosts database
Go to NETWORK → Nmap and run a scan against your scope. Nmap results are parsed and stored in the SQLite hosts database — this populates the host list used by all downstream scans.After the scan completes, discovered hosts with their open ports, services, OS, and SMB metadata are viewable under DATA → Hosts.
Credential Flow
EtherReaper maintains a persistent credentials database across sessions. Credentials are captured automatically from:- Responder — NTLM hashes from LLMNR/NBT-NS/mDNS poisoning
- netexec — cleartext passwords, NTLM hashes via SMB/LDAP/LSA
- Kerberoast / AS-REP roast — TGS and AS-REP hashes
- ESC1 attack — NTLM hash obtained via the automated Certipy ESC1 chain
netexec(SMB), netexec(LDAP), netexec(LSA), manual). Every authenticated scan modal has a Saved Credentials dropdown that pulls from this database — no copy-pasting between tools.
Sudo Password Modal
Some tools require root privileges to function. When you launch one of these tools, EtherReaper will display a sudo password modal in the browser before starting the scan:| Tool | Reason |
|---|---|
nmap -O | OS fingerprinting requires raw packet access |
masscan | Requires raw socket access |
Responder | Binds to layer 2 interfaces |
mitm6 | IPv6 poisoning requires raw packet injection |
ASRepCatcher | Kerberos packet capture requires raw socket access |
Next Steps
With hosts in the database and your Network Info configured, you have access to all tool categories:- NETWORK → Web Screenshots — fingerprint web applications on discovered hosts
- LAYER2 → Responder — start LLMNR/NBT-NS poisoning to capture hashes
- VULNERABILITIES → Coerce — force authentication from targets to your listener IP
- AD → Kerberoast / AS-REP Roast — extract hashes for offline cracking
- AD → ADCS — enumerate certificate services misconfigurations (ESC1–ESC8+)