Names | Impacket | |
Category | Tools | |
Type | Credential stealer, Info stealer | |
Description | Impacket is an open source collection of modules written in Python for programmatically constructing and manipulating network protocols. Impacket contains several tools for remote service execution, Kerberos manipulation, Windows credential dumping, packet sniffing, and relay attacks. | |
Information | <https://github.com/SecureAuthCorp/impacket> | |
MITRE ATT&CK | <https://attack.mitre.org/software/S0357/> |
Last change to this tool card: 22 April 2020
Download this tool card in JSON format
Previous: Imminent Monitor RAT
Next: Inception
Changed | Name | Country | Observed | ||
APT groups | |||||
ALPHV, BlackCat Gang | [Unknown] | 2021-Mar 2024 | |||
↳ Subgroup: Scattered Spider | [Unknown] | 2022-Jul 2024 | |||
Berserk Bear, Dragonfly 2.0 | 2015-May 2017 | ||||
Cadet Blizzard | 2020-Jun 2024 | ||||
Energetic Bear, Dragonfly | 2010-Mar 2022 | ||||
LightBasin | [Unknown] | 2016 | |||
↳ Subgroup: DEV-0270, Nemesis Kitten | 2022-Nov 2023 | ||||
Mustang Panda, Bronze President | 2012-Mar 2024 | ||||
Operation Ghostwriter | 2017-Apr 2024 | ||||
Operation Harvest | 2016 | ||||
Operation Jacana | 2023 | ||||
RedCurl | [Unknown] | 2018-2023 | |||
RedFoxtrot | 2014-Aug 2021 | ||||
Sofacy, APT 28, Fancy Bear, Sednit | 2004-Sep 2024 | ||||
Stone Panda, APT 10, menuPass | 2006-Feb 2022 | ||||
ToddyCat | 2020-2021 | ||||
Volt Typhoon | 2020-Jun 2024 |
17 groups listed (17 APT, 0 other, 0 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |