coerce
Thecoerce command performs authentication coercion attacks — forcing a remote machine to authenticate back to an attacker-controlled listener using various Windows RPC protocols. This is used to capture Net-NTLMv2 hashes or relay authentication to other services (e.g., LDAP, SMB, ADCS web enrollment).
Usage
Common Flags
These flags are shared across all coercion methods:| Flag | Short | Description |
|---|---|---|
--listener | -L | Attacker listener IP or hostname (required) |
--username | -u | Username for RPC authentication to target |
--password | -p | Password for RPC authentication |
--hash | -H | NT hash (LM:NT or just NT) |
--domain | -d | Domain |
--dc | — | Domain controller (optional; used for Kerberos ticket resolution) |
--target-ip | — | Override target IP (SNI still uses the hostname) |
--incremental | -i | Prompt before each named pipe attempt (default: true) |
--threads | -t | Number of concurrent coercion threads (default: 1) |
Subcommands
coerce petitpotam
Coerce authentication via MS-EFSRPC (Encrypting File System Remote Protocol). This is the most widely applicable coercion method.
lsarpcefsrsamrlsassnetlogon
--incremental (default) to prompt before each pipe, allowing you to stop if authentication is captured.
coerce dfscoerce
Coerce authentication via MS-DFSNM (Distributed File System Namespace Management Protocol).
coerce mseven
Coerce authentication via MS-EVEN6 (Event Log Remoting Protocol Version 6).
coerce shadowcoerce
Coerce authentication via MS-FSRVP (File Server Remote VSS Protocol). Commonly referred to as ShadowCoerce.
coerce printerbug
Coerce authentication via MS-RPRN (Print System Remote Protocol). This is the original “PrinterBug” / SpoolSample method.
coerce interactive
A split-panel interactive TUI that runs a listener on one side and coercion on the other simultaneously, giving real-time feedback on captured authentications.
TUI Controls
| Key | Action |
|---|---|
Tab | Switch between the listener panel and coercion panel |
Ctrl+K | Kill the listener |
Ctrl+P | Pause / resume the listener |
Ctrl+S | Show / hide password |
q / Ctrl+C | Quit |
How Coercion Works
Authentication coercion exploits Windows RPC protocols that make outbound network calls using the machine account’s credentials. When you trigger one of these calls with a listener IP as the destination, the target machine authenticates to your listener.- Cracked offline (Net-NTLMv2 → password)
- Relayed to another service (LDAP, SMB, ADCS web enrollment)
Common Coercion Workflows
Capture and Crack
Relay to LDAP (Privilege Escalation via RBCD)
Relay to ADCS Web Enrollment (ESC8)
Coercible Host Discovery
Before coercing, identify which hosts are susceptible:Coercible Hosts Database
Hosts identified as potentially coercible are stored in thecoercables table:
| Column | Description |
|---|---|
| Host | Hostname or IP |
| Method | Which RPC protocol is likely exploitable |
| Notes | Additional context |

